last executing test programs: 13m2.93197107s ago: executing program 0 (id=582): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000000050005000a0000001200030068617368"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000000906010200000c0000000000020000000900020073797a310000000005000100070000002c0007801800018014000240fe8000000000000000000000000000bb060004404e1f00000500070088"], 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 13m2.835887041s ago: executing program 0 (id=586): mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff530000008"], 0x15) socket$inet_tcp(0x2, 0x1, 0x0) syz_emit_ethernet(0x1e, &(0x7f00000000c0)={@random="19216266e52d", @multicast, @void, {@can={0xc, {{0x2, 0x1, 0x0, 0x1}, 0x1, 0x3, 0x0, 0x0, "9f3378825546e93a"}}}}, &(0x7f0000000140)={0x0, 0x1, [0xe8c, 0xe1, 0x2d3, 0xdc2]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x27, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x13, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r3 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='\x00', 0x89901) move_mount(r3, &(0x7f00000001c0)='./file0/../file0/../file0/../file0\x00', r3, &(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x50000, 0x28011}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_PROTECT={0x5, 0x8, 0x3}]}}}]}, 0x3c}}, 0x20) pivot_root(&(0x7f0000000080)='./file0/../file0/../file0/../file0\x00', &(0x7f0000000380)='./file0/../file0/../file0/../file0\x00') write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[], 0x15) r5 = dup(r2) write$binfmt_elf64(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) lchown(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 13m2.743198142s ago: executing program 0 (id=588): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x5}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='+}[@\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6, 0x0, 0x41100, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x89901) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02142000110000000040000000000000030005000000000002000000ffffffff0000000000000000080012000000010000000000000000000600000000000027b20e97a6a9ecae000000ee00000000000000000000000000fc020000000000000000000000000000030006000000000002000000e00000010000000000000000010018"], 0x88}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000040)={0x4000000, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="020f0000100000000000000000000000030005000000000002000000ffffffff0000000000000000080012000000010000000000000000000600000000000000000000000000000001000000006b3c000000000000000000fc020000000000000000000000000000030006000000000002000000e0000001"], 0x80}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="580000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="46ec0800000000002800128009000100766c616e00000000180002800c0002001f0000001f000000060001000100000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x58}, 0x1, 0x0, 0x0, 0x600}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_emit_ethernet(0x72, &(0x7f00000007c0)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @val={@val={0x88a8, 0x3, 0x0, 0x1}, {0x8100, 0x6, 0x0, 0x1}}, {@mpls_mc={0x8848, {[{0xffffe, 0x0, 0x1}, {0x5}, {0xfff, 0x0, 0x1}, {0x6, 0x0, 0x1}], @llc={@snap={0x3, 0xab, "e2", "5d1ca0", 0x6001, "c271626cc22bc1ac085c38d21f385be0b0d9d27a607e983da64c8f2cb1354a5337bfe4b242d57f97c8d40e35d4fb8c23458b850f3d15d33c1253248d240e2dd4f3e31297"}}}}}}, &(0x7f0000000400)={0x1, 0x4, [0x3eb, 0xd7b, 0x1b7, 0x20a]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x18) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/FH50/9GTqJCAqqp7ypiIPbdaAjNKKBUS4sITjmWY2dtrEzVpNwCwJvuuimf9cVRAhCdBEEYhddhRLeddGdd15kV0lEJ+Y0N5tapk7y/brYHvZ8P4fv+bPD9h1s+vjda9GwY4TNlFTXV0l1u+RktkqapVoW5OTI9ZH3+85duHg6EAx2nFXtDHT7/KradGC09+bwobHUjvMvm17XyXjzpekZ/9T47vE909+7r0YcjTgai6fU1L54PGX22Zb233eihuoZ2zIdSyMxx0qW9MN2PJHIqBnrb2xIJC3HUTOW0aiV0VRcU8mMmlfMSEwNw9DGBsHKhtOPAst3Q89nXVdmUu9cty4nruvmX6zfxOmhwubOv+sWnf87lZ4SNlHRTb1exB5Kh9KhwnOhHwhLRGyxpFW88k3y14j7eMSdu1Tyjzf8I8HJo2/fqGqzDNrZ+Xw2HfKU5n3idT2FTEGh7jwV7PBpQWn+P2kozvvFK7vK5/1l87VyuKUob4hXJi9LXGyZGD34Zapr6MFCftCneqIruCT/v/QvHqZnnyt0fgAAAAAAAAAAWAtDfyq7fm/kB9weUNXGJf1CvtzvA0vX51vLrs/XyN6ayu47AAAAAADbhZMZiJq2bSX/ssh/lV+P7fx7xZNbvz94f+fKY1raPBPtH3KJrbBff1B87dkS0ygtZH71abXBnnV+pywWn9ZlO1Xz81t+zMnejy9W3U7tL8dnOWMbf1cCAAAAsBEWP/S3STb8Kp3tOXav0nMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGC7WcNfjk08LNfSfLHzablWpfcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgJT8CAAD//wva0Pw=") r8 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x81000) renameat2(r8, &(0x7f0000000140)='./file1\x00', r8, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) 13m2.117857583s ago: executing program 0 (id=593): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030097850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) r1 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x8003}, &(0x7f0000000240)=0x0, &(0x7f0000000200)=0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r4 = epoll_create1(0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) shutdown(r5, 0x0) recvmmsg(r5, &(0x7f0000000080), 0x72a, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000780)={0x20000000}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) r6 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r6, 0x10d, 0xd6, &(0x7f0000000000), &(0x7f0000000280)=0x4) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x38, 0x3, r1, 0x0, 0x0, 0x0, 0x1, 0x1, {0x2}}) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x1008014, &(0x7f00000000c0)=ANY=[], 0x4, 0x7d8, &(0x7f0000000a80)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000002c0)={[{@noauto_da_alloc}, {@jqfmt_vfsold}, {@noquota}, {@norecovery}, {}]}, 0x1, 0x4be, &(0x7f0000000540)="$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") r7 = fsopen(&(0x7f00000001c0)='ntfs3\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r7, 0x1, &(0x7f0000000400)='noquota', &(0x7f0000000440)='%$+#\x00', 0x0) mknod$loop(&(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, 0x0) rename(&(0x7f000001fb40)='./file0/file0\x00', &(0x7f000001fb80)='./file2\x00') unlink(&(0x7f00000003c0)='./file3\x00') io_uring_enter(r1, 0x6e2, 0x600, 0x1, 0x0, 0x0) syz_clone(0x80480, &(0x7f0000000000)="910a07ee230cf135975f4e0cd3c6276ab9a3c52342942ed7d143618b1c2879f6f689e909a31f0554d8dba07c4dd3b3bbe882", 0x32, &(0x7f0000000040), &(0x7f0000000100), &(0x7f00000002c0)="5e205a3f373a7794b83297a10d149cc0998793751d57c69346bcd8f1c645425ece396d0ea59c355d884c47f9730091ddd5a45f655c1106c8a7bcdb692ef7fc6c5c6c727d055b52fd6326afd6514548c739b0bd11235393656267ce7080899f38abb8b4c779b5077861ec363dadbe5011345f319a55fd431177a0f28de049116af756ed55520ef0246aa4f7c91f99b3a4f747094279ec54241c4ee64a5bd7a8088061001e31d543cba09c1d1d186a914e967a1b07e5d6f38bab21ed66d92d141ce6d7bd2db3f96d9c2891bc1f9041e27a91f04f87112767b7e699eadd74da83ec5521") 13m1.475262083s ago: executing program 0 (id=604): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = socket(0x2, 0x80805, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000080)={0x0, 0xa2ae}, 0x8) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) timer_create(0x0, 0x0, &(0x7f0000000000)=0x0) timer_settime(r3, 0x0, &(0x7f0000000100), &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7c00, 0x0, 0x3) syz_io_uring_setup(0x1725, &(0x7f0000000080)={0x0, 0x4, 0x80, 0x400002, 0x9c}, &(0x7f0000000100)=0x0, &(0x7f0000000200)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x1f00, {0x0, 0x0, 0x74, r8, {0xb, 0xfff2}, {}, {0xe, 0xc}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x8881}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b0000000f0000000300"/20, @ANYRES32=r1, @ANYBLOB='\b\x00'/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="03003fb8020000000000000000000011000000000000e30000000000cce0df120d4a9867c319b080f0703b9e7da300708d83c59683e6efa06f6cae9ec2"], 0x50) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) unshare(0x28000600) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_MKDIRAT={0x25, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)='./file0\x00', 0x84, 0x0, 0x1}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9}, 0x10) connect$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) lsetxattr$security_selinux(&(0x7f00000001c0)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:net_conf_t:s0\x00', 0x20, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 13m0.819088943s ago: executing program 0 (id=614): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_macvtap\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x10000}, 0x18) r4 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r4, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004", @ANYBLOB, @ANYRES32=0x0], 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x200, {0x0, 0x0, 0x0, r1, {0xfff2}, {}, {0x9}}}, 0x24}}, 0x0) 13m0.792428783s ago: executing program 32 (id=614): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_macvtap\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x10000}, 0x18) r4 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r4, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004", @ANYBLOB, @ANYRES32=0x0], 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x200, {0x0, 0x0, 0x0, r1, {0xfff2}, {}, {0x9}}}, 0x24}}, 0x0) 9m42.367676428s ago: executing program 5 (id=3896): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) futex_waitv(&(0x7f0000000180)=[{0x0, &(0x7f0000000000), 0x2}], 0x1, 0x0, 0x0, 0x0) futex(&(0x7f0000000140), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/sockcreate\x00') pread64(r2, 0x0, 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="e0000000720000009ca748578ddfb2fe74511427b2db809ccbe7badaf46b4de21e15b1b56902a566d7756c2e64258fb552a4bd72059678ebd54307091e23bd8669600ea7ee3ca8ad376f15234ca160a9841355057ef431499897fefd57946bb02bd7758e3452f5de8ad58373f4859447b642108bc1a61345c5e6cfb000c34e49302648978f79650c1b869a849549d018146c6e03a00f91e17887a4a04f195e7652d5f91587fbc68fb069f78464fee1692fd8c7d2ef6849a98ae8853c55bf31652b29effd4b1d9dbf072fb030a35016307341d715eb5609437412eb4e8e46b180a4771e5852028a00"], 0x8400) 9m42.341193338s ago: executing program 5 (id=3897): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xa681, 0x80) open(&(0x7f0000000140)='./file1\x00', 0x64842, 0x21) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) r4 = memfd_create(&(0x7f0000000080), 0x0) splice(r2, 0x0, r4, 0x0, 0x408cd, 0x100000000000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) pipe(&(0x7f0000000480)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfffffe3e) 9m41.492929332s ago: executing program 5 (id=3913): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) unshare(0x2000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="000027bd7000fddbdf2505000000050030000100000008002c00f8ffffff0500370008000000080032000100000005002e0001000000080032000200000008003a000800000005002f0001000000"], 0x54}, 0x1, 0x0, 0x0, 0x4000004}, 0x40000) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r2, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xbc}}, 0x0) connect$inet(r2, 0x0, 0x0) shutdown(r2, 0x1) sendmsg$NFT_BATCH(r0, 0x0, 0x20050800) sendmsg$NFNL_MSG_COMPAT_GET(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r4 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x507344, 0x0) ioctl$TIOCSETD(r4, 0x5423, 0x0) perf_event_open(&(0x7f0000001700)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x8806, 0x3, 0x634e, 0x0, 0x0, 0x1, 0xfff6, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x5c, 0x30, 0xb, 0x0, 0x0, {}, [{0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x0, 0x0, 0x10000000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x5c}}, 0x40) ioctl$TIOCVHANGUP(r4, 0x5437, 0x2) getpid() mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000000000000) 9m40.595166426s ago: executing program 5 (id=3928): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x50cfb, 0x0, 0x8000008, 0x3, 0x4, 0x5, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x40505330, &(0x7f00000001c0)={0x800000, 0x7d, 0x80, 0x5, 0x3ffd, 0x7}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x40505330, &(0x7f0000000300)={0x800080, 0x810000, 0x2, 0xfff, 0xfd, 0x4}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000680)=""/209, 0xd1, 0x0, &(0x7f0000000780)=""/244, 0xf4}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, 0x0, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b0000005e140602000000000e0027001000000002800000121f", 0x2e}], 0x1}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@delneigh={0x30, 0x11, 0x1, 0x70bd2b, 0x25dfdbfc, {0xa, 0x0, 0x0, r9, 0x4, 0xb2, 0x1}, [@NDA_DST_IPV6={0x14, 0x1, @empty}]}, 0x30}, 0x1, 0x0, 0x0, 0x2000c011}, 0x4044004) socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x102311, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_genetlink_get_family_id$fou(&(0x7f0000000400), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2(&(0x7f0000001cc0), 0x800) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f0000000180)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES64, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000c00)="$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") open(0x0, 0x145142, 0x0) 9m40.375585879s ago: executing program 5 (id=3933): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x1, 0x7fe6, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ffffffff850000002d000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000000)="7800000018002507b9409b14ffff00000204be04020506050e0204094300080004000000040010000d0068d0bf46d32345653600648d0a0012000200000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a32000400160005000a0000000000e000e218d1ddf66ed538f25232500000", 0x78, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(r4) 9m40.35576111s ago: executing program 5 (id=3935): r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x408, &(0x7f0000000740), 0x1, 0x57d, &(0x7f0000000d00)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES16=r0], 0x0, 0xfff, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/107) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) iopl(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) unshare(0x6020400) dup2(r2, r3) 9m40.33939433s ago: executing program 33 (id=3935): r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x408, &(0x7f0000000740), 0x1, 0x57d, &(0x7f0000000d00)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES16=r0], 0x0, 0xfff, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/107) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) iopl(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) unshare(0x6020400) dup2(r2, r3) 4.360270252s ago: executing program 2 (id=17033): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000500)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "8a9646", 0x14, 0x4, 0x0, @empty, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x238c1000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480), 0x1a1040, 0x0) ioctl$AUTOFS_IOC_FAIL(r4, 0x4c80, 0x7000000) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000000) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 3.459272676s ago: executing program 2 (id=17039): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0x30, 0x3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x2) r2 = dup(r1) r3 = open(&(0x7f0000000040)='./bus\x00', 0x42500, 0x42) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r4, @ANYBLOB], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r5}, 0x10) sendfile(r2, r3, 0x0, 0x8000fffffffe) 3.406665747s ago: executing program 6 (id=17040): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x8001, 0xfc, 0x1, 0x3, 0x6, 0xcb, 0x4}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000001000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xbab, 0x0, 0x272, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21a39982, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0xfffc, 0x6}, {0xff}, 0x0, 0x7f}}]}}]}, 0x45c}}, 0x0) dup3(r1, r0, 0x0) r5 = syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_io_uring_setup(0x6eac, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) r8 = io_uring_setup(0x6280, &(0x7f0000000080)={0x0, 0x10000000, 0x1, 0x0, 0x1d2}) io_uring_register$IORING_REGISTER_BUFFERS(r8, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r8, 0x10, 0x0, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r7, r10, 0x25, 0x0, @val=@netfilter={0x5, 0x1, 0x107, 0x1}}, 0x20) socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@multicast1=0xe0000300, @local}, 0x8) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000003c0)=""/110) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x20, 0xfc, 0x2, 0x0, @rand_addr=0x1c, @multicast1=0xe0000300}, @dest_unreach={0x3, 0x6, 0x0, 0x0, 0xfa, 0x9, {0x5, 0x4, 0x0, 0x3d, 0xfff6, 0x65, 0x5, 0x1, 0x4, 0x3, @private=0xa010102, @local}}}}}}, 0x0) 3.236559369s ago: executing program 6 (id=17043): r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) 3.224735369s ago: executing program 6 (id=17045): r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0xc220, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x2, 0x7}, 0x2400, 0xcc, 0x52, 0x5, 0x0, 0x5, 0xb, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000010012000000000000"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) readv(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") r3 = open(&(0x7f0000000040)='./file1\x00', 0x105802, 0x22d) pwritev2(r3, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000300)='X', 0x1}], 0x2, 0x8c81, 0x1, 0x16) ftruncate(r0, 0x2007ffc) sendfile(r0, r0, 0x0, 0x800000009) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20010000120013070000000000000000e0000001000000000000000000000000fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x120}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x20, 0x40, 0x5, 0x61, {{0x6, 0x4, 0x1, 0x2, 0x18, 0x68, 0x0, 0x4, 0x2f, 0x0, @rand_addr=0x64010100, @remote, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000340)={'erspan0\x00', &(0x7f0000000500)={'sit0\x00', r6, 0x7800, 0x40, 0x5, 0x3, {{0xf, 0x4, 0x2, 0x8, 0x3c, 0x65, 0x0, 0x4, 0x4, 0x0, @loopback, @empty, {[@timestamp_addr={0x44, 0x24, 0xd5, 0x1, 0xa, [{@remote, 0x10000}, {@empty, 0xd8}, {@remote, 0x53}, {@multicast2, 0x3}]}, @end]}}}}}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0xb}, 0x18) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000a00)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x3}}, @TCA_CT_MARK={0x8, 0x10, 0x2000000}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x10000000) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, &(0x7f0000000000)) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000580)={@remote, @multicast2, r7}, 0xc) r10 = socket$rds(0x15, 0x5, 0x0) bind$rds(r10, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r12}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) 2.536586s ago: executing program 2 (id=17050): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000001040)='signal_generate\x00', r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sendmsg(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002d80)="0f", 0x1}, {0x0, 0x2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xff51}, {0x0, 0x4d}, {0x0}], 0x9}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSW2(r3, 0x5408, &(0x7f0000000040)={0x2000, 0x0, 0x0, 0x0, 0x0, "23f50000adb4004408020e90d1beaa82dc1ecf", 0x3}) ioctl$TIOCGPGRP(r3, 0x5437, 0x0) 2.392512102s ago: executing program 6 (id=17051): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r1, @ANYBLOB="14000200ff2300000000000000000000000000011400060000000000060000000000000000000000080008000004"], 0x48}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pread64(r4, &(0x7f0000000300)=""/150, 0x96, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1a00000000f6ffffffff10114e7b439cce1ea9e5f8cbffffff80000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ffffffff00000000000000001811", @ANYRES32=r5, @ANYBLOB="0000000a00000000b71800001d000007020000f8ffff08b703000008e5c000b704000000000000850000008200000007000000000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x30, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="24000000190001000000000000c3b2000a0000000003c8000000000008000600ffffffff"], 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r7) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0xfd, 0x1bf, &(0x7f0000000300)="$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") mount$nfs(&(0x7f0000000100)='.5.', 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) chroot(&(0x7f0000000100)='./file1\x00') 2.209398885s ago: executing program 2 (id=17053): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000001040)='signal_generate\x00', r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sendmsg(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002d80)="0f", 0x1}, {0x0, 0x2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xff51}, {0x0, 0x4d}, {0x0}], 0x9}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSW2(r3, 0x5408, &(0x7f0000000040)={0x2000, 0x0, 0x0, 0x0, 0x0, "23f50000adb4004408020e90d1beaa82dc1ecf", 0x3}) ioctl$TIOCGPGRP(r3, 0x5437, 0x0) 1.681682763s ago: executing program 2 (id=17058): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) pipe(&(0x7f00000002c0)) r1 = syz_io_uring_setup(0x56f9, &(0x7f00000008c0)={0x0, 0x93b2, 0x200, 0x2, 0x21a}, &(0x7f0000000980), &(0x7f0000000200)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRESHEX=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r3, 0x0, 0x100000001}, 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x200, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r4, &(0x7f0000001d80)='.\x00', 0x8000, &(0x7f0000000080)={0x0, 0x8, 0x40000}, 0x20) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba9432}) readv(r5, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/227, 0x10}], 0x4) 1.465414837s ago: executing program 3 (id=17067): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000080), &(0x7f0000000280)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x4008094) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x1064, 0x80, 0x0, 0x224}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x81, 0x8, 0x1, {0x2}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r1, 0x47f8, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$selinux_validatetrans(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB='system_u:object_r:unconfined_execmem_exec_t:s0 system_u:object_r:default_context_t:s0 000000000000000014'], 0x82) 1.404508068s ago: executing program 6 (id=17068): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000001040)='signal_generate\x00', r1}, 0x18) r2 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r2, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002d80)="0f", 0x1}, {0x0, 0x2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xff51}, {0x0, 0x4d}, {0x0}], 0x9}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSW2(r4, 0x5408, &(0x7f0000000040)={0x2000, 0x0, 0x0, 0x0, 0x0, "23f50000adb4004408020e90d1beaa82dc1ecf", 0x3}) ioctl$TIOCGPGRP(r4, 0x5437, 0x0) 1.315206879s ago: executing program 3 (id=17069): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a"], 0x110}}, 0x0) 1.28814089s ago: executing program 3 (id=17070): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000040000001400050003030000000a0000005dc00000000001080002000500000014000600ff"], 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x4040000) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x24008000}, 0x4040000) 1.234230041s ago: executing program 3 (id=17072): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x240, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000240), &(0x7f00000003c0)=r4}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r3, 0x0, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0x5e25ed804c4cd5b4}}}}, 0x0) 1.217570171s ago: executing program 3 (id=17073): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000080), &(0x7f0000000280)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x4008094) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x1064, 0x80, 0x0, 0x224}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x81, 0x8, 0x1, {0x2}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r1, 0x47f8, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$selinux_validatetrans(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB='system_u:object_r:unconfined_execmem_exec_t:s0 system_u:object_r:default_context_t:s0 00000000000000001495'], 0x82) 1.158341842s ago: executing program 4 (id=17074): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x240, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e0000000400000008000000010000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, 0x0, &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r4, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0x5e25ed804c4cd5b4}}}}, 0x0) 1.157091522s ago: executing program 1 (id=17075): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001200)=ANY=[], 0x4c}}, 0x0) 1.150158762s ago: executing program 4 (id=17076): open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r1}, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x4002, 0x0) (fail_nth: 9) 1.116407292s ago: executing program 1 (id=17077): syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (fail_nth: 2) 997.610264ms ago: executing program 3 (id=17078): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r1, @ANYBLOB="14000200ff2300000000000000000000000000011400060000000000060000000000000000000000080008000004"], 0x48}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pread64(r4, &(0x7f0000000300)=""/150, 0x96, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1a00000000f6ffffffff10114e7b439cce1ea9e5f8cbffffff80000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ffffffff00000000000000001811", @ANYRES32=r5, @ANYBLOB="0000000a00000000b71800001d000007020000f8ffff08b703000008e5c000b704000000000000850000008200000007000000000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x30, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="24000000190001000000000000c3b2000a0000000003c8000000000008000600ffffffff"], 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r7) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0xfd, 0x1bf, &(0x7f0000000300)="$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") mount$nfs(&(0x7f0000000100)='.5.', 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) chroot(&(0x7f0000000100)='./file1\x00') 957.234145ms ago: executing program 6 (id=17079): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x182804, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x800000000001}, 0x1180, 0x5dd7, 0x0, 0x8, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) utime(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x8, 0x9}, &(0x7f0000000080)=0x8) socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r5, 0x0, 0xb, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x46, &(0x7f0000000000)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00186371ae9b1c03"}}}}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r6, 0x3) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}}) socket$key(0xf, 0x3, 0x2) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)="89e7ee", 0x3}, {&(0x7f0000000440)="9c74dfbf77572856c888a886bb86", 0xe}, {&(0x7f0000000280)='hpN', 0x3}], 0x3) 795.542367ms ago: executing program 4 (id=17080): clock_adjtime(0x0, &(0x7f0000000680)={0x19b1, 0x0, 0x0, 0x4, 0x0, 0x6, 0xffffffffffffffff, 0xfffffffffffffffc, 0x2, 0xe5, 0x0, 0x202, 0x0, 0x0, 0x800000, 0x8, 0x0, 0x80000000000081, 0xfffffffffffffffe, 0x0, 0x6}) r0 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) epoll_create1(0x80000) r1 = memfd_create(&(0x7f0000000280)='\x01\xfd\xae.+\xa6\x8c\xb6?2\x199\x94S,|x?Ue[\xbd\xe1!\x033\xbc\'#\xff\x17\x9b%\xf3[d \x97\xf5G\x97A\xc2\xd8\xf0Uq\xe6+\xa5l\x94\v\xb6\a\x17\\\xfb\x04!\xe4\xc4\xb1\xa2\x1c\xffC;\x94Q\r\xb6}\x9c\xecC\v\xcf\xeb\xe4\x9aR\xe5,\x82\x03\x00\x19\x8d\xe8\xc6\xb9\xe4\xb4\x99\x8a\x19P\xb8\x8cx\b\x99\x04R\x05\xaf\xa2\xea5\f\xcc\x1a\x9b\x00Uf\xa5\xf7\x80Tgiz\nX\b\x91\xfd0\x8e\xb6\xa3\v#\xa1\xdf\xb4\xc0\xe6\xb4\xef\xa8i\xd8\xa2\xd2(\x98\x9bA\x8f\x13\xeb\xf4b/\xef!\x8f\xf6]-\xe9k\xb62\x89gEv\x13\xf4\xc7\xb2\xf5\\\x17\x90\xb5\xa6\xa8\xb8o\x0f\xe2 \xe7\x9c$\xd7\xf2@\xf7cdv[\t\x00\x8d\xf3\xcc1\r$\x1e\xff\xf0P\xb2\x97\xb8\xbc\xeb\x91\x87\x8bu\xbf\xd4\'\xff\x1f\f\x016\x9dQ\xeeT\xe8\bY\x00\xb2\x06\xa6\xbel\x9b.o\xbe\x80\x9dx\xd5O\xd6h\\I\xc9\x8d\a\x1d\xc9\x0f\x82\xdbs\xc7\x83L\x9e\xa2\xd1\xb3\xac\x8d\xd8\xb4\xb4\xea\x90Q\xd8\xc7\xeb%\x8bOp\x1ab\x96\xcf\xbb\x15\xcf\xfcN\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\xaf\xa2\x14]p+\x96\x1ei|n\xda\xee\\\xae\x96*\x82*\xb8j\xda\xaa\x14\x1f\x1d\xf8\xf8\xae\xfcH\xc4\xb3j\xe8\xcfO\xef\x0e\xafe\xb5*\x89\x18\xb2w\x96\b\x1by\xeaT\xdd\xb3g6\xbc\x85\xb2Y\xccv\x06\x00\x00\x00\xc5e\x90\xc51\x9f\v_# \b\xa5\xbcP,|\xe9\xd6s\x1f\x1f\xbe\xd3\x80\xb1\xa8 \xce|df\x903\v\x02\xea.\x03X\xb5\xe4,8\xb7\xadEI\xdcA\xa7\xcc\xd7\xf9n\x1b\x95\xf8\x11Z\xe6:\x03\xce\xfe\x02\x8ctdy~_oC\x9e\xef\xf0\xa2K\xe9;\x8e:\x01\x03C\x92\xeb\x16\x1c\xbf\xbe\xef\xccUxhg\xffY\xe6\x83\xa6z\xff\x01\x9d o_{!O\xaajU\x84 \xe9\xb59r\x9cw\x18Z\xd3\xcd\x0e\xba\\\xdb\xf0\xe1\x86\t\xaf\vi\xdc\xbf?\xf5\n\xbd^\x05\xc0\xceuC}\xa8\xc7\xad\x86\xd7\x15&\xb9]1\x05J\x96\xf0\x84\xc1\f\xa6p\x96\xb8\x02\x13pA\x19\tf\x12\x88\xc8\x9c\xc9Cn\xd4\xa47V\'+\xcc\xbf\r\xa9\x10\x1d\xcf\xebKlb\xe5:\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\xdf\xbb\xc0_\x99F\xf4n]\x14\xbc\xcd\xd3\x9f\x9fe\xc5\xe6\xe8Mb\xc6\x82\x82\xcc\xcaXe\xe1\xa2\xaa\x02\x86\xb8\x18\xe2C\xeb\xa9\x17&\x01&\'w\xa1t0\x80\xf0\x93\x80\x9f\x9b\xe0\x9f\xea\xb9\x9eD]#V\xda\x92\xca\xc6\xfa.\xd6\xe31\xfe\xe8\x02\xebX\xbd\nz\x01O\xd3r\xa2\xa9u\x93', 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xe, 0x12, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, 0x0, 0x8, 0x201, 0x0, 0x0, {0x2, 0x0, 0x4}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88be}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8010}, 0x240000c0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) open(0x0, 0x64842, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01d90000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00f7ffffffffffff130012800b00010062617461647600000400028008000a00", @ANYRES32=r5], 0x3c}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x0) flock(r0, 0x5) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r8) sendmsg$ETHTOOL_MSG_DEBUG_SET(r8, &(0x7f0000001540)={0x0, 0x26, &(0x7f0000001500)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e00000000000000000018000280080002002000000004000100080004"], 0x44}}, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r6, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)={0x70, r9, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x278efada38d51281}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x4) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r11, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x1f00, {0x0, 0x0, 0x74, r12, {0xb, 0xfff2}, {}, {0xe, 0xc}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x8881}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000780)={0x138, r9, 0x100, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x801}, 0x0) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000440), &(0x7f00000002c0)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x12, 0x0) 773.669237ms ago: executing program 1 (id=17081): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a"], 0x110}}, 0x0) 753.519398ms ago: executing program 2 (id=17082): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x238c1000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480), 0x1a1040, 0x0) ioctl$AUTOFS_IOC_FAIL(r4, 0x4c80, 0x7000000) 594.108001ms ago: executing program 1 (id=17083): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x240, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e00000004000000080000000100000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000240), &(0x7f00000003c0)=r3}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0x5e25ed804c4cd5b4}}}}, 0x0) 549.928271ms ago: executing program 4 (id=17084): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x240, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000240), &(0x7f00000003c0)=r4}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r3, 0x0, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0x5e25ed804c4cd5b4}}}}, 0x0) 331.362605ms ago: executing program 4 (id=17085): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a"], 0x110}}, 0x0) 262.880815ms ago: executing program 1 (id=17086): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000900)=ANY=[@ANYBLOB="48000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32], 0x48}}, 0x0) 146.889658ms ago: executing program 4 (id=17087): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSW2(r2, 0x5408, &(0x7f0000000040)={0x2000, 0x0, 0x0, 0x0, 0x0, "23f50000adb4004408020e90d1beaa82dc1ecf", 0x3}) ioctl$TIOCGPGRP(r2, 0x5437, 0x0) 0s ago: executing program 1 (id=17088): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000080), &(0x7f0000000280)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x4008094) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x1064, 0x80, 0x0, 0x224}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x81, 0x8, 0x1, {0x2}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r1, 0x47f8, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$selinux_validatetrans(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB='system_u:object_r:unconfined_execmem_exec_t:s0 system_u:object_r:default_context_t:s0 00000000000000001495'], 0x82) kernel console output (not intermixed with test programs): :sysadm_r:sysadm_t pid=15147 comm="syz.1.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 794.832826][ T29] audit: type=1326 audit(1747295632.002:46507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15147 comm="syz.1.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 794.856749][ T29] audit: type=1326 audit(1747295632.002:46508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15147 comm="syz.1.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 794.871321][T15148] bond2: (slave batadv3): making interface the new active one [ 794.880433][ T29] audit: type=1326 audit(1747295632.002:46509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15147 comm="syz.1.15774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 794.897716][ T37] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 794.921070][ T37] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 794.924721][T15148] bond2: (slave batadv3): Enslaving as an active interface with an up link [ 795.000025][T15144] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15773'. [ 795.117724][T15169] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 795.127681][T15169] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 795.134989][T15170] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 795.142378][T15170] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 795.553728][T15184] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 795.561134][T15184] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 795.842568][T15209] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15793'. [ 795.954577][T15229] netlink: 12 bytes leftover after parsing attributes in process `syz.3.15799'. [ 795.998132][T15229] bridge0: port 5(batadv3) entered blocking state [ 796.004918][T15229] bridge0: port 5(batadv3) entered disabled state [ 796.050967][T15229] batadv3: entered allmulticast mode [ 796.064369][T15229] batadv3: entered promiscuous mode [ 796.494787][T32019] batman_adv: batadv3: No IGMP Querier present - multicast optimizations disabled [ 796.504198][T32019] batman_adv: batadv3: No MLD Querier present - multicast optimizations disabled [ 797.149043][T15333] netlink: 8 bytes leftover after parsing attributes in process `syz.6.15817'. [ 798.247606][T15406] netlink: 12 bytes leftover after parsing attributes in process `syz.1.15830'. [ 798.481608][T15429] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 798.494317][T15429] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 798.934109][T15471] netlink: 8 bytes leftover after parsing attributes in process `syz.6.15853'. [ 799.611082][T15543] netlink: 8 bytes leftover after parsing attributes in process `syz.6.15873'. [ 800.248650][T15609] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 800.256260][T15609] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 800.575589][T15635] netlink: 12 bytes leftover after parsing attributes in process `syz.6.15890'. [ 800.716656][T15650] netlink: 8 bytes leftover after parsing attributes in process `syz.4.15891'. [ 800.800805][T15659] netlink: 12 bytes leftover after parsing attributes in process `syz.6.15895'. [ 800.996884][T15675] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 801.015820][T15675] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 801.194505][T15689] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15901'. [ 801.416502][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 801.416520][ T29] audit: type=1400 audit(1747295638.802:46536): avc: denied { audit_write } for pid=15703 comm="syz.2.15906" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 801.469471][ T29] audit: type=1107 audit(1747295638.832:46537): pid=15703 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='@' [ 801.524497][T15712] netlink: 12 bytes leftover after parsing attributes in process `syz.4.15909'. [ 801.814529][T15748] 9pnet_fd: Insufficient options for proto=fd [ 801.880866][T15758] netlink: 12 bytes leftover after parsing attributes in process `syz.6.15931'. [ 801.979997][T15767] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15935'. [ 802.100538][T15792] netlink: 12 bytes leftover after parsing attributes in process `syz.6.15939'. [ 802.203576][ T29] audit: type=1107 audit(1747295639.592:46538): pid=15811 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 803.410396][T15881] netlink: 'syz.1.15961': attribute type 1 has an invalid length. [ 803.463045][T15889] netlink: 3 bytes leftover after parsing attributes in process `syz.1.15961'. [ 803.772559][T15881] bond1: entered promiscuous mode [ 803.793516][T15881] 8021q: adding VLAN 0 to HW filter on device bond1 [ 803.807036][T15889] batadv2: entered promiscuous mode [ 803.812337][T15889] batadv2: entered allmulticast mode [ 803.822215][T15889] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 803.835815][T15889] bond1: (slave batadv2): making interface the new active one [ 803.844453][T15889] bond1: (slave batadv2): Enslaving as an active interface with an up link [ 804.026692][ T29] audit: type=1107 audit(1747295870.410:46539): pid=15937 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 804.327795][ T29] audit: type=1326 audit(1747295870.710:46540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15965 comm="syz.2.15971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 804.379504][ T29] audit: type=1326 audit(1747295870.710:46541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15965 comm="syz.2.15971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 804.403295][ T29] audit: type=1326 audit(1747295870.710:46542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15965 comm="syz.2.15971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 805.129332][T16018] 9pnet_fd: Insufficient options for proto=fd [ 805.567887][ T29] audit: type=1107 audit(1747295871.940:46543): pid=16028 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 805.635991][T16033] __nla_validate_parse: 3 callbacks suppressed [ 805.636007][T16033] netlink: 12 bytes leftover after parsing attributes in process `syz.6.15998'. [ 805.805931][T16044] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15996'. [ 805.828558][T16047] 9pnet_fd: Insufficient options for proto=fd [ 805.992081][T16053] netlink: 12 bytes leftover after parsing attributes in process `syz.6.16007'. [ 806.087738][ T29] audit: type=1107 audit(1747295872.470:46544): pid=16058 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 806.379784][T16053] bridge0: port 6(batadv6) entered blocking state [ 806.386439][T16053] bridge0: port 6(batadv6) entered disabled state [ 806.413721][T16053] batadv6: entered allmulticast mode [ 806.419839][T16053] batadv6: entered promiscuous mode [ 806.635974][T16079] lo speed is unknown, defaulting to 1000 [ 806.809895][T16089] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16021'. [ 806.873663][T32037] batman_adv: batadv6: No IGMP Querier present - multicast optimizations disabled [ 806.882937][T32037] batman_adv: batadv6: No MLD Querier present - multicast optimizations disabled [ 807.221753][ T29] audit: type=1326 audit(1747295873.600:46545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.276264][ T29] audit: type=1326 audit(1747295873.600:46546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.300038][ T29] audit: type=1326 audit(1747295873.600:46547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.323803][ T29] audit: type=1326 audit(1747295873.600:46548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.347546][ T29] audit: type=1326 audit(1747295873.600:46549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.371256][ T29] audit: type=1326 audit(1747295873.630:46550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.394859][ T29] audit: type=1326 audit(1747295873.630:46551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.418621][ T29] audit: type=1326 audit(1747295873.630:46552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.442301][ T29] audit: type=1326 audit(1747295873.630:46553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.466583][ T29] audit: type=1326 audit(1747295873.630:46554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.2.16024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 807.635842][T16111] netlink: 'syz.1.16027': attribute type 1 has an invalid length. [ 807.678389][T16111] bond2: entered promiscuous mode [ 807.693497][T16111] 8021q: adding VLAN 0 to HW filter on device bond2 [ 807.704609][T16116] netlink: 3 bytes leftover after parsing attributes in process `syz.1.16027'. [ 807.758278][T16116] batadv3: entered promiscuous mode [ 807.763582][T16116] batadv3: entered allmulticast mode [ 807.770276][T16116] 8021q: adding VLAN 0 to HW filter on device batadv3 [ 807.779143][T16116] bond2: (slave batadv3): making interface the new active one [ 807.787709][T16116] bond2: (slave batadv3): Enslaving as an active interface with an up link [ 807.907551][T16135] netlink: 36 bytes leftover after parsing attributes in process `syz.2.16039'. [ 808.035748][T16153] netlink: 12 bytes leftover after parsing attributes in process `syz.6.16046'. [ 808.100052][T16157] netlink: 'syz.6.16048': attribute type 1 has an invalid length. [ 808.131217][T16157] bond3: entered promiscuous mode [ 808.139100][T16157] 8021q: adding VLAN 0 to HW filter on device bond3 [ 808.151840][T16157] netlink: 3 bytes leftover after parsing attributes in process `syz.6.16048'. [ 808.164179][T16157] batadv7: entered promiscuous mode [ 808.169427][T16157] batadv7: entered allmulticast mode [ 808.175955][T16157] 8021q: adding VLAN 0 to HW filter on device batadv7 [ 808.184371][T16157] bond3: (slave batadv7): making interface the new active one [ 808.192523][T16157] bond3: (slave batadv7): Enslaving as an active interface with an up link [ 808.362641][T16165] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16051'. [ 808.417689][T16168] netlink: 12 bytes leftover after parsing attributes in process `syz.4.16052'. [ 808.757631][T16188] netlink: 'syz.4.16060': attribute type 1 has an invalid length. [ 808.781984][T16188] bond3: entered promiscuous mode [ 808.787653][T16188] 8021q: adding VLAN 0 to HW filter on device bond3 [ 808.801135][T16188] batadv4: entered promiscuous mode [ 808.806501][T16188] batadv4: entered allmulticast mode [ 808.813082][T16188] 8021q: adding VLAN 0 to HW filter on device batadv4 [ 808.821258][T16188] bond3: (slave batadv4): making interface the new active one [ 808.829795][T16188] bond3: (slave batadv4): Enslaving as an active interface with an up link [ 809.522082][T16234] bridge0: port 6(batadv5) entered blocking state [ 809.528703][T16234] bridge0: port 6(batadv5) entered disabled state [ 809.535459][T16234] batadv5: entered allmulticast mode [ 809.541549][T16234] batadv5: entered promiscuous mode [ 809.667868][T16245] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 809.675269][T16245] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 809.885342][T16265] 9pnet_fd: Insufficient options for proto=fd [ 810.035872][T32031] batman_adv: batadv5: No IGMP Querier present - multicast optimizations disabled [ 810.045294][T32031] batman_adv: batadv5: No MLD Querier present - multicast optimizations disabled [ 810.305845][T16313] lo speed is unknown, defaulting to 1000 [ 810.730076][T16339] __nla_validate_parse: 11 callbacks suppressed [ 810.730142][T16339] netlink: 12 bytes leftover after parsing attributes in process `syz.2.16126'. [ 810.788969][T16349] netlink: 8 bytes leftover after parsing attributes in process `syz.6.16130'. [ 810.886722][T16360] netlink: 12 bytes leftover after parsing attributes in process `syz.3.16135'. [ 811.204904][T16381] netlink: 8 bytes leftover after parsing attributes in process `syz.1.16144'. [ 811.252408][T16385] netlink: 12 bytes leftover after parsing attributes in process `syz.4.16146'. [ 811.274386][T16385] bridge0: port 4(batadv5) entered blocking state [ 811.280974][T16385] bridge0: port 4(batadv5) entered disabled state [ 811.301744][T16385] batadv5: entered allmulticast mode [ 811.312391][T16385] batadv5: entered promiscuous mode [ 811.472282][T16413] netlink: 'syz.6.16159': attribute type 1 has an invalid length. [ 811.545736][T16420] netlink: 3 bytes leftover after parsing attributes in process `syz.6.16159'. [ 811.619673][T16425] netlink: 4 bytes leftover after parsing attributes in process `syz.6.16159'. [ 811.660088][T16413] bond4: entered promiscuous mode [ 811.673486][T16413] 8021q: adding VLAN 0 to HW filter on device bond4 [ 811.685301][T16420] batadv8: entered promiscuous mode [ 811.690617][T16420] batadv8: entered allmulticast mode [ 811.697621][T16420] 8021q: adding VLAN 0 to HW filter on device batadv8 [ 811.708480][T16420] bond4: (slave batadv8): making interface the new active one [ 811.716654][T16420] bond4: (slave batadv8): Enslaving as an active interface with an up link [ 811.730845][T16425] team0 (unregistering): Port device team_slave_0 removed [ 811.741214][T16425] team0 (unregistering): Port device team_slave_1 removed [ 811.774438][ T37] batman_adv: batadv5: No IGMP Querier present - multicast optimizations disabled [ 811.783953][ T37] batman_adv: batadv5: No MLD Querier present - multicast optimizations disabled [ 811.786475][T16433] netlink: 12 bytes leftover after parsing attributes in process `syz.3.16165'. [ 811.809029][T16433] bridge0: port 7(batadv6) entered blocking state [ 811.815554][T16433] bridge0: port 7(batadv6) entered disabled state [ 811.822217][T16433] batadv6: entered allmulticast mode [ 811.830865][T16433] batadv6: entered promiscuous mode [ 811.898760][T16441] netlink: 40 bytes leftover after parsing attributes in process `syz.2.16169'. [ 812.003721][T16455] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 812.030808][T16455] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 812.336247][ T37] batman_adv: batadv6: No IGMP Querier present - multicast optimizations disabled [ 812.345628][ T37] batman_adv: batadv6: No MLD Querier present - multicast optimizations disabled [ 812.424728][T16483] netlink: 'syz.3.16180': attribute type 1 has an invalid length. [ 812.439572][T16485] netlink: 12 bytes leftover after parsing attributes in process `syz.4.16181'. [ 812.497872][T16483] bond0: entered promiscuous mode [ 812.526010][T16483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 812.548443][T16485] bridge0: port 5(batadv6) entered blocking state [ 812.555073][T16485] bridge0: port 5(batadv6) entered disabled state [ 812.562164][T16485] batadv6: entered allmulticast mode [ 812.568872][T16485] batadv6: entered promiscuous mode [ 812.580962][T16494] batadv7: entered promiscuous mode [ 812.586464][T16494] batadv7: entered allmulticast mode [ 812.801725][T16494] 8021q: adding VLAN 0 to HW filter on device batadv7 [ 812.947858][T16494] bond0: (slave batadv7): making interface the new active one [ 812.987206][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 812.987221][ T29] audit: type=1326 audit(1747297024.369:46671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16507 comm="syz.4.16182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f870ae969 code=0x7ffc0000 [ 813.017407][ T29] audit: type=1326 audit(1747297024.369:46672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16507 comm="syz.4.16182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f870ae969 code=0x7ffc0000 [ 813.028441][T16494] bond0: (slave batadv7): Enslaving as an active interface with an up link [ 813.041189][ T29] audit: type=1326 audit(1747297024.369:46673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16507 comm="syz.4.16182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7f1f870ae969 code=0x7ffc0000 [ 813.064698][ T37] batman_adv: batadv6: No IGMP Querier present - multicast optimizations disabled [ 813.073399][ T29] audit: type=1326 audit(1747297024.369:46674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16507 comm="syz.4.16182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f870ae969 code=0x7ffc0000 [ 813.082570][ T37] batman_adv: batadv6: No MLD Querier present - multicast optimizations disabled [ 813.106239][ T29] audit: type=1326 audit(1747297024.369:46675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16507 comm="syz.4.16182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f870ae969 code=0x7ffc0000 [ 813.181679][T16483] team0 (unregistering): Port device team_slave_0 removed [ 813.209994][T16483] team0 (unregistering): Port device team_slave_1 removed [ 813.277715][T16534] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 813.285399][T16534] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 813.326122][ T29] audit: type=1107 audit(1747297024.709:46676): pid=16541 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 813.631761][ T29] audit: type=1107 audit(1747297025.009:46677): pid=16594 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 813.677948][ T29] audit: type=1107 audit(1747297025.059:46678): pid=16602 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 813.995881][T16653] 9pnet: Could not find request transport: fd0x0000000000000006 [ 814.072072][ T29] audit: type=1107 audit(1747297025.449:46679): pid=16667 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 814.165133][ T29] audit: type=1326 audit(1747297025.549:46680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16681 comm="syz.1.16222" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 814.364098][T16704] 9pnet: Could not find request transport: fd0x0000000000000006 [ 815.522860][T16738] 9pnet_fd: Insufficient options for proto=fd [ 815.802809][T16749] lo speed is unknown, defaulting to 1000 [ 815.935280][T16767] 9pnet_fd: Insufficient options for proto=fd [ 815.955254][T16770] 9pnet_fd: Insufficient options for proto=fd [ 815.962066][T16772] __nla_validate_parse: 7 callbacks suppressed [ 815.962084][T16772] netlink: 12 bytes leftover after parsing attributes in process `syz.3.16256'. [ 816.009057][T16774] lo speed is unknown, defaulting to 1000 [ 816.231583][T16802] netlink: 'syz.3.16269': attribute type 1 has an invalid length. [ 816.270061][T16802] bond1: entered promiscuous mode [ 816.293679][T16802] 8021q: adding VLAN 0 to HW filter on device bond1 [ 816.308714][T16813] netlink: 3 bytes leftover after parsing attributes in process `syz.3.16269'. [ 816.328924][T16814] netlink: 12 bytes leftover after parsing attributes in process `syz.6.16274'. [ 816.369595][T16802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16802 comm=syz.3.16269 [ 816.384569][T16813] batadv9: entered promiscuous mode [ 816.389860][T16813] batadv9: entered allmulticast mode [ 816.404341][T16813] 8021q: adding VLAN 0 to HW filter on device batadv9 [ 816.412665][T16813] bond1: (slave batadv9): making interface the new active one [ 816.437354][T16820] netlink: 12 bytes leftover after parsing attributes in process `syz.2.16275'. [ 816.437446][T16824] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16269'. [ 816.462169][T16813] bond1: (slave batadv9): Enslaving as an active interface with an up link [ 816.665476][T16842] lo speed is unknown, defaulting to 1000 [ 816.672687][T16846] netlink: 'syz.4.16285': attribute type 1 has an invalid length. [ 816.707148][T16846] bond4: entered promiscuous mode [ 816.712429][T16846] 8021q: adding VLAN 0 to HW filter on device bond4 [ 816.808030][T16860] netlink: 'syz.6.16289': attribute type 1 has an invalid length. [ 816.831462][T16860] bond5: entered promiscuous mode [ 816.837079][T16860] 8021q: adding VLAN 0 to HW filter on device bond5 [ 816.849170][T16860] netlink: 3 bytes leftover after parsing attributes in process `syz.6.16289'. [ 816.862239][T16860] batadv9: entered promiscuous mode [ 816.867566][T16860] batadv9: entered allmulticast mode [ 816.874243][T16860] 8021q: adding VLAN 0 to HW filter on device batadv9 [ 816.884772][T16860] bond5: (slave batadv9): making interface the new active one [ 816.893025][T16860] bond5: (slave batadv9): Enslaving as an active interface with an up link [ 816.904644][T16869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16869 comm=syz.6.16289 [ 816.945028][T16874] 9pnet_fd: Insufficient options for proto=fd [ 816.952453][T16860] netlink: 4 bytes leftover after parsing attributes in process `syz.6.16289'. [ 817.011206][T16881] netlink: 'syz.6.16297': attribute type 1 has an invalid length. [ 817.026334][T16881] bond6: entered promiscuous mode [ 817.031630][T16881] 8021q: adding VLAN 0 to HW filter on device bond6 [ 817.071807][T16883] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 817.083528][T16883] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 817.145783][T16889] lo speed is unknown, defaulting to 1000 [ 817.227197][T16902] 9pnet_fd: Insufficient options for proto=fd [ 817.282622][T16910] netlink: 'syz.3.16309': attribute type 1 has an invalid length. [ 817.299633][T16910] bond2: entered promiscuous mode [ 817.306592][T16910] 8021q: adding VLAN 0 to HW filter on device bond2 [ 817.336505][T16917] netlink: 12 bytes leftover after parsing attributes in process `syz.3.16312'. [ 817.349346][T16917] bridge0: port 8(batadv10) entered blocking state [ 817.355991][T16917] bridge0: port 8(batadv10) entered disabled state [ 817.362652][T16917] batadv10: entered allmulticast mode [ 817.368860][T16917] batadv10: entered promiscuous mode [ 817.484971][T16932] netlink: 12 bytes leftover after parsing attributes in process `syz.1.16319'. [ 817.495477][T16933] 9pnet_fd: Insufficient options for proto=fd [ 817.503924][T16928] lo speed is unknown, defaulting to 1000 [ 817.720189][T16950] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16322'. [ 817.881282][T32010] batman_adv: batadv10: No IGMP Querier present - multicast optimizations disabled [ 817.890853][T32010] batman_adv: batadv10: No MLD Querier present - multicast optimizations disabled [ 818.187469][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 818.187486][ T29] audit: type=1326 audit(1747298174.574:46750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.2.16327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 818.217477][ T29] audit: type=1326 audit(1747298174.574:46751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.2.16327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 818.644750][T16973] 9pnet_fd: Insufficient options for proto=fd [ 818.725684][T16975] lo speed is unknown, defaulting to 1000 [ 818.848547][ T29] audit: type=1326 audit(1747298175.234:46752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16983 comm="syz.1.16341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 818.872489][ T29] audit: type=1326 audit(1747298175.234:46753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16983 comm="syz.1.16341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 818.896220][ T29] audit: type=1326 audit(1747298175.234:46754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16983 comm="syz.1.16341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 818.919968][ T29] audit: type=1326 audit(1747298175.234:46755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16983 comm="syz.1.16341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 818.943826][ T29] audit: type=1326 audit(1747298175.234:46756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16983 comm="syz.1.16341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 818.967468][ T29] audit: type=1326 audit(1747298175.234:46757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16983 comm="syz.1.16341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 819.026497][ T29] audit: type=1400 audit(1747298175.334:46758): avc: denied { mounton } for pid=16986 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 819.048446][ T29] audit: type=1326 audit(1747298175.384:46759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16983 comm="syz.1.16341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 819.226230][T16986] lo speed is unknown, defaulting to 1000 [ 819.337862][T16986] chnl_net:caif_netlink_parms(): no params data found [ 819.418297][T17032] batadv7: entered promiscuous mode [ 819.423756][T17032] batadv7: entered allmulticast mode [ 819.646710][T16986] bridge0: port 1(bridge_slave_0) entered blocking state [ 819.654068][T16986] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.679551][T16986] bridge_slave_0: entered allmulticast mode [ 819.695721][T16986] bridge_slave_0: entered promiscuous mode [ 819.714788][T16986] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.721970][T16986] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.740625][T16986] bridge_slave_1: entered allmulticast mode [ 819.750967][T16986] bridge_slave_1: entered promiscuous mode [ 819.831197][T17056] netlink: 'syz.1.16365': attribute type 1 has an invalid length. [ 819.874687][T17056] bond3: entered promiscuous mode [ 819.883636][T17056] 8021q: adding VLAN 0 to HW filter on device bond3 [ 819.929428][T17056] batadv5: entered promiscuous mode [ 819.934736][T17056] batadv5: entered allmulticast mode [ 819.950800][T17056] 8021q: adding VLAN 0 to HW filter on device batadv5 [ 819.962211][T17056] bond3: (slave batadv5): making interface the new active one [ 819.985405][T17056] bond3: (slave batadv5): Enslaving as an active interface with an up link [ 819.995960][T16986] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 820.045238][T16986] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 820.155066][T16986] team0: Port device team_slave_0 added [ 820.195335][T16986] team0: Port device team_slave_1 added [ 820.292074][T16986] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 820.299325][T16986] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 820.325323][T16986] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 820.470264][T16986] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 820.477280][T16986] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 820.503572][T16986] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 820.749047][T17082] netlink: 'syz.1.16376': attribute type 1 has an invalid length. [ 820.859311][T16986] hsr_slave_0: entered promiscuous mode [ 820.872434][T16986] hsr_slave_1: entered promiscuous mode [ 820.885096][T16986] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 820.900386][T16986] Cannot create hsr debugfs directory [ 820.918393][T17082] bond4: entered promiscuous mode [ 820.929418][T17082] 8021q: adding VLAN 0 to HW filter on device bond4 [ 820.952980][T17085] batadv6: entered promiscuous mode [ 820.958473][T17085] batadv6: entered allmulticast mode [ 820.988930][T17085] 8021q: adding VLAN 0 to HW filter on device batadv6 [ 821.013788][T17085] bond4: (slave batadv6): making interface the new active one [ 821.025203][T17085] bond4: (slave batadv6): Enslaving as an active interface with an up link [ 821.290245][T16986] netdevsim netdevsim6 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 821.300114][T16986] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 821.456871][T16986] netdevsim netdevsim6 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 821.466874][T16986] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 821.536706][T16986] netdevsim netdevsim6 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 821.546706][T16986] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 821.684572][T16986] netdevsim netdevsim6 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 821.694399][T16986] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 821.714324][T17133] __nla_validate_parse: 6 callbacks suppressed [ 821.714339][T17133] netlink: 12 bytes leftover after parsing attributes in process `syz.4.16396'. [ 821.743312][T17135] netlink: 12 bytes leftover after parsing attributes in process `syz.2.16397'. [ 821.768021][T17133] bridge0: port 6(batadv7) entered blocking state [ 821.774635][T17133] bridge0: port 6(batadv7) entered disabled state [ 821.781352][T17133] batadv7: entered allmulticast mode [ 821.787449][T17133] batadv7: entered promiscuous mode [ 821.838913][T16986] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 821.864630][T16986] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 821.879065][T16986] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 821.904081][T16986] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 822.037083][T16986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 822.081110][T16986] 8021q: adding VLAN 0 to HW filter on device team0 [ 822.109622][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.116771][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.143510][T17164] netlink: 16 bytes leftover after parsing attributes in process `syz.1.16405'. [ 822.176338][T32010] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.183519][T32010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.193688][T17162] netlink: 8 bytes leftover after parsing attributes in process `syz.3.16402'. [ 822.294299][T32010] batman_adv: batadv7: No IGMP Querier present - multicast optimizations disabled [ 822.303716][T32010] batman_adv: batadv7: No MLD Querier present - multicast optimizations disabled [ 822.326531][T17177] netlink: 12 bytes leftover after parsing attributes in process `syz.1.16408'. [ 822.359492][T17177] bridge0: port 4(batadv7) entered blocking state [ 822.366234][T17177] bridge0: port 4(batadv7) entered disabled state [ 822.393034][T17177] batadv7: entered allmulticast mode [ 822.403884][T17177] batadv7: entered promiscuous mode [ 822.440049][T16986] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 822.578134][T17209] netlink: 'syz.1.16413': attribute type 1 has an invalid length. [ 822.625470][T17209] bond5: entered promiscuous mode [ 822.633500][T17209] 8021q: adding VLAN 0 to HW filter on device bond5 [ 822.689212][T17209] netlink: 3 bytes leftover after parsing attributes in process `syz.1.16413'. [ 822.733675][T17209] batadv8: entered promiscuous mode [ 822.738953][T17209] batadv8: entered allmulticast mode [ 822.747268][T17209] 8021q: adding VLAN 0 to HW filter on device batadv8 [ 822.755947][T17209] bond5: (slave batadv8): making interface the new active one [ 822.764255][T17209] bond5: (slave batadv8): Enslaving as an active interface with an up link [ 822.777409][T17225] netlink: 'syz.4.16415': attribute type 1 has an invalid length. [ 822.784721][T17209] netlink: 4 bytes leftover after parsing attributes in process `syz.1.16413'. [ 822.800308][T17225] bond5: entered promiscuous mode [ 822.812861][T17225] 8021q: adding VLAN 0 to HW filter on device bond5 [ 822.822900][T17225] netlink: 3 bytes leftover after parsing attributes in process `syz.4.16415'. [ 822.848519][T17225] batadv8: entered promiscuous mode [ 822.853906][T17225] batadv8: entered allmulticast mode [ 822.875709][T17225] 8021q: adding VLAN 0 to HW filter on device batadv8 [ 822.888323][T17225] bond5: (slave batadv8): making interface the new active one [ 822.896825][T17225] bond5: (slave batadv8): Enslaving as an active interface with an up link [ 822.900382][T32037] batman_adv: batadv7: No IGMP Querier present - multicast optimizations disabled [ 822.914961][T32037] batman_adv: batadv7: No MLD Querier present - multicast optimizations disabled [ 822.968126][T16986] veth0_vlan: entered promiscuous mode [ 822.983716][T17238] netlink: 4 bytes leftover after parsing attributes in process `syz.4.16415'. [ 822.997385][T16986] veth1_vlan: entered promiscuous mode [ 823.028560][T17245] netlink: 12 bytes leftover after parsing attributes in process `syz.2.16420'. [ 823.064239][T16986] veth0_macvtap: entered promiscuous mode [ 823.105948][T16986] veth1_macvtap: entered promiscuous mode [ 823.147768][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 823.158436][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.168321][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 823.178889][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.188771][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 823.199356][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.209291][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 823.219880][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.229767][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 823.240276][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.250244][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 823.260690][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.290301][T16986] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 823.299362][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 823.310025][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.320056][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 823.330536][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.340425][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 823.350899][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.360831][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 823.371325][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.381184][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 823.391665][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.401558][T16986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 823.412019][T16986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.423549][T16986] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 823.438390][T17253] lo speed is unknown, defaulting to 1000 [ 823.520814][T16986] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 823.529730][T16986] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 823.538518][T16986] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 823.547379][T16986] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 823.669517][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 823.669548][ T29] audit: type=1400 audit(1747299325.052:46950): avc: denied { mounton } for pid=16986 comm="syz-executor" path="/root/syzkaller.iIt5nQ/syz-tmp" dev="sda1" ino=2099 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 823.736996][ T29] audit: type=1400 audit(1747299325.092:46951): avc: denied { mount } for pid=16986 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 823.759628][ T29] audit: type=1400 audit(1747299325.092:46952): avc: denied { mount } for pid=16986 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 823.781820][ T29] audit: type=1400 audit(1747299325.092:46953): avc: denied { mounton } for pid=16986 comm="syz-executor" path="/root/syzkaller.iIt5nQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 823.808847][ T29] audit: type=1400 audit(1747299325.092:46954): avc: denied { mounton } for pid=16986 comm="syz-executor" path="/root/syzkaller.iIt5nQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=176804 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 823.836843][ T29] audit: type=1400 audit(1747299325.092:46955): avc: denied { unmount } for pid=16986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 823.856799][ T29] audit: type=1400 audit(1747299325.102:46956): avc: denied { mounton } for pid=16986 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 823.880123][ T29] audit: type=1400 audit(1747299325.102:46957): avc: denied { mount } for pid=16986 comm="syz-executor" name="/" dev="gadgetfs" ino=4285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 823.909091][T17303] netlink: 'syz.4.16433': attribute type 1 has an invalid length. [ 823.926875][ T29] audit: type=1400 audit(1747299554.310:46958): avc: denied { write } for pid=16986 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=396 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 823.954103][ T29] audit: type=1400 audit(1747299554.310:46959): avc: denied { open } for pid=16986 comm="syz-executor" path="/syzcgroup/cpu/syz6/cgroup.procs" dev="cgroup" ino=396 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 824.030427][T17303] bond6: entered promiscuous mode [ 824.036393][T17303] 8021q: adding VLAN 0 to HW filter on device bond6 [ 824.056668][T17307] batadv9: entered promiscuous mode [ 824.061969][T17307] batadv9: entered allmulticast mode [ 824.076736][T17307] 8021q: adding VLAN 0 to HW filter on device batadv9 [ 824.094508][T17307] bond6: (slave batadv9): making interface the new active one [ 824.113474][T17307] bond6: (slave batadv9): Enslaving as an active interface with an up link [ 824.306703][T17327] netlink: 'syz.2.16439': attribute type 1 has an invalid length. [ 824.334693][T17327] bond2: entered promiscuous mode [ 824.345211][T17327] 8021q: adding VLAN 0 to HW filter on device bond2 [ 824.364466][T17327] batadv3: entered promiscuous mode [ 824.369730][T17327] batadv3: entered allmulticast mode [ 824.376396][T17327] 8021q: adding VLAN 0 to HW filter on device batadv3 [ 824.384894][T17327] bond2: (slave batadv3): making interface the new active one [ 824.393310][T17327] bond2: (slave batadv3): Enslaving as an active interface with an up link [ 825.133381][T17410] 9pnet_fd: Insufficient options for proto=fd [ 825.232950][T17424] netlink: 'syz.6.16465': attribute type 1 has an invalid length. [ 825.285268][T17424] batadv1: entered promiscuous mode [ 825.290546][T17424] batadv1: entered allmulticast mode [ 825.439524][T17424] team0 (unregistering): Port device team_slave_0 removed [ 825.453108][T17424] team0 (unregistering): Port device team_slave_1 removed [ 825.469357][T17453] 9pnet_fd: Insufficient options for proto=fd [ 825.502099][T17451] lo speed is unknown, defaulting to 1000 [ 826.345595][T17570] netlink: 'syz.1.16504': attribute type 1 has an invalid length. [ 826.371118][T17570] bond6: entered promiscuous mode [ 826.376866][T17570] 8021q: adding VLAN 0 to HW filter on device bond6 [ 826.392023][T17570] batadv9: entered promiscuous mode [ 826.397407][T17570] batadv9: entered allmulticast mode [ 826.404576][T17570] 8021q: adding VLAN 0 to HW filter on device batadv9 [ 826.415482][T17570] bond6: (slave batadv9): making interface the new active one [ 826.424053][T17570] bond6: (slave batadv9): Enslaving as an active interface with an up link [ 826.449903][T17570] team0 (unregistering): Port device team_slave_0 removed [ 826.471437][T17570] team0 (unregistering): Port device team_slave_1 removed [ 826.856434][T17646] netlink: 'syz.4.16520': attribute type 1 has an invalid length. [ 826.882601][T17646] bond7: entered promiscuous mode [ 826.893833][T17646] 8021q: adding VLAN 0 to HW filter on device bond7 [ 826.921722][T17646] __nla_validate_parse: 13 callbacks suppressed [ 826.921745][T17646] netlink: 3 bytes leftover after parsing attributes in process `syz.4.16520'. [ 826.940846][T17646] batadv10: entered promiscuous mode [ 826.946217][T17646] batadv10: entered allmulticast mode [ 826.963190][T17646] 8021q: adding VLAN 0 to HW filter on device batadv10 [ 826.972046][T17646] bond7: (slave batadv10): making interface the new active one [ 826.989546][T17646] bond7: (slave batadv10): Enslaving as an active interface with an up link [ 827.022056][T17646] netlink: 4 bytes leftover after parsing attributes in process `syz.4.16520'. [ 827.201866][T17691] netlink: 12 bytes leftover after parsing attributes in process `syz.4.16529'. [ 827.260992][T17691] bridge0: port 7(batadv11) entered blocking state [ 827.267885][T17691] bridge0: port 7(batadv11) entered disabled state [ 827.282572][T17691] batadv11: entered allmulticast mode [ 827.303750][T17691] batadv11: entered promiscuous mode [ 827.389697][T17716] netlink: 12 bytes leftover after parsing attributes in process `syz.6.16534'. [ 827.438919][T17725] netlink: 'syz.4.16536': attribute type 1 has an invalid length. [ 827.447223][T17725] netlink: 3 bytes leftover after parsing attributes in process `syz.4.16536'. [ 827.460644][T17725] batadv12: entered promiscuous mode [ 827.466144][T17725] batadv12: entered allmulticast mode [ 827.745963][T17769] 9pnet: Could not find request transport: fd0x0000000000000006 [ 827.777076][T32037] batman_adv: batadv11: No IGMP Querier present - multicast optimizations disabled [ 827.786671][T32037] batman_adv: batadv11: No MLD Querier present - multicast optimizations disabled [ 827.832536][T17786] netlink: 12 bytes leftover after parsing attributes in process `syz.6.16548'. [ 828.020729][T17809] netlink: 'syz.3.16555': attribute type 1 has an invalid length. [ 828.098687][T17809] bond3: entered promiscuous mode [ 828.114335][T17809] 8021q: adding VLAN 0 to HW filter on device bond3 [ 828.125795][T17828] 9pnet: Could not find request transport: fd0x0000000000000006 [ 828.230722][T17809] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16555'. [ 828.481663][T17851] netlink: 40 bytes leftover after parsing attributes in process `syz.3.16567'. [ 828.681001][T17857] 9pnet: Could not find request transport: fd0x0000000000000006 [ 828.691307][T17862] netlink: 'syz.2.16573': attribute type 1 has an invalid length. [ 828.759782][T17862] bond3: entered promiscuous mode [ 828.780438][T17862] 8021q: adding VLAN 0 to HW filter on device bond3 [ 828.857839][T17862] netlink: 4 bytes leftover after parsing attributes in process `syz.2.16573'. [ 829.413276][T17894] netlink: 84 bytes leftover after parsing attributes in process `syz.1.16582'. [ 829.431534][T17899] 9pnet_fd: Insufficient options for proto=fd [ 829.804501][T17944] netlink: 'syz.1.16593': attribute type 1 has an invalid length. [ 829.812397][T17944] netlink: 'syz.1.16593': attribute type 2 has an invalid length. [ 829.837507][T17948] FAULT_INJECTION: forcing a failure. [ 829.837507][T17948] name failslab, interval 1, probability 0, space 0, times 0 [ 829.850329][T17948] CPU: 0 UID: 0 PID: 17948 Comm: syz.1.16594 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 829.850363][T17948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 829.850376][T17948] Call Trace: [ 829.850384][T17948] [ 829.850393][T17948] __dump_stack+0x1d/0x30 [ 829.850498][T17948] dump_stack_lvl+0xe8/0x140 [ 829.850526][T17948] dump_stack+0x15/0x1b [ 829.850548][T17948] should_fail_ex+0x265/0x280 [ 829.850593][T17948] should_failslab+0x8c/0xb0 [ 829.850707][T17948] kmem_cache_alloc_node_noprof+0x57/0x320 [ 829.850736][T17948] ? __alloc_skb+0x101/0x320 [ 829.850778][T17948] __alloc_skb+0x101/0x320 [ 829.850860][T17948] netlink_alloc_large_skb+0xba/0xf0 [ 829.850933][T17948] netlink_sendmsg+0x3cf/0x6b0 [ 829.850981][T17948] ? __pfx_netlink_sendmsg+0x10/0x10 [ 829.851002][T17948] __sock_sendmsg+0x142/0x180 [ 829.851080][T17948] ____sys_sendmsg+0x31e/0x4e0 [ 829.851112][T17948] ___sys_sendmsg+0x17b/0x1d0 [ 829.851157][T17948] __x64_sys_sendmsg+0xd4/0x160 [ 829.851207][T17948] x64_sys_call+0x2999/0x2fb0 [ 829.851235][T17948] do_syscall_64+0xd0/0x1a0 [ 829.851337][T17948] ? clear_bhb_loop+0x40/0x90 [ 829.851407][T17948] ? clear_bhb_loop+0x40/0x90 [ 829.851447][T17948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 829.851482][T17948] RIP: 0033:0x7fb0daf1e969 [ 829.851516][T17948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 829.851592][T17948] RSP: 002b:00007fb0d9587038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 829.851618][T17948] RAX: ffffffffffffffda RBX: 00007fb0db145fa0 RCX: 00007fb0daf1e969 [ 829.851635][T17948] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000003 [ 829.851651][T17948] RBP: 00007fb0d9587090 R08: 0000000000000000 R09: 0000000000000000 [ 829.851667][T17948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 829.851709][T17948] R13: 0000000000000000 R14: 00007fb0db145fa0 R15: 00007ffc659301a8 [ 829.851735][T17948] [ 830.129597][T17981] 9pnet_fd: Insufficient options for proto=fd [ 830.152785][T17978] bridge0: port 5(batadv10) entered blocking state [ 830.159670][T17978] bridge0: port 5(batadv10) entered disabled state [ 830.189794][T17978] batadv10: entered allmulticast mode [ 830.196108][T17978] batadv10: entered promiscuous mode [ 830.279211][T18001] batadv4: entered promiscuous mode [ 830.284584][T18001] batadv4: entered allmulticast mode [ 830.340746][T18012] FAULT_INJECTION: forcing a failure. [ 830.340746][T18012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 830.353996][T18012] CPU: 1 UID: 0 PID: 18012 Comm: syz.6.16608 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 830.354052][T18012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 830.354064][T18012] Call Trace: [ 830.354070][T18012] [ 830.354077][T18012] __dump_stack+0x1d/0x30 [ 830.354103][T18012] dump_stack_lvl+0xe8/0x140 [ 830.354173][T18012] dump_stack+0x15/0x1b [ 830.354189][T18012] should_fail_ex+0x265/0x280 [ 830.354229][T18012] should_fail+0xb/0x20 [ 830.354270][T18012] should_fail_usercopy+0x1a/0x20 [ 830.354290][T18012] _copy_from_iter+0xcf/0xdd0 [ 830.354312][T18012] ? __build_skb_around+0x1a0/0x200 [ 830.354354][T18012] ? __alloc_skb+0x223/0x320 [ 830.354400][T18012] netlink_sendmsg+0x471/0x6b0 [ 830.354427][T18012] ? __pfx_netlink_sendmsg+0x10/0x10 [ 830.354446][T18012] __sock_sendmsg+0x142/0x180 [ 830.354542][T18012] ____sys_sendmsg+0x31e/0x4e0 [ 830.354589][T18012] ___sys_sendmsg+0x17b/0x1d0 [ 830.354637][T18012] __x64_sys_sendmsg+0xd4/0x160 [ 830.354671][T18012] x64_sys_call+0x2999/0x2fb0 [ 830.354768][T18012] do_syscall_64+0xd0/0x1a0 [ 830.354795][T18012] ? clear_bhb_loop+0x40/0x90 [ 830.354815][T18012] ? clear_bhb_loop+0x40/0x90 [ 830.354837][T18012] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.354892][T18012] RIP: 0033:0x7f9e898de969 [ 830.354909][T18012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 830.354926][T18012] RSP: 002b:00007f9e87f47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 830.354944][T18012] RAX: ffffffffffffffda RBX: 00007f9e89b05fa0 RCX: 00007f9e898de969 [ 830.354956][T18012] RDX: 0000000020000800 RSI: 0000200000000080 RDI: 0000000000000003 [ 830.354973][T18012] RBP: 00007f9e87f47090 R08: 0000000000000000 R09: 0000000000000000 [ 830.355045][T18012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.355061][T18012] R13: 0000000000000000 R14: 00007f9e89b05fa0 R15: 00007ffd0956ed58 [ 830.355083][T18012] [ 830.617125][T18022] 9pnet_fd: Insufficient options for proto=fd [ 830.639587][T32037] batman_adv: batadv10: No IGMP Querier present - multicast optimizations disabled [ 830.649070][T32037] batman_adv: batadv10: No MLD Querier present - multicast optimizations disabled [ 830.876141][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 830.876159][ T29] audit: type=1400 audit(1747301622.262:46961): avc: denied { read write } for pid=18059 comm="syz.1.16620" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 830.907424][ T29] audit: type=1400 audit(1747301622.292:46962): avc: denied { open } for pid=18059 comm="syz.1.16620" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 831.011969][T18080] 9pnet_fd: Insufficient options for proto=fd [ 831.044209][T18077] batadv1: entered promiscuous mode [ 831.049619][T18077] batadv1: entered allmulticast mode [ 831.109865][T18097] FAULT_INJECTION: forcing a failure. [ 831.109865][T18097] name failslab, interval 1, probability 0, space 0, times 0 [ 831.122624][T18097] CPU: 1 UID: 0 PID: 18097 Comm: syz.1.16626 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 831.122662][T18097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 831.122682][T18097] Call Trace: [ 831.122691][T18097] [ 831.122702][T18097] __dump_stack+0x1d/0x30 [ 831.122729][T18097] dump_stack_lvl+0xe8/0x140 [ 831.122811][T18097] dump_stack+0x15/0x1b [ 831.122833][T18097] should_fail_ex+0x265/0x280 [ 831.122874][T18097] ? __pfx_resume_store+0x10/0x10 [ 831.122952][T18097] should_failslab+0x8c/0xb0 [ 831.122991][T18097] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 831.123020][T18097] ? resume_store+0xf2/0x3d0 [ 831.123101][T18097] ? __pfx_resume_store+0x10/0x10 [ 831.123131][T18097] kstrndup+0x80/0x130 [ 831.123199][T18097] resume_store+0xf2/0x3d0 [ 831.123227][T18097] ? _copy_from_iter+0x16d/0xdd0 [ 831.123252][T18097] ? should_fail_ex+0xdb/0x280 [ 831.123282][T18097] ? __pfx_resume_store+0x10/0x10 [ 831.123355][T18097] kobj_attr_store+0x4a/0x70 [ 831.123392][T18097] ? __pfx_kobj_attr_store+0x10/0x10 [ 831.123429][T18097] sysfs_kf_write+0xfb/0x120 [ 831.123477][T18097] ? __pfx_sysfs_kf_write+0x10/0x10 [ 831.123499][T18097] kernfs_fop_write_iter+0x1be/0x2d0 [ 831.123566][T18097] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 831.123638][T18097] vfs_write+0x49d/0x8d0 [ 831.123734][T18097] ksys_write+0xda/0x1a0 [ 831.123768][T18097] __x64_sys_write+0x40/0x50 [ 831.123793][T18097] x64_sys_call+0x2cdd/0x2fb0 [ 831.123880][T18097] do_syscall_64+0xd0/0x1a0 [ 831.123908][T18097] ? clear_bhb_loop+0x40/0x90 [ 831.123935][T18097] ? clear_bhb_loop+0x40/0x90 [ 831.123997][T18097] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 831.124018][T18097] RIP: 0033:0x7fb0daf1e969 [ 831.124033][T18097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 831.124054][T18097] RSP: 002b:00007fb0d9587038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 831.124078][T18097] RAX: ffffffffffffffda RBX: 00007fb0db145fa0 RCX: 00007fb0daf1e969 [ 831.124105][T18097] RDX: 0000000000000012 RSI: 0000200000000000 RDI: 0000000000000006 [ 831.124154][T18097] RBP: 00007fb0d9587090 R08: 0000000000000000 R09: 0000000000000000 [ 831.124169][T18097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 831.124184][T18097] R13: 0000000000000000 R14: 00007fb0db145fa0 R15: 00007ffc659301a8 [ 831.124203][T18097] [ 831.626681][T18140] 9pnet_fd: Insufficient options for proto=fd [ 831.695959][ T29] audit: type=1326 audit(1747301852.072:46963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 831.719765][ T29] audit: type=1326 audit(1747301852.072:46964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 831.743455][ T29] audit: type=1326 audit(1747301852.072:46965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 831.767178][ T29] audit: type=1326 audit(1747301852.082:46966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 831.791030][ T29] audit: type=1326 audit(1747301852.082:46967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 831.815156][ T29] audit: type=1326 audit(1747301852.082:46968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 831.838938][ T29] audit: type=1326 audit(1747301852.082:46969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 831.862882][ T29] audit: type=1326 audit(1747301852.082:46970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18151 comm="syz.1.16640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 832.129931][T18176] netlink: 'syz.1.16646': attribute type 1 has an invalid length. [ 832.175993][T18176] bond7: entered promiscuous mode [ 832.193028][T18176] 8021q: adding VLAN 0 to HW filter on device bond7 [ 832.217413][T18182] __nla_validate_parse: 5 callbacks suppressed [ 832.217477][T18182] netlink: 3 bytes leftover after parsing attributes in process `syz.1.16646'. [ 832.292435][T18182] batadv11: entered promiscuous mode [ 832.297858][T18182] batadv11: entered allmulticast mode [ 832.343281][T18182] 8021q: adding VLAN 0 to HW filter on device batadv11 [ 832.381464][T18182] bond7: (slave batadv11): making interface the new active one [ 832.413169][T18182] bond7: (slave batadv11): Enslaving as an active interface with an up link [ 832.555005][T18199] 9pnet_fd: Insufficient options for proto=fd [ 833.347172][T18247] lo speed is unknown, defaulting to 1000 [ 833.444014][T18259] netlink: 8 bytes leftover after parsing attributes in process `syz.2.16667'. [ 833.524026][T18268] netlink: 'syz.3.16672': attribute type 1 has an invalid length. [ 833.543993][T18268] netlink: 3 bytes leftover after parsing attributes in process `syz.3.16672'. [ 833.575547][T18268] batadv11: entered promiscuous mode [ 833.580913][T18268] batadv11: entered allmulticast mode [ 833.692514][T18277] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16672'. [ 833.722954][T18287] netlink: 'syz.1.16676': attribute type 1 has an invalid length. [ 833.739423][T18287] bond8: entered promiscuous mode [ 833.751649][T18287] 8021q: adding VLAN 0 to HW filter on device bond8 [ 833.766807][T18287] netlink: 3 bytes leftover after parsing attributes in process `syz.1.16676'. [ 833.829047][T18287] batadv12: entered promiscuous mode [ 833.834452][T18287] batadv12: entered allmulticast mode [ 833.841438][T18287] 8021q: adding VLAN 0 to HW filter on device batadv12 [ 833.849875][T18287] bond8: (slave batadv12): making interface the new active one [ 833.858378][T18287] bond8: (slave batadv12): Enslaving as an active interface with an up link [ 834.030277][T18301] lo speed is unknown, defaulting to 1000 [ 835.178127][T18366] FAULT_INJECTION: forcing a failure. [ 835.178127][T18366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 835.191667][T18366] CPU: 0 UID: 0 PID: 18366 Comm: syz.4.16693 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 835.191734][T18366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 835.191752][T18366] Call Trace: [ 835.191761][T18366] [ 835.191770][T18366] __dump_stack+0x1d/0x30 [ 835.191794][T18366] dump_stack_lvl+0xe8/0x140 [ 835.191817][T18366] dump_stack+0x15/0x1b [ 835.191838][T18366] should_fail_ex+0x265/0x280 [ 835.191917][T18366] should_fail_alloc_page+0xf2/0x100 [ 835.192011][T18366] __alloc_frozen_pages_noprof+0xff/0x360 [ 835.192093][T18366] alloc_pages_mpol+0xb3/0x250 [ 835.192124][T18366] alloc_pages_noprof+0x90/0x130 [ 835.192200][T18366] pte_alloc_one+0x2a/0x110 [ 835.192224][T18366] __pte_alloc+0x32/0x290 [ 835.192253][T18366] handle_mm_fault+0x1d74/0x2ae0 [ 835.192357][T18366] ? mas_walk+0xf2/0x120 [ 835.192394][T18366] do_user_addr_fault+0x636/0x1090 [ 835.192440][T18366] exc_page_fault+0x54/0xc0 [ 835.192527][T18366] asm_exc_page_fault+0x26/0x30 [ 835.192619][T18366] RIP: 0033:0x7f1f86f70cc3 [ 835.192639][T18366] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 835.192662][T18366] RSP: 002b:00007f1f857164a0 EFLAGS: 00010206 [ 835.192754][T18366] RAX: 0000000000000000 RBX: 00007f1f85716540 RCX: 00007f1f7d2f7000 [ 835.192771][T18366] RDX: 00007f1f857166e0 RSI: 0000000000000037 RDI: 00007f1f857165e0 [ 835.192787][T18366] RBP: 000000000000013c R08: 0000000000000008 R09: 00000000000000ba [ 835.192799][T18366] R10: 00000000000000c8 R11: 00007f1f85716540 R12: 00007f1f85716540 [ 835.192827][T18366] R13: 00007f1f8714bfc0 R14: 00000000000000eb R15: 00007f1f857165e0 [ 835.192853][T18366] [ 835.192865][T18366] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 835.812577][T18438] netlink: 52 bytes leftover after parsing attributes in process `syz.1.16701'. [ 835.840599][T18438] netlink: 52 bytes leftover after parsing attributes in process `syz.1.16701'. [ 835.895764][T18438] netlink: 52 bytes leftover after parsing attributes in process `syz.1.16701'. [ 835.913624][T18438] netlink: 52 bytes leftover after parsing attributes in process `syz.1.16701'. [ 835.926872][ T29] kauditd_printk_skb: 113 callbacks suppressed [ 835.926890][ T29] audit: type=1400 audit(1747302543.316:47084): avc: denied { connect } for pid=18413 comm="syz.4.16700" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 835.979342][T18438] netlink: 52 bytes leftover after parsing attributes in process `syz.1.16701'. [ 836.139350][T18477] netlink: 'syz.1.16705': attribute type 1 has an invalid length. [ 836.155211][T18477] bond9: entered promiscuous mode [ 836.160678][T18477] 8021q: adding VLAN 0 to HW filter on device bond9 [ 836.175188][T18477] batadv13: entered promiscuous mode [ 836.180542][T18477] batadv13: entered allmulticast mode [ 836.198757][T18477] 8021q: adding VLAN 0 to HW filter on device batadv13 [ 836.222415][T18477] bond9: (slave batadv13): making interface the new active one [ 836.290753][T18477] bond9: (slave batadv13): Enslaving as an active interface with an up link [ 836.573961][T18488] FAULT_INJECTION: forcing a failure. [ 836.573961][T18488] name failslab, interval 1, probability 0, space 0, times 0 [ 836.586752][T18488] CPU: 1 UID: 0 PID: 18488 Comm: syz.1.16708 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 836.586786][T18488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 836.586802][T18488] Call Trace: [ 836.586810][T18488] [ 836.586819][T18488] __dump_stack+0x1d/0x30 [ 836.586845][T18488] dump_stack_lvl+0xe8/0x140 [ 836.586895][T18488] dump_stack+0x15/0x1b [ 836.586911][T18488] should_fail_ex+0x265/0x280 [ 836.586982][T18488] should_failslab+0x8c/0xb0 [ 836.587020][T18488] kmem_cache_alloc_noprof+0x50/0x310 [ 836.587045][T18488] ? getname_flags+0x80/0x3b0 [ 836.587078][T18488] getname_flags+0x80/0x3b0 [ 836.587123][T18488] __se_sys_move_mount+0x16d/0x440 [ 836.587163][T18488] __x64_sys_move_mount+0x67/0x80 [ 836.587246][T18488] x64_sys_call+0x1f00/0x2fb0 [ 836.587267][T18488] do_syscall_64+0xd0/0x1a0 [ 836.587290][T18488] ? clear_bhb_loop+0x40/0x90 [ 836.587315][T18488] ? clear_bhb_loop+0x40/0x90 [ 836.587339][T18488] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 836.587366][T18488] RIP: 0033:0x7fb0daf1e969 [ 836.587385][T18488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 836.587450][T18488] RSP: 002b:00007fb0d9587038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ad [ 836.587471][T18488] RAX: ffffffffffffffda RBX: 00007fb0db145fa0 RCX: 00007fb0daf1e969 [ 836.587483][T18488] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffffffffffffff [ 836.587495][T18488] RBP: 00007fb0d9587090 R08: 0000000000000200 R09: 0000000000000000 [ 836.587506][T18488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 836.587518][T18488] R13: 0000000000000000 R14: 00007fb0db145fa0 R15: 00007ffc659301a8 [ 836.587543][T18488] [ 836.901956][ T29] audit: type=1400 audit(1747302773.278:47085): avc: denied { create } for pid=18506 comm="syz.3.16715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 837.080840][T18517] lo speed is unknown, defaulting to 1000 [ 837.217346][T18520] lo speed is unknown, defaulting to 1000 [ 837.528690][T18532] __nla_validate_parse: 9 callbacks suppressed [ 837.528710][T18532] netlink: 52 bytes leftover after parsing attributes in process `syz.4.16723'. [ 837.545692][ T29] audit: type=1326 audit(1747302773.908:47086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.569840][ T29] audit: type=1326 audit(1747302773.908:47087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.571613][T18532] netlink: 52 bytes leftover after parsing attributes in process `syz.4.16723'. [ 837.593925][ T29] audit: type=1326 audit(1747302773.908:47088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.626588][ T29] audit: type=1326 audit(1747302773.908:47089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.650404][ T29] audit: type=1326 audit(1747302773.908:47090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.674131][ T29] audit: type=1326 audit(1747302773.908:47091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.697913][ T29] audit: type=1326 audit(1747302773.908:47092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.721657][ T29] audit: type=1326 audit(1747302773.918:47093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18529 comm="syz.2.16724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fc6987be969 code=0x7ffc0000 [ 837.806599][T18532] netlink: 52 bytes leftover after parsing attributes in process `syz.4.16723'. [ 837.820299][T18532] netlink: 52 bytes leftover after parsing attributes in process `syz.4.16723'. [ 837.836826][T18538] block device autoloading is deprecated and will be removed. [ 837.898031][T18542] SELinux: failed to load policy [ 837.907255][T18532] netlink: 52 bytes leftover after parsing attributes in process `syz.4.16723'. [ 837.916830][T18532] netlink: 52 bytes leftover after parsing attributes in process `syz.4.16723'. [ 837.934860][T18550] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.16727'. [ 837.960667][T18550] netlink: 24 bytes leftover after parsing attributes in process `syz.3.16727'. [ 837.985251][T18538] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.16727'. [ 838.052494][T18559] wg2: entered promiscuous mode [ 838.670893][T18636] netlink: 52 bytes leftover after parsing attributes in process `syz.1.16747'. [ 839.056400][T18682] delete_channel: no stack [ 839.124414][T18697] loop6: detected capacity change from 0 to 512 [ 839.131151][T18697] EXT4-fs: Ignoring removed mblk_io_submit option [ 839.143997][T18697] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 839.195721][T18705] netlink: 'syz.2.16767': attribute type 1 has an invalid length. [ 839.197198][T16986] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 839.230934][T18705] bond4: entered promiscuous mode [ 839.241807][T18705] 8021q: adding VLAN 0 to HW filter on device bond4 [ 839.280473][T18716] batadv4: entered promiscuous mode [ 839.285861][T18716] batadv4: entered allmulticast mode [ 839.337331][T18716] 8021q: adding VLAN 0 to HW filter on device batadv4 [ 839.364219][T18716] bond4: (slave batadv4): making interface the new active one [ 839.372739][T18716] bond4: (slave batadv4): Enslaving as an active interface with an up link [ 839.395531][T18722] FAULT_INJECTION: forcing a failure. [ 839.395531][T18722] name failslab, interval 1, probability 0, space 0, times 0 [ 839.408312][T18722] CPU: 0 UID: 0 PID: 18722 Comm: syz.4.16771 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 839.408342][T18722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 839.408354][T18722] Call Trace: [ 839.408361][T18722] [ 839.408396][T18722] __dump_stack+0x1d/0x30 [ 839.408423][T18722] dump_stack_lvl+0xe8/0x140 [ 839.408525][T18722] dump_stack+0x15/0x1b [ 839.408541][T18722] should_fail_ex+0x265/0x280 [ 839.408598][T18722] should_failslab+0x8c/0xb0 [ 839.408708][T18722] kmem_cache_alloc_node_noprof+0x57/0x320 [ 839.408733][T18722] ? __alloc_skb+0x101/0x320 [ 839.408827][T18722] __alloc_skb+0x101/0x320 [ 839.408863][T18722] netlink_alloc_large_skb+0xba/0xf0 [ 839.408951][T18722] netlink_sendmsg+0x3cf/0x6b0 [ 839.409040][T18722] ? __pfx_netlink_sendmsg+0x10/0x10 [ 839.409060][T18722] __sock_sendmsg+0x142/0x180 [ 839.409200][T18722] ____sys_sendmsg+0x31e/0x4e0 [ 839.409230][T18722] ___sys_sendmsg+0x17b/0x1d0 [ 839.409264][T18722] __x64_sys_sendmsg+0xd4/0x160 [ 839.409287][T18722] x64_sys_call+0x2999/0x2fb0 [ 839.409312][T18722] do_syscall_64+0xd0/0x1a0 [ 839.409422][T18722] ? clear_bhb_loop+0x40/0x90 [ 839.409449][T18722] ? clear_bhb_loop+0x40/0x90 [ 839.409478][T18722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 839.409527][T18722] RIP: 0033:0x7f1f870ae969 [ 839.409542][T18722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 839.409632][T18722] RSP: 002b:00007f1f85717038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 839.409656][T18722] RAX: ffffffffffffffda RBX: 00007f1f872d5fa0 RCX: 00007f1f870ae969 [ 839.409672][T18722] RDX: 000000002008c014 RSI: 0000200000000580 RDI: 0000000000000004 [ 839.409688][T18722] RBP: 00007f1f85717090 R08: 0000000000000000 R09: 0000000000000000 [ 839.409702][T18722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 839.409782][T18722] R13: 0000000000000000 R14: 00007f1f872d5fa0 R15: 00007fff827fd8b8 [ 839.409807][T18722] [ 839.981292][T18747] lo speed is unknown, defaulting to 1000 [ 840.294138][T18777] netlink: 'syz.6.16785': attribute type 1 has an invalid length. [ 840.335104][T18777] bond1: entered promiscuous mode [ 840.340538][T18777] 8021q: adding VLAN 0 to HW filter on device bond1 [ 840.360208][T18777] batadv1: entered promiscuous mode [ 840.365508][T18777] batadv1: entered allmulticast mode [ 840.374471][T18777] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 840.397110][T18777] bond1: (slave batadv1): making interface the new active one [ 840.417559][T18777] bond1: (slave batadv1): Enslaving as an active interface with an up link [ 841.093425][ T29] kauditd_printk_skb: 142 callbacks suppressed [ 841.093446][ T29] audit: type=1326 audit(1747303235.446:47234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18811 comm="syz.1.16794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 841.123478][ T29] audit: type=1326 audit(1747303235.446:47235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18811 comm="syz.1.16794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 841.209735][ T29] audit: type=1107 audit(1747303235.596:47236): pid=18835 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 841.267558][ T29] audit: type=1326 audit(1747303235.656:47237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18839 comm="syz.6.16799" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 841.291429][ T29] audit: type=1326 audit(1747303235.656:47238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18839 comm="syz.6.16799" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 841.331819][ T29] audit: type=1326 audit(1747303235.656:47239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18839 comm="syz.6.16799" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 841.355758][ T29] audit: type=1326 audit(1747303235.656:47240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18839 comm="syz.6.16799" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 841.379517][ T29] audit: type=1326 audit(1747303235.656:47241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18839 comm="syz.6.16799" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 841.403278][ T29] audit: type=1326 audit(1747303235.656:47242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18839 comm="syz.6.16799" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 841.427045][ T29] audit: type=1326 audit(1747303235.656:47243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18839 comm="syz.6.16799" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 841.907459][T18880] FAULT_INJECTION: forcing a failure. [ 841.907459][T18880] name failslab, interval 1, probability 0, space 0, times 0 [ 841.920200][T18880] CPU: 1 UID: 0 PID: 18880 Comm: syz.4.16815 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 841.920228][T18880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 841.920241][T18880] Call Trace: [ 841.920248][T18880] [ 841.920255][T18880] __dump_stack+0x1d/0x30 [ 841.920318][T18880] dump_stack_lvl+0xe8/0x140 [ 841.920343][T18880] dump_stack+0x15/0x1b [ 841.920364][T18880] should_fail_ex+0x265/0x280 [ 841.920467][T18880] should_failslab+0x8c/0xb0 [ 841.920547][T18880] kmem_cache_alloc_node_noprof+0x57/0x320 [ 841.920580][T18880] ? __alloc_skb+0x101/0x320 [ 841.920623][T18880] __alloc_skb+0x101/0x320 [ 841.920657][T18880] netlink_alloc_large_skb+0xba/0xf0 [ 841.920743][T18880] netlink_sendmsg+0x3cf/0x6b0 [ 841.920771][T18880] ? __pfx_netlink_sendmsg+0x10/0x10 [ 841.920797][T18880] __sock_sendmsg+0x142/0x180 [ 841.920831][T18880] ____sys_sendmsg+0x31e/0x4e0 [ 841.920854][T18880] ___sys_sendmsg+0x17b/0x1d0 [ 841.920981][T18880] __x64_sys_sendmsg+0xd4/0x160 [ 841.921122][T18880] x64_sys_call+0x2999/0x2fb0 [ 841.921156][T18880] do_syscall_64+0xd0/0x1a0 [ 841.921179][T18880] ? clear_bhb_loop+0x40/0x90 [ 841.921205][T18880] ? clear_bhb_loop+0x40/0x90 [ 841.921232][T18880] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.921334][T18880] RIP: 0033:0x7f1f870ae969 [ 841.921353][T18880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.921376][T18880] RSP: 002b:00007f1f85717038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 841.921453][T18880] RAX: ffffffffffffffda RBX: 00007f1f872d5fa0 RCX: 00007f1f870ae969 [ 841.921469][T18880] RDX: 0000000000004000 RSI: 0000200000000000 RDI: 0000000000000004 [ 841.921484][T18880] RBP: 00007f1f85717090 R08: 0000000000000000 R09: 0000000000000000 [ 841.921499][T18880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.921514][T18880] R13: 0000000000000000 R14: 00007f1f872d5fa0 R15: 00007fff827fd8b8 [ 841.921550][T18880] [ 842.162892][T18883] block device autoloading is deprecated and will be removed. [ 842.316802][T18897] FAULT_INJECTION: forcing a failure. [ 842.316802][T18897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 842.329993][T18897] CPU: 0 UID: 0 PID: 18897 Comm: syz.3.16823 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 842.330037][T18897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 842.330059][T18897] Call Trace: [ 842.330067][T18897] [ 842.330139][T18897] __dump_stack+0x1d/0x30 [ 842.330165][T18897] dump_stack_lvl+0xe8/0x140 [ 842.330184][T18897] dump_stack+0x15/0x1b [ 842.330280][T18897] should_fail_ex+0x265/0x280 [ 842.330396][T18897] should_fail+0xb/0x20 [ 842.330432][T18897] should_fail_usercopy+0x1a/0x20 [ 842.330455][T18897] _copy_from_user+0x1c/0xb0 [ 842.330476][T18897] ___sys_sendmsg+0xc1/0x1d0 [ 842.330652][T18897] __x64_sys_sendmsg+0xd4/0x160 [ 842.330677][T18897] x64_sys_call+0x2999/0x2fb0 [ 842.330699][T18897] do_syscall_64+0xd0/0x1a0 [ 842.330728][T18897] ? clear_bhb_loop+0x40/0x90 [ 842.330754][T18897] ? clear_bhb_loop+0x40/0x90 [ 842.330842][T18897] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.330862][T18897] RIP: 0033:0x7f395a62e969 [ 842.330876][T18897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 842.330939][T18897] RSP: 002b:00007f3958c97038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 842.330962][T18897] RAX: ffffffffffffffda RBX: 00007f395a855fa0 RCX: 00007f395a62e969 [ 842.330978][T18897] RDX: 0000000004008800 RSI: 0000200000000240 RDI: 0000000000000003 [ 842.331126][T18897] RBP: 00007f3958c97090 R08: 0000000000000000 R09: 0000000000000000 [ 842.331141][T18897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 842.331152][T18897] R13: 0000000000000000 R14: 00007f395a855fa0 R15: 00007fffcdb6ecc8 [ 842.331172][T18897] [ 842.332194][T18892] lo speed is unknown, defaulting to 1000 [ 842.538757][T18903] loop6: detected capacity change from 0 to 128 [ 842.557936][T18906] __nla_validate_parse: 16 callbacks suppressed [ 842.557959][T18906] netlink: 12 bytes leftover after parsing attributes in process `syz.2.16825'. [ 842.583848][T18903] EXT4-fs: Ignoring removed oldalloc option [ 842.635634][T18903] EXT4-fs (loop6): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 842.655421][T18903] ext4 filesystem being mounted at /79/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 842.728406][T18892] EXT4-fs error (device loop6): ext4_validate_block_bitmap:423: comm syz.6.16820: bg 0: bad block bitmap checksum [ 842.775440][T16986] EXT4-fs (loop6): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 842.790776][T18927] sg_write: data in/out 65504/17 bytes for SCSI command 0x1-- guessing data in; [ 842.790776][T18927] program syz.1.16832 not setting count and/or reply_len properly [ 842.851652][T18936] FAULT_INJECTION: forcing a failure. [ 842.851652][T18936] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 842.864892][T18936] CPU: 1 UID: 0 PID: 18936 Comm: syz.6.16833 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 842.864923][T18936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 842.864936][T18936] Call Trace: [ 842.864943][T18936] [ 842.864951][T18936] __dump_stack+0x1d/0x30 [ 842.865066][T18936] dump_stack_lvl+0xe8/0x140 [ 842.865090][T18936] dump_stack+0x15/0x1b [ 842.865111][T18936] should_fail_ex+0x265/0x280 [ 842.865198][T18936] should_fail+0xb/0x20 [ 842.865289][T18936] should_fail_usercopy+0x1a/0x20 [ 842.865309][T18936] _copy_from_user+0x1c/0xb0 [ 842.865331][T18936] sg_write+0x1ed/0x750 [ 842.865358][T18936] ? _parse_integer_limit+0x170/0x190 [ 842.865476][T18936] ? __pfx_sg_write+0x10/0x10 [ 842.865510][T18936] vfs_write+0x266/0x8d0 [ 842.865543][T18936] ? __rcu_read_unlock+0x4f/0x70 [ 842.865569][T18936] ? __fget_files+0x184/0x1c0 [ 842.865597][T18936] ksys_write+0xda/0x1a0 [ 842.865652][T18936] __x64_sys_write+0x40/0x50 [ 842.865685][T18936] x64_sys_call+0x2cdd/0x2fb0 [ 842.865712][T18936] do_syscall_64+0xd0/0x1a0 [ 842.865740][T18936] ? clear_bhb_loop+0x40/0x90 [ 842.865796][T18936] ? clear_bhb_loop+0x40/0x90 [ 842.865822][T18936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.865844][T18936] RIP: 0033:0x7f9e898de969 [ 842.865863][T18936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 842.865886][T18936] RSP: 002b:00007f9e87f47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 842.865968][T18936] RAX: ffffffffffffffda RBX: 00007f9e89b05fa0 RCX: 00007f9e898de969 [ 842.865981][T18936] RDX: 0000000000000038 RSI: 0000200000000140 RDI: 0000000000000004 [ 842.865993][T18936] RBP: 00007f9e87f47090 R08: 0000000000000000 R09: 0000000000000000 [ 842.866004][T18936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 842.866016][T18936] R13: 0000000000000000 R14: 00007f9e89b05fa0 R15: 00007ffd0956ed58 [ 842.866075][T18936] [ 843.100482][T18941] netlink: 12 bytes leftover after parsing attributes in process `syz.1.16838'. [ 843.149315][T18949] FAULT_INJECTION: forcing a failure. [ 843.149315][T18949] name failslab, interval 1, probability 0, space 0, times 0 [ 843.162122][T18949] CPU: 0 UID: 0 PID: 18949 Comm: syz.2.16841 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 843.162189][T18949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 843.162205][T18949] Call Trace: [ 843.162291][T18949] [ 843.162301][T18949] __dump_stack+0x1d/0x30 [ 843.162328][T18949] dump_stack_lvl+0xe8/0x140 [ 843.162354][T18949] dump_stack+0x15/0x1b [ 843.162374][T18949] should_fail_ex+0x265/0x280 [ 843.162426][T18949] should_failslab+0x8c/0xb0 [ 843.162472][T18949] kmem_cache_alloc_node_noprof+0x57/0x320 [ 843.162497][T18949] ? __alloc_skb+0x101/0x320 [ 843.162578][T18949] __alloc_skb+0x101/0x320 [ 843.162625][T18949] netlink_alloc_large_skb+0xba/0xf0 [ 843.162664][T18949] netlink_sendmsg+0x3cf/0x6b0 [ 843.162728][T18949] ? __pfx_netlink_sendmsg+0x10/0x10 [ 843.162753][T18949] __sock_sendmsg+0x142/0x180 [ 843.162787][T18949] ____sys_sendmsg+0x31e/0x4e0 [ 843.162816][T18949] ___sys_sendmsg+0x17b/0x1d0 [ 843.162860][T18949] __x64_sys_sendmsg+0xd4/0x160 [ 843.162971][T18949] x64_sys_call+0x2999/0x2fb0 [ 843.162998][T18949] do_syscall_64+0xd0/0x1a0 [ 843.163028][T18949] ? clear_bhb_loop+0x40/0x90 [ 843.163132][T18949] ? clear_bhb_loop+0x40/0x90 [ 843.163160][T18949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 843.163187][T18949] RIP: 0033:0x7fc6987be969 [ 843.163280][T18949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 843.163303][T18949] RSP: 002b:00007fc696e27038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.163326][T18949] RAX: ffffffffffffffda RBX: 00007fc6989e5fa0 RCX: 00007fc6987be969 [ 843.163346][T18949] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 843.163370][T18949] RBP: 00007fc696e27090 R08: 0000000000000000 R09: 0000000000000000 [ 843.163464][T18949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 843.163479][T18949] R13: 0000000000000000 R14: 00007fc6989e5fa0 R15: 00007ffd9e1beb88 [ 843.163503][T18949] [ 843.447680][T18943] netlink: 4 bytes leftover after parsing attributes in process `syz.4.16837'. [ 843.531518][T18959] lo speed is unknown, defaulting to 1000 [ 843.716491][T18976] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16851'. [ 843.728126][T18980] netlink: 44 bytes leftover after parsing attributes in process `syz.4.16852'. [ 843.785323][T18985] netlink: 56 bytes leftover after parsing attributes in process `syz.2.16847'. [ 843.816876][T18983] lo speed is unknown, defaulting to 1000 [ 843.894293][T18992] blktrace: Concurrent blktraces are not allowed on loop6 [ 843.959623][T19000] FAULT_INJECTION: forcing a failure. [ 843.959623][T19000] name failslab, interval 1, probability 0, space 0, times 0 [ 843.972500][T19000] CPU: 1 UID: 0 PID: 19000 Comm: syz.3.16858 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 843.972603][T19000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 843.972635][T19000] Call Trace: [ 843.972644][T19000] [ 843.972654][T19000] __dump_stack+0x1d/0x30 [ 843.972681][T19000] dump_stack_lvl+0xe8/0x140 [ 843.972705][T19000] dump_stack+0x15/0x1b [ 843.972721][T19000] should_fail_ex+0x265/0x280 [ 843.972759][T19000] should_failslab+0x8c/0xb0 [ 843.972874][T19000] __kmalloc_noprof+0xa5/0x3e0 [ 843.972893][T19000] ? bpf_test_init+0xa9/0x160 [ 843.972925][T19000] bpf_test_init+0xa9/0x160 [ 843.972958][T19000] bpf_prog_test_run_flow_dissector+0x12c/0x340 [ 843.973076][T19000] ? kstrtouint+0x76/0xc0 [ 843.973114][T19000] ? __pfx_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 843.973183][T19000] bpf_prog_test_run+0x20a/0x390 [ 843.973284][T19000] __sys_bpf+0x3dc/0x790 [ 843.973323][T19000] __x64_sys_bpf+0x41/0x50 [ 843.973354][T19000] x64_sys_call+0x2478/0x2fb0 [ 843.973410][T19000] do_syscall_64+0xd0/0x1a0 [ 843.973477][T19000] ? clear_bhb_loop+0x40/0x90 [ 843.973503][T19000] ? clear_bhb_loop+0x40/0x90 [ 843.973581][T19000] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 843.973607][T19000] RIP: 0033:0x7f395a62e969 [ 843.973622][T19000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 843.973640][T19000] RSP: 002b:00007f3958c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 843.973658][T19000] RAX: ffffffffffffffda RBX: 00007f395a855fa0 RCX: 00007f395a62e969 [ 843.973670][T19000] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 843.973686][T19000] RBP: 00007f3958c97090 R08: 0000000000000000 R09: 0000000000000000 [ 843.973734][T19000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 843.973749][T19000] R13: 0000000000000000 R14: 00007f395a855fa0 R15: 00007fffcdb6ecc8 [ 843.973775][T19000] [ 844.186992][T19003] lo speed is unknown, defaulting to 1000 [ 844.237188][T19006] netlink: 40 bytes leftover after parsing attributes in process `syz.1.16860'. [ 844.340653][T19012] netlink: 4 bytes leftover after parsing attributes in process `syz.1.16863'. [ 844.547840][T19034] netlink: 'syz.4.16872': attribute type 1 has an invalid length. [ 844.579050][T19034] bond8: entered promiscuous mode [ 844.589462][T19034] 8021q: adding VLAN 0 to HW filter on device bond8 [ 844.626900][T19034] netlink: 3 bytes leftover after parsing attributes in process `syz.4.16872'. [ 844.630611][T19044] lo speed is unknown, defaulting to 1000 [ 844.674605][T19045] loop6: detected capacity change from 0 to 128 [ 844.686639][T19034] batadv12: entered promiscuous mode [ 844.692010][T19034] batadv12: entered allmulticast mode [ 844.698863][T19034] 8021q: adding VLAN 0 to HW filter on device batadv12 [ 844.712103][T19034] bond8: (slave batadv12): making interface the new active one [ 844.714784][T19045] EXT4-fs: Ignoring removed oldalloc option [ 844.730958][T19034] bond8: (slave batadv12): Enslaving as an active interface with an up link [ 844.778713][T19045] EXT4-fs (loop6): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 844.851790][T19045] ext4 filesystem being mounted at /85/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 844.962638][T19044] EXT4-fs error (device loop6): ext4_validate_block_bitmap:423: comm syz.6.16876: bg 0: bad block bitmap checksum [ 845.071818][T16986] EXT4-fs (loop6): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 845.260779][T19071] netlink: 5 bytes leftover after parsing attributes in process `syz.4.16884'. [ 845.270544][T19071] 0ªX¹¦D: renamed from gretap0 (while UP) [ 845.295924][T19071] 0ªX¹¦D: entered allmulticast mode [ 845.315330][T19071] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 845.392816][T19083] netlink: 'syz.1.16887': attribute type 1 has an invalid length. [ 845.418793][T19083] bond10: entered promiscuous mode [ 845.437590][T19083] 8021q: adding VLAN 0 to HW filter on device bond10 [ 845.473573][T19087] batadv14: entered promiscuous mode [ 845.479087][T19087] batadv14: entered allmulticast mode [ 845.612119][T19087] 8021q: adding VLAN 0 to HW filter on device batadv14 [ 845.640973][T19087] bond10: (slave batadv14): making interface the new active one [ 845.814201][T19087] bond10: (slave batadv14): Enslaving as an active interface with an up link [ 846.635659][T19122] FAULT_INJECTION: forcing a failure. [ 846.635659][T19122] name failslab, interval 1, probability 0, space 0, times 0 [ 846.648555][T19122] CPU: 1 UID: 0 PID: 19122 Comm: syz.6.16901 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 846.648661][T19122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 846.648676][T19122] Call Trace: [ 846.648682][T19122] [ 846.648689][T19122] __dump_stack+0x1d/0x30 [ 846.648710][T19122] dump_stack_lvl+0xe8/0x140 [ 846.648729][T19122] dump_stack+0x15/0x1b [ 846.648830][T19122] should_fail_ex+0x265/0x280 [ 846.648863][T19122] ? rxrpc_lookup_local+0x2a3/0xc70 [ 846.648920][T19122] should_failslab+0x8c/0xb0 [ 846.648958][T19122] __kmalloc_cache_noprof+0x4c/0x320 [ 846.648988][T19122] rxrpc_lookup_local+0x2a3/0xc70 [ 846.649100][T19122] ? _raw_spin_unlock_bh+0x36/0x40 [ 846.649137][T19122] ? lock_sock_nested+0x112/0x140 [ 846.649174][T19122] rxrpc_bind+0x31c/0x490 [ 846.649243][T19122] __sys_bind+0x1d1/0x2a0 [ 846.649286][T19122] __x64_sys_bind+0x3f/0x50 [ 846.649313][T19122] x64_sys_call+0x2086/0x2fb0 [ 846.649393][T19122] do_syscall_64+0xd0/0x1a0 [ 846.649423][T19122] ? clear_bhb_loop+0x40/0x90 [ 846.649444][T19122] ? clear_bhb_loop+0x40/0x90 [ 846.649472][T19122] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 846.649498][T19122] RIP: 0033:0x7f9e898de969 [ 846.649619][T19122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 846.649637][T19122] RSP: 002b:00007f9e87f47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 846.649655][T19122] RAX: ffffffffffffffda RBX: 00007f9e89b05fa0 RCX: 00007f9e898de969 [ 846.649733][T19122] RDX: 0000000000000024 RSI: 0000200000000000 RDI: 0000000000000003 [ 846.649746][T19122] RBP: 00007f9e87f47090 R08: 0000000000000000 R09: 0000000000000000 [ 846.649761][T19122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.649777][T19122] R13: 0000000000000000 R14: 00007f9e89b05fa0 R15: 00007ffd0956ed58 [ 846.649802][T19122] [ 847.111280][T19131] loop6: detected capacity change from 0 to 256 [ 847.140353][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 847.140367][ T29] audit: type=1400 audit(1747304157.519:47334): avc: denied { mount } for pid=19127 comm="syz.6.16903" name="/" dev="loop6" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 847.352653][ T29] audit: type=1326 audit(1747304157.729:47335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.376547][ T29] audit: type=1326 audit(1747304157.729:47336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.400271][ T29] audit: type=1326 audit(1747304157.729:47337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.424086][ T29] audit: type=1326 audit(1747304157.729:47338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.448171][ T29] audit: type=1326 audit(1747304157.729:47339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.471924][ T29] audit: type=1326 audit(1747304157.729:47340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.495656][ T29] audit: type=1326 audit(1747304157.729:47341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.519424][ T29] audit: type=1326 audit(1747304157.729:47342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.543404][ T29] audit: type=1326 audit(1747304157.729:47343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19146 comm="syz.1.16908" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 847.788003][T19156] lo speed is unknown, defaulting to 1000 [ 848.378130][T19182] lo speed is unknown, defaulting to 1000 [ 848.408937][T19186] netlink: 'syz.6.16921': attribute type 1 has an invalid length. [ 848.430835][T19186] bond2: entered promiscuous mode [ 848.467692][T19186] 8021q: adding VLAN 0 to HW filter on device bond2 [ 848.534724][T19186] __nla_validate_parse: 2 callbacks suppressed [ 848.534746][T19186] netlink: 3 bytes leftover after parsing attributes in process `syz.6.16921'. [ 848.572160][T19186] batadv2: entered promiscuous mode [ 848.577797][T19186] batadv2: entered allmulticast mode [ 848.597422][T19186] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 848.606430][T19186] bond2: (slave batadv2): making interface the new active one [ 848.616238][T19195] SELinux: policydb version 1393029108 does not match my version range 15-34 [ 848.633569][T19195] SELinux: failed to load policy [ 848.640808][T19186] bond2: (slave batadv2): Enslaving as an active interface with an up link [ 848.859889][T19213] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16931'. [ 848.874201][T19213] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16931'. [ 849.000466][T19230] netlink: 830 bytes leftover after parsing attributes in process `syz.4.16935'. [ 849.436384][T19268] lo speed is unknown, defaulting to 1000 [ 849.714456][T19300] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16945'. [ 849.739169][T19300] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16945'. [ 849.832014][T19311] netlink: 'syz.4.16948': attribute type 1 has an invalid length. [ 849.848377][T19309] netlink: 132 bytes leftover after parsing attributes in process `syz.6.16947'. [ 849.884570][T19309] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 849.908209][T19314] netlink: 3 bytes leftover after parsing attributes in process `syz.4.16948'. [ 849.919761][T19309] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 849.928158][T19311] bond9: entered promiscuous mode [ 849.933440][T19311] 8021q: adding VLAN 0 to HW filter on device bond9 [ 849.945332][T19314] batadv13: entered promiscuous mode [ 849.950664][T19314] batadv13: entered allmulticast mode [ 849.957498][T19314] 8021q: adding VLAN 0 to HW filter on device batadv13 [ 849.962766][T19317] netlink: 8 bytes leftover after parsing attributes in process `syz.2.16950'. [ 849.966394][T19314] bond9: (slave batadv13): making interface the new active one [ 849.973537][T19317] netlink: 24 bytes leftover after parsing attributes in process `syz.2.16950'. [ 849.981874][T19314] bond9: (slave batadv13): Enslaving as an active interface with an up link [ 850.214498][T19329] blktrace: Concurrent blktraces are not allowed on loop8 [ 850.256027][T19345] netlink: 'syz.4.16958': attribute type 1 has an invalid length. [ 850.274258][T19345] bond10: entered promiscuous mode [ 850.279846][T19345] 8021q: adding VLAN 0 to HW filter on device bond10 [ 850.294001][T19345] batadv14: entered promiscuous mode [ 850.299361][T19345] batadv14: entered allmulticast mode [ 850.306038][T19345] 8021q: adding VLAN 0 to HW filter on device batadv14 [ 850.314649][T19345] bond10: (slave batadv14): making interface the new active one [ 850.323458][T19345] bond10: (slave batadv14): Enslaving as an active interface with an up link [ 850.476278][T19363] FAULT_INJECTION: forcing a failure. [ 850.476278][T19363] name failslab, interval 1, probability 0, space 0, times 0 [ 850.489074][T19363] CPU: 0 UID: 0 PID: 19363 Comm: syz.2.16963 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 850.489190][T19363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 850.489258][T19363] Call Trace: [ 850.489267][T19363] [ 850.489278][T19363] __dump_stack+0x1d/0x30 [ 850.489308][T19363] dump_stack_lvl+0xe8/0x140 [ 850.489336][T19363] dump_stack+0x15/0x1b [ 850.489359][T19363] should_fail_ex+0x265/0x280 [ 850.489406][T19363] should_failslab+0x8c/0xb0 [ 850.489583][T19363] __kmalloc_cache_node_noprof+0x54/0x320 [ 850.489616][T19363] ? __get_vm_area_node+0x106/0x1d0 [ 850.489648][T19363] __get_vm_area_node+0x106/0x1d0 [ 850.489676][T19363] __vmalloc_node_range_noprof+0x26a/0xdf0 [ 850.489767][T19363] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 850.489863][T19363] ? kstrtoull+0x111/0x140 [ 850.489928][T19363] ? kstrtouint+0x76/0xc0 [ 850.490015][T19363] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 850.490049][T19363] __vmalloc_noprof+0x5f/0x70 [ 850.490080][T19363] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 850.490125][T19363] bpf_prog_alloc_no_stats+0x47/0x390 [ 850.490239][T19363] ? bpf_prog_alloc+0x2a/0x150 [ 850.490294][T19363] bpf_prog_alloc+0x3c/0x150 [ 850.490439][T19363] bpf_prog_create_from_user+0x7d/0x260 [ 850.490552][T19363] ? __pfx_seccomp_check_filter+0x10/0x10 [ 850.490586][T19363] do_seccomp+0x5ef/0xa40 [ 850.490612][T19363] ? fput+0x8f/0xc0 [ 850.490637][T19363] ? ksys_write+0x16e/0x1a0 [ 850.490729][T19363] __x64_sys_seccomp+0x40/0x50 [ 850.490786][T19363] x64_sys_call+0x2395/0x2fb0 [ 850.490814][T19363] do_syscall_64+0xd0/0x1a0 [ 850.490844][T19363] ? clear_bhb_loop+0x40/0x90 [ 850.490865][T19363] ? clear_bhb_loop+0x40/0x90 [ 850.490915][T19363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.490941][T19363] RIP: 0033:0x7fc6987be969 [ 850.490960][T19363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 850.490983][T19363] RSP: 002b:00007fc696e27038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 850.491083][T19363] RAX: ffffffffffffffda RBX: 00007fc6989e5fa0 RCX: 00007fc6987be969 [ 850.491100][T19363] RDX: 00002000000000c0 RSI: 0000000000000000 RDI: 0000000000000001 [ 850.491116][T19363] RBP: 00007fc696e27090 R08: 0000000000000000 R09: 0000000000000000 [ 850.491131][T19363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 850.491147][T19363] R13: 0000000000000000 R14: 00007fc6989e5fa0 R15: 00007ffd9e1beb88 [ 850.491172][T19363] [ 850.491180][T19363] syz.2.16963: vmalloc error: size 4096, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 850.755318][T19363] CPU: 0 UID: 0 PID: 19363 Comm: syz.2.16963 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 850.755404][T19363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 850.755417][T19363] Call Trace: [ 850.755424][T19363] [ 850.755435][T19363] __dump_stack+0x1d/0x30 [ 850.755457][T19363] dump_stack_lvl+0xe8/0x140 [ 850.755475][T19363] dump_stack+0x15/0x1b [ 850.755491][T19363] warn_alloc+0x12b/0x1a0 [ 850.755563][T19363] __vmalloc_node_range_noprof+0x28e/0xdf0 [ 850.755666][T19363] ? kstrtoull+0x111/0x140 [ 850.755703][T19363] ? kstrtouint+0x76/0xc0 [ 850.755734][T19363] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 850.755845][T19363] __vmalloc_noprof+0x5f/0x70 [ 850.755874][T19363] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 850.755911][T19363] bpf_prog_alloc_no_stats+0x47/0x390 [ 850.755948][T19363] ? bpf_prog_alloc+0x2a/0x150 [ 850.756059][T19363] bpf_prog_alloc+0x3c/0x150 [ 850.756103][T19363] bpf_prog_create_from_user+0x7d/0x260 [ 850.756183][T19363] ? __pfx_seccomp_check_filter+0x10/0x10 [ 850.756210][T19363] do_seccomp+0x5ef/0xa40 [ 850.756290][T19363] ? fput+0x8f/0xc0 [ 850.756313][T19363] ? ksys_write+0x16e/0x1a0 [ 850.756346][T19363] __x64_sys_seccomp+0x40/0x50 [ 850.756423][T19363] x64_sys_call+0x2395/0x2fb0 [ 850.756444][T19363] do_syscall_64+0xd0/0x1a0 [ 850.756469][T19363] ? clear_bhb_loop+0x40/0x90 [ 850.756545][T19363] ? clear_bhb_loop+0x40/0x90 [ 850.756615][T19363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.756642][T19363] RIP: 0033:0x7fc6987be969 [ 850.756660][T19363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 850.756743][T19363] RSP: 002b:00007fc696e27038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 850.756761][T19363] RAX: ffffffffffffffda RBX: 00007fc6989e5fa0 RCX: 00007fc6987be969 [ 850.756775][T19363] RDX: 00002000000000c0 RSI: 0000000000000000 RDI: 0000000000000001 [ 850.756802][T19363] RBP: 00007fc696e27090 R08: 0000000000000000 R09: 0000000000000000 [ 850.756889][T19363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 850.756901][T19363] R13: 0000000000000000 R14: 00007fc6989e5fa0 R15: 00007ffd9e1beb88 [ 850.756920][T19363] [ 850.756926][T19363] Mem-Info: [ 850.982146][T19363] active_anon:4990 inactive_anon:8 isolated_anon:0 [ 850.982146][T19363] active_file:16051 inactive_file:12975 isolated_file:0 [ 850.982146][T19363] unevictable:0 dirty:566 writeback:0 [ 850.982146][T19363] slab_reclaimable:3227 slab_unreclaimable:41171 [ 850.982146][T19363] mapped:29721 shmem:371 pagetables:1078 [ 850.982146][T19363] sec_pagetables:0 bounce:0 [ 850.982146][T19363] kernel_misc_reclaimable:0 [ 850.982146][T19363] free:1745211 free_pcp:62356 free_cma:0 [ 851.027374][T19363] Node 0 active_anon:20076kB inactive_anon:32kB active_file:64204kB inactive_file:51900kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118884kB dirty:2264kB writeback:0kB shmem:1484kB writeback_tmp:0kB kernel_stack:5136kB pagetables:4544kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 851.056573][T19363] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 851.083500][T19363] lowmem_reserve[]: 0 2884 7863 7863 [ 851.088971][T19363] Node 0 DMA32 free:2950032kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953564kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:3532kB free_cma:0kB [ 851.117651][T19363] lowmem_reserve[]: 0 0 4978 4978 [ 851.122735][T19363] Node 0 Normal free:4015452kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:19380kB inactive_anon:32kB active_file:64204kB inactive_file:51900kB unevictable:0kB writepending:2264kB present:5242880kB managed:5098244kB mlocked:0kB bounce:0kB free_pcp:246020kB local_pcp:125156kB free_cma:0kB [ 851.146478][T19397] block device autoloading is deprecated and will be removed. [ 851.153474][T19363] lowmem_reserve[]: 0 0 0 0 [ 851.165697][T19363] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 851.178795][T19363] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 3*16kB (M) 4*32kB (M) 3*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2950032kB [ 851.195112][T19363] Node 0 Normal: 472*4kB (UM) 220*8kB (UME) 166*16kB (UME) 218*32kB (UME) 278*64kB (UME) 214*128kB (UME) 136*256kB (UME) 160*512kB (UME) 62*1024kB (UM) 56*2048kB (UM) 894*4096kB (UME) = 4015200kB [ 851.214639][T19363] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 851.224011][T19363] 29276 total pagecache pages [ 851.228694][T19363] 12 pages in swap cache [ 851.232940][T19363] Free swap = 124948kB [ 851.237318][T19363] Total swap = 124996kB [ 851.241486][T19363] 2097051 pages RAM [ 851.245408][T19363] 0 pages HighMem/MovableOnly [ 851.250083][T19363] 80259 pages reserved [ 851.745823][T19409] netlink: 'syz.4.16972': attribute type 1 has an invalid length. [ 851.805779][T19409] bond11: entered promiscuous mode [ 851.825702][T19409] 8021q: adding VLAN 0 to HW filter on device bond11 [ 851.899518][T19420] batadv15: entered promiscuous mode [ 851.904983][T19420] batadv15: entered allmulticast mode [ 851.918470][T19422] netlink: 'syz.2.16977': attribute type 1 has an invalid length. [ 851.942042][T19420] 8021q: adding VLAN 0 to HW filter on device batadv15 [ 851.960321][T19420] bond11: (slave batadv15): making interface the new active one [ 851.971545][T19420] bond11: (slave batadv15): Enslaving as an active interface with an up link [ 852.005035][T19429] lo speed is unknown, defaulting to 1000 [ 852.035919][T19422] FAULT_INJECTION: forcing a failure. [ 852.035919][T19422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 852.049138][T19422] CPU: 1 UID: 0 PID: 19422 Comm: syz.2.16977 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 852.049172][T19422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 852.049225][T19422] Call Trace: [ 852.049233][T19422] [ 852.049243][T19422] __dump_stack+0x1d/0x30 [ 852.049278][T19422] dump_stack_lvl+0xe8/0x140 [ 852.049297][T19422] dump_stack+0x15/0x1b [ 852.049389][T19422] should_fail_ex+0x265/0x280 [ 852.049428][T19422] should_fail+0xb/0x20 [ 852.049456][T19422] should_fail_usercopy+0x1a/0x20 [ 852.049556][T19422] _copy_from_user+0x1c/0xb0 [ 852.049585][T19422] ___sys_sendmsg+0xc1/0x1d0 [ 852.049629][T19422] __x64_sys_sendmsg+0xd4/0x160 [ 852.049657][T19422] x64_sys_call+0x2999/0x2fb0 [ 852.049700][T19422] do_syscall_64+0xd0/0x1a0 [ 852.049730][T19422] ? clear_bhb_loop+0x40/0x90 [ 852.049755][T19422] ? clear_bhb_loop+0x40/0x90 [ 852.049844][T19422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 852.049866][T19422] RIP: 0033:0x7fc6987be969 [ 852.049881][T19422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 852.049898][T19422] RSP: 002b:00007fc696e27038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 852.049916][T19422] RAX: ffffffffffffffda RBX: 00007fc6989e5fa0 RCX: 00007fc6987be969 [ 852.049993][T19422] RDX: 0000000000000800 RSI: 0000200000006040 RDI: 0000000000000005 [ 852.050009][T19422] RBP: 00007fc696e27090 R08: 0000000000000000 R09: 0000000000000000 [ 852.050024][T19422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 852.050039][T19422] R13: 0000000000000000 R14: 00007fc6989e5fa0 R15: 00007ffd9e1beb88 [ 852.050063][T19422] [ 852.432512][T19461] loop6: detected capacity change from 0 to 4096 [ 852.439611][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 852.439626][ T29] audit: type=1400 audit(1747305078.818:47487): avc: denied { mounton } for pid=19460 comm="syz.6.16983" path="/106/file1" dev="tmpfs" ino=587 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 852.538457][T19461] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 852.566308][T19461] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 852.587343][T19483] netlink: 'syz.4.16988': attribute type 1 has an invalid length. [ 852.633682][T19483] bond12: entered promiscuous mode [ 852.644920][T19483] 8021q: adding VLAN 0 to HW filter on device bond12 [ 852.674614][ T29] audit: type=1326 audit(1747305308.066:47488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.698914][ T29] audit: type=1326 audit(1747305308.066:47489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.722681][ T29] audit: type=1326 audit(1747305308.066:47490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.746498][ T29] audit: type=1326 audit(1747305308.066:47491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.770272][ T29] audit: type=1326 audit(1747305308.066:47492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.794053][ T29] audit: type=1326 audit(1747305308.066:47493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.817895][ T29] audit: type=1326 audit(1747305308.066:47494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.841654][ T29] audit: type=1326 audit(1747305308.066:47495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.865324][ T29] audit: type=1326 audit(1747305308.066:47496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19492 comm="syz.1.16990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb0daf1e969 code=0x7ffc0000 [ 852.892470][T19491] batadv16: entered promiscuous mode [ 852.897840][T19491] batadv16: entered allmulticast mode [ 852.904637][T19491] 8021q: adding VLAN 0 to HW filter on device batadv16 [ 852.913170][T19491] bond12: (slave batadv16): making interface the new active one [ 852.941562][T19491] bond12: (slave batadv16): Enslaving as an active interface with an up link [ 853.324854][T19512] netlink: 'syz.2.16999': attribute type 1 has an invalid length. [ 853.338747][T19512] bond5: entered promiscuous mode [ 853.344156][T19512] 8021q: adding VLAN 0 to HW filter on device bond5 [ 853.368160][T19512] batadv5: entered promiscuous mode [ 853.373501][T19512] batadv5: entered allmulticast mode [ 853.380144][T19512] 8021q: adding VLAN 0 to HW filter on device batadv5 [ 853.400842][T19512] bond5: (slave batadv5): making interface the new active one [ 853.409178][T19512] bond5: (slave batadv5): Enslaving as an active interface with an up link [ 853.554574][T19527] __nla_validate_parse: 14 callbacks suppressed [ 853.554594][T19527] netlink: 830 bytes leftover after parsing attributes in process `syz.6.17000'. [ 854.276916][T19550] lo speed is unknown, defaulting to 1000 [ 854.473191][T19568] loop6: detected capacity change from 0 to 256 [ 854.501062][T19571] netlink: 12 bytes leftover after parsing attributes in process `syz.4.17018'. [ 855.523106][T19602] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 855.547496][T19604] lo speed is unknown, defaulting to 1000 [ 855.557028][T19606] netlink: 'syz.2.17030': attribute type 1 has an invalid length. [ 855.591764][T19606] bond6: entered promiscuous mode [ 855.597478][T19606] 8021q: adding VLAN 0 to HW filter on device bond6 [ 855.607588][T19606] netlink: 3 bytes leftover after parsing attributes in process `syz.2.17030'. [ 855.624981][T19596] tipc: Failed to remove unknown binding: 66,1,1/0:2559594687/2559594688 [ 855.635156][T19596] tipc: Failed to remove unknown binding: 66,1,1/0:2559594687/2559594688 [ 855.642235][T19606] batadv6: entered promiscuous mode [ 855.649159][T19606] batadv6: entered allmulticast mode [ 855.658246][T19606] 8021q: adding VLAN 0 to HW filter on device batadv6 [ 855.667365][T19606] bond6: (slave batadv6): making interface the new active one [ 855.676131][T19606] bond6: (slave batadv6): Enslaving as an active interface with an up link [ 856.456300][T19668] netlink: 'syz.6.17037': attribute type 33 has an invalid length. [ 856.464403][T19668] netlink: 152 bytes leftover after parsing attributes in process `syz.6.17037'. [ 856.492808][T19668] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17037'. [ 856.697486][T19706] netlink: 12 bytes leftover after parsing attributes in process `syz.1.17041'. [ 856.702997][T19707] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 856.913232][T19730] loop6: detected capacity change from 0 to 4096 [ 856.948072][T19730] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 856.990996][T19730] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 857.057153][T19765] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.17047'. [ 857.078004][T19743] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.17047'. [ 857.096066][T19768] netlink: 48 bytes leftover after parsing attributes in process `syz.6.17045'. [ 857.106541][T19765] blktrace: Concurrent blktraces are not allowed on loop2 [ 857.928775][T19817] loop6: detected capacity change from 0 to 256 [ 857.931143][T19822] netlink: 'syz.3.17054': attribute type 1 has an invalid length. [ 857.958532][T19822] bond4: entered promiscuous mode [ 857.964371][T19822] 8021q: adding VLAN 0 to HW filter on device bond4 [ 857.983455][T19822] netlink: 3 bytes leftover after parsing attributes in process `syz.3.17054'. [ 858.015112][T19822] batadv11: entered promiscuous mode [ 858.020494][T19822] batadv11: entered allmulticast mode [ 858.027291][T19822] 8021q: adding VLAN 0 to HW filter on device batadv11 [ 858.035587][T19822] bond4: (slave batadv11): making interface the new active one [ 858.043987][T19822] bond4: (slave batadv11): Enslaving as an active interface with an up link [ 858.103800][T19837] FAULT_INJECTION: forcing a failure. [ 858.103800][T19837] name failslab, interval 1, probability 0, space 0, times 0 [ 858.116672][T19837] CPU: 1 UID: 0 PID: 19837 Comm: syz.3.17056 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 858.116749][T19837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 858.116764][T19837] Call Trace: [ 858.116771][T19837] [ 858.116778][T19837] __dump_stack+0x1d/0x30 [ 858.116859][T19837] dump_stack_lvl+0xe8/0x140 [ 858.116880][T19837] dump_stack+0x15/0x1b [ 858.116901][T19837] should_fail_ex+0x265/0x280 [ 858.116939][T19837] should_failslab+0x8c/0xb0 [ 858.117047][T19837] kmem_cache_alloc_node_noprof+0x57/0x320 [ 858.117098][T19837] ? __alloc_skb+0x101/0x320 [ 858.117140][T19837] __alloc_skb+0x101/0x320 [ 858.117173][T19837] ? xas_load+0x413/0x430 [ 858.117201][T19837] tipc_msg_build+0xbe/0x840 [ 858.117259][T19837] tipc_send_group_bcast+0x5a4/0x6c0 [ 858.117302][T19837] ? __pfx_woken_wake_function+0x10/0x10 [ 858.117336][T19837] __tipc_sendmsg+0x186/0x1b00 [ 858.117378][T19837] ? avc_has_perm_noaudit+0x1b1/0x200 [ 858.117436][T19837] ? __rcu_read_unlock+0x4f/0x70 [ 858.117457][T19837] __tipc_sendstream+0xa23/0xb30 [ 858.117573][T19837] ? selinux_socket_sendmsg+0x175/0x1b0 [ 858.117600][T19837] ? _raw_spin_unlock_bh+0x36/0x40 [ 858.117687][T19837] tipc_send_packet+0x65/0x80 [ 858.117718][T19837] ? __pfx_tipc_send_packet+0x10/0x10 [ 858.117755][T19837] __sock_sendmsg+0x142/0x180 [ 858.117844][T19837] ____sys_sendmsg+0x31e/0x4e0 [ 858.117875][T19837] ___sys_sendmsg+0x17b/0x1d0 [ 858.117945][T19837] __x64_sys_sendmsg+0xd4/0x160 [ 858.117979][T19837] x64_sys_call+0x2999/0x2fb0 [ 858.118004][T19837] do_syscall_64+0xd0/0x1a0 [ 858.118027][T19837] ? clear_bhb_loop+0x40/0x90 [ 858.118059][T19837] ? clear_bhb_loop+0x40/0x90 [ 858.118086][T19837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 858.118112][T19837] RIP: 0033:0x7f395a62e969 [ 858.118132][T19837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 858.118184][T19837] RSP: 002b:00007f3958c97038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 858.118256][T19837] RAX: ffffffffffffffda RBX: 00007f395a855fa0 RCX: 00007f395a62e969 [ 858.118271][T19837] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000005 [ 858.118287][T19837] RBP: 00007f3958c97090 R08: 0000000000000000 R09: 0000000000000000 [ 858.118303][T19837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 858.118328][T19837] R13: 0000000000000000 R14: 00007f395a855fa0 R15: 00007fffcdb6ecc8 [ 858.118352][T19837] [ 858.621393][T19864] netlink: 'syz.1.17066': attribute type 33 has an invalid length. [ 858.629626][T19864] __nla_validate_parse: 5 callbacks suppressed [ 858.629644][T19864] netlink: 152 bytes leftover after parsing attributes in process `syz.1.17066'. [ 858.647413][T19864] netlink: 4 bytes leftover after parsing attributes in process `syz.1.17066'. [ 858.770942][T19872] netlink: 60 bytes leftover after parsing attributes in process `syz.3.17069'. [ 858.802791][T19874] netlink: 8 bytes leftover after parsing attributes in process `syz.3.17070'. [ 858.811371][T19876] netlink: 12 bytes leftover after parsing attributes in process `syz.1.17071'. [ 858.812721][T19874] netlink: 8 bytes leftover after parsing attributes in process `syz.3.17070'. [ 858.949344][T19888] FAULT_INJECTION: forcing a failure. [ 858.949344][T19888] name failslab, interval 1, probability 0, space 0, times 0 [ 858.960650][T19890] FAULT_INJECTION: forcing a failure. [ 858.960650][T19890] name failslab, interval 1, probability 0, space 0, times 0 [ 858.962245][T19888] CPU: 1 UID: 0 PID: 19888 Comm: syz.4.17076 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 858.962283][T19888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 858.962300][T19888] Call Trace: [ 858.962308][T19888] [ 858.962318][T19888] __dump_stack+0x1d/0x30 [ 858.962402][T19888] dump_stack_lvl+0xe8/0x140 [ 858.962429][T19888] dump_stack+0x15/0x1b [ 858.962452][T19888] should_fail_ex+0x265/0x280 [ 858.962495][T19888] ? shrinker_alloc+0x3b/0x650 [ 858.962600][T19888] should_failslab+0x8c/0xb0 [ 858.962640][T19888] __kmalloc_cache_noprof+0x4c/0x320 [ 858.962668][T19888] ? pcpu_alloc_noprof+0xd26/0x1210 [ 858.962724][T19888] shrinker_alloc+0x3b/0x650 [ 858.962825][T19888] ? rcu_sync_init+0x32/0x40 [ 858.962859][T19888] alloc_super+0x426/0x570 [ 858.962890][T19888] sget_fc+0x24e/0x6e0 [ 858.962916][T19888] ? __pfx_set_anon_super_fc+0x10/0x10 [ 858.962950][T19888] ? __pfx_devpts_fill_super+0x10/0x10 [ 858.963042][T19888] get_tree_nodev+0x2a/0x100 [ 858.963105][T19888] devpts_get_tree+0x1c/0x30 [ 858.963129][T19888] vfs_get_tree+0x54/0x1d0 [ 858.963164][T19888] do_new_mount+0x207/0x680 [ 858.963214][T19888] path_mount+0x4a4/0xb20 [ 858.963248][T19888] ? user_path_at+0x109/0x130 [ 858.963336][T19888] __se_sys_mount+0x28f/0x2e0 [ 858.963372][T19888] ? fput+0x8f/0xc0 [ 858.963399][T19888] __x64_sys_mount+0x67/0x80 [ 858.963434][T19888] x64_sys_call+0xd36/0x2fb0 [ 858.963535][T19888] do_syscall_64+0xd0/0x1a0 [ 858.963568][T19888] ? clear_bhb_loop+0x40/0x90 [ 858.963597][T19888] ? clear_bhb_loop+0x40/0x90 [ 858.963625][T19888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 858.963776][T19888] RIP: 0033:0x7f1f870ae969 [ 858.963797][T19888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 858.963820][T19888] RSP: 002b:00007f1f85717038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 858.963844][T19888] RAX: ffffffffffffffda RBX: 00007f1f872d5fa0 RCX: 00007f1f870ae969 [ 858.963861][T19888] RDX: 0000200000000040 RSI: 0000200000000000 RDI: 0000000000000000 [ 858.963877][T19888] RBP: 00007f1f85717090 R08: 0000000000000000 R09: 0000000000000000 [ 858.963893][T19888] R10: 0000000000004002 R11: 0000000000000246 R12: 0000000000000001 [ 858.963913][T19888] R13: 0000000000000000 R14: 00007f1f872d5fa0 R15: 00007fff827fd8b8 [ 858.963939][T19888] [ 859.211161][T19890] CPU: 0 UID: 0 PID: 19890 Comm: syz.1.17077 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 859.211202][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 859.211205][T19890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 859.211221][T19890] Call Trace: [ 859.211228][T19890] [ 859.211217][ T29] audit: type=1326 audit(1747305543.520:47542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211236][T19890] __dump_stack+0x1d/0x30 [ 859.211261][T19890] dump_stack_lvl+0xe8/0x140 [ 859.211290][ T29] audit: type=1326 audit(1747305543.520:47543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=132 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211317][ T29] audit: type=1326 audit(1747305543.520:47544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211332][T19890] dump_stack+0x15/0x1b [ 859.211351][ T29] audit: type=1326 audit(1747305543.520:47545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211354][T19890] should_fail_ex+0x265/0x280 [ 859.211395][T19890] should_failslab+0x8c/0xb0 [ 859.211425][T19890] __kmalloc_noprof+0xa5/0x3e0 [ 859.211385][ T29] audit: type=1326 audit(1747305543.520:47546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211513][T19890] ? bpf_test_init+0xa9/0x160 [ 859.211540][ T29] audit: type=1326 audit(1747305543.520:47547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211550][T19890] bpf_test_init+0xa9/0x160 [ 859.211575][ T29] audit: type=1400 audit(1747305543.520:47548): avc: denied { create } for pid=19894 comm="syz.6.17079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 859.211605][ T29] audit: type=1326 audit(1747305543.520:47549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211719][T19890] ================================================================== [ 859.211715][ T29] audit: type=1326 audit(1747305543.520:47550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211750][ T29] audit: type=1326 audit(1747305543.520:47551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19894 comm="syz.6.17079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e898de969 code=0x7ffc0000 [ 859.211765][T19890] BUG: KCSAN: data-race in data_alloc / prb_reserve [ 859.211817][T19890] [ 859.211823][T19890] write to 0xffffffff86882558 of 8 bytes by task 29 on cpu 1: [ 859.211842][T19890] data_alloc+0x27d/0x2b0 [ 859.211874][T19890] prb_reserve+0x808/0xaf0 [ 859.211904][T19890] vprintk_store+0x56d/0x860 [ 859.211920][T19890] vprintk_emit+0x178/0x650 [ 859.211936][T19890] vprintk_default+0x26/0x30 [ 859.211958][T19890] vprintk+0x1d/0x30 [ 859.211985][T19890] _printk+0x79/0xa0 [ 859.212016][T19890] kauditd_hold_skb+0x1b1/0x1c0 [ 859.212032][T19890] kauditd_send_queue+0x270/0x2c0 [ 859.212049][T19890] kauditd_thread+0x421/0x630 [ 859.212083][T19890] kthread+0x489/0x510 [ 859.212107][T19890] ret_from_fork+0x4b/0x60 [ 859.212127][T19890] ret_from_fork_asm+0x1a/0x30 [ 859.212150][T19890] [ 859.212155][T19890] read to 0xffffffff86882558 of 8 bytes by task 19890 on cpu 0: [ 859.212170][T19890] prb_reserve+0x221/0xaf0 [ 859.212205][T19890] vprintk_store+0x56d/0x860 [ 859.212225][T19890] vprintk_emit+0x178/0x650 [ 859.212246][T19890] vprintk_default+0x26/0x30 [ 859.212264][T19890] vprintk+0x1d/0x30 [ 859.212286][T19890] _printk+0x79/0xa0 [ 859.212310][T19890] show_trace_log_lvl+0x4e3/0x560 [ 859.212336][T19890] __dump_stack+0x1d/0x30 [ 859.212355][T19890] dump_stack_lvl+0xe8/0x140 [ 859.212374][T19890] dump_stack+0x15/0x1b [ 859.212391][T19890] should_fail_ex+0x265/0x280 [ 859.212419][T19890] should_failslab+0x8c/0xb0 [ 859.212447][T19890] __kmalloc_noprof+0xa5/0x3e0 [ 859.212468][T19890] bpf_test_init+0xa9/0x160 [ 859.212501][T19890] bpf_prog_test_run_xdp+0x274/0x8f0 [ 859.212537][T19890] bpf_prog_test_run+0x20a/0x390 [ 859.212572][T19890] __sys_bpf+0x3dc/0x790 [ 859.212601][T19890] __x64_sys_bpf+0x41/0x50 [ 859.212630][T19890] x64_sys_call+0x2478/0x2fb0 [ 859.212653][T19890] do_syscall_64+0xd0/0x1a0 [ 859.212677][T19890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.212696][T19890] [ 859.212699][T19890] value changed: 0x00000000001612d8 -> 0x0000000000203e80 [ 859.212710][T19890] [ 859.212713][T19890] Reported by Kernel Concurrency Sanitizer on: [ 859.212722][T19890] CPU: 0 UID: 0 PID: 19890 Comm: syz.1.17077 Not tainted 6.15.0-rc6-syzkaller-00085-gc94d59a126cb #0 PREEMPT(voluntary) [ 859.212759][T19890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 859.212774][T19890] ================================================================== [ 859.211590][T19890] bpf_prog_test_run_xdp+0x274/0x8f0 [ 859.212807][T19890] ? kstrtouint+0x76/0xc0 [ 859.212919][T19890] ? __rcu_read_unlock+0x4f/0x70 [ 859.212954][T19890] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 859.213020][T19890] bpf_prog_test_run+0x20a/0x390 [ 859.213052][T19890] __sys_bpf+0x3dc/0x790 [ 859.213161][T19890] __x64_sys_bpf+0x41/0x50 [ 859.213190][T19890] x64_sys_call+0x2478/0x2fb0 [ 859.213216][T19890] do_syscall_64+0xd0/0x1a0 [ 859.213310][T19890] ? clear_bhb_loop+0x40/0x90 [ 859.213337][T19890] ? clear_bhb_loop+0x40/0x90 [ 859.213365][T19890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.213391][T19890] RIP: 0033:0x7fb0daf1e969 [ 859.213445][T19890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 859.213465][T19890] RSP: 002b:00007fb0d9587038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 859.213536][T19890] RAX: ffffffffffffffda RBX: 00007fb0db145fa0 RCX: 00007fb0daf1e969 [ 859.213549][T19890] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 859.213561][T19890] RBP: 00007fb0d9587090 R08: 0000000000000000 R09: 0000000000000000 [ 859.213573][T19890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.213584][T19890] R13: 0000000000000000 R14: 00007fb0db145fa0 R15: 00007ffc659301a8 [ 859.213606][T19890] [ 859.261510][T19899] netlink: 'syz.4.17080': attribute type 1 has an invalid length. [ 859.297116][T19899] bond13: entered promiscuous mode [ 859.297289][T19899] 8021q: adding VLAN 0 to HW filter on device bond13 [ 859.306400][T19901] syzkaller0: entered allmulticast mode [ 859.312028][T19903] netlink: 60 bytes leftover after parsing attributes in process `syz.1.17081'. [ 859.317904][T19899] netlink: 3 bytes leftover after parsing attributes in process `syz.4.17080'. [ 859.329733][T19899] batadv17: entered promiscuous mode [ 859.329754][T19899] batadv17: entered allmulticast mode [ 859.336941][T19899] 8021q: adding VLAN 0 to HW filter on device batadv17 [ 859.338682][T19899] bond13: (slave batadv17): making interface the new active one [ 859.342673][T19899] bond13: (slave batadv17): Enslaving as an active interface with an up link [ 859.490422][T19899] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17080'. [ 859.843908][T19918] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17085'.