last executing test programs: 6m48.868748298s ago: executing program 3 (id=2824): socket(0x2c, 0x803, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000740)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@auto_da_alloc}, {@noload}, {@nodiscard}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) 6m47.767454203s ago: executing program 3 (id=2830): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x83, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) flock(0xffffffffffffffff, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}}], 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) timer_create(0x0, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000200)='bridge0\x00') 6m46.051539505s ago: executing program 3 (id=2839): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x18) ioprio_get$uid(0x3, 0xee01) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000001200)='vfat\x00', 0x0, 0x0) 6m45.191934196s ago: executing program 3 (id=2845): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 6m45.089646978s ago: executing program 3 (id=2847): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000020}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001a00010000000000000000001c000000000000000000"], 0x30}}, 0x0) 6m43.899460593s ago: executing program 3 (id=2849): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x83, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) flock(0xffffffffffffffff, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}}], 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) timer_create(0x0, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000200)='bridge0\x00') 6m43.871619313s ago: executing program 32 (id=2849): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x83, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) flock(0xffffffffffffffff, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}}], 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) timer_create(0x0, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000200)='bridge0\x00') 2m31.993469336s ago: executing program 0 (id=4143): perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x10000000}, 0x800, 0xc8, 0xffff, 0x7, 0xf9, 0xfffffffc, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000b40)='neigh_create\x00', r0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) 2m31.933449227s ago: executing program 0 (id=4144): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000104000000000000feffffffffffffff030000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000008400050020010000000000000000000000000000000000002b00000000000000000000000000000000000000000500000000000002000700000000000000000000000000e00000020000000000000000000000004000000033"], 0x13c}}, 0x20040880) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$char_usb(r2, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffff0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_dev$usbfs(0x0, 0x205, 0x286540) r8 = fcntl$dupfd(r7, 0x0, r7) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES16=r4, @ANYRESOCT=r0, @ANYRESDEC=r1, @ANYRESHEX=r1], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000900)={@private2, 0x0}, &(0x7f0000000940)=0x14) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000005c0)={'vlan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000000f40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000980)={&(0x7f0000000f80)=ANY=[@ANYBLOB="2c050000", @ANYRES16=0x0, @ANYBLOB="01002dbd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="800102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004008000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400ffffffff08000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004009800000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400c90000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000800000008000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c000400040006b2ecf3ffff08000100", @ANYRES32=r10, @ANYBLOB="2801028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000500000034000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000004000400400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000200000008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040005000000"], 0x52c}, 0x1, 0x0, 0x0, 0x4000854}, 0x4000010) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r12) syz_usb_connect(0x0, 0x24, &(0x7f00000006c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(r12, 0x41015500, &(0x7f0000000500)) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='mm_page_free\x00', r13}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r9}, 0x18) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xe4}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 2m30.361752647s ago: executing program 0 (id=4170): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2m30.344035187s ago: executing program 0 (id=4172): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x845, &(0x7f00000000c0)={[{@fat=@flush}, {@shortname_winnt}, {@rodir}, {@fat=@showexec}, {@utf8no}]}, 0x0, 0x274, &(0x7f0000000780)="$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") syz_mount_image$iso9660(&(0x7f0000000840), &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRESOCT], 0x2, 0x69a, &(0x7f0000000d80)="$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") mount$bind(&(0x7f0000000500)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1333404, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f0000000240)='.\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1005848, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) quotactl_fd$Q_GETINFO(0xffffffffffffffff, 0xffffffff80000500, 0x0, &(0x7f0000000300)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='irq_handler_exit\x00', r1, 0x0, 0x2}, 0x6) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x0, @rand_addr=0x64010100}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xce03d4}, 0x9c) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff3}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x3}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) (async) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x845, &(0x7f00000000c0)={[{@fat=@flush}, {@shortname_winnt}, {@rodir}, {@fat=@showexec}, {@utf8no}]}, 0x0, 0x274, &(0x7f0000000780)="$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") (async) syz_mount_image$iso9660(&(0x7f0000000840), &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRESOCT], 0x2, 0x69a, &(0x7f0000000d80)="$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") (async) mount$bind(&(0x7f0000000500)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1333404, 0x0) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x20000, 0x0) (async) mount$bind(&(0x7f0000000240)='.\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1005848, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) quotactl_fd$Q_GETINFO(0xffffffffffffffff, 0xffffffff80000500, 0x0, &(0x7f0000000300)) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='irq_handler_exit\x00', r1, 0x0, 0x2}, 0x6) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) shutdown(r2, 0x0) (async) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x0, @rand_addr=0x64010100}]}, &(0x7f0000000180)=0x10) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xce03d4}, 0x9c) (async) socket(0x10, 0x3, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff3}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x3}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) (async) 2m30.273890959s ago: executing program 0 (id=4174): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60"], 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xd50, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 2m29.863581793s ago: executing program 0 (id=4178): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r0}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) unshare(0x20040600) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000004c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/2) msgget$private(0x0, 0xe4) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r2, &(0x7f0000000480)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40000}, 0x1c, 0x0, 0x0, &(0x7f00000029c0)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x28}}], 0x1, 0x4) 2m29.863295284s ago: executing program 33 (id=4178): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r0}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) unshare(0x20040600) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000004c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/2) msgget$private(0x0, 0xe4) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r2, &(0x7f0000000480)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40000}, 0x1c, 0x0, 0x0, &(0x7f00000029c0)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x28}}], 0x1, 0x4) 3.059422972s ago: executing program 4 (id=6238): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xa2bb1000) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x8, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x6}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r5, 0x6) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r7 = accept(r4, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0xfffffdef}}, 0x0) 2.119426334s ago: executing program 4 (id=6262): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000104000000000000feffffffffffffff030000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000008400050020010000000000000000000000000000000000002b00000000000000000000000000000000000000000500000000000002000700000000000000000000000000e00000020000000000000000000000004000000033"], 0x13c}}, 0x20040880) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$char_usb(r2, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffff0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x286540) r8 = fcntl$dupfd(r7, 0x0, r7) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES16=r4, @ANYRESOCT=r0, @ANYRESDEC=r1, @ANYRESHEX=r1], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000900)={@private2, 0x0}, &(0x7f0000000940)=0x14) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000005c0)={'vlan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000000f40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000980)={&(0x7f0000000f80)=ANY=[@ANYBLOB="2c050000", @ANYRES16=0x0, @ANYBLOB="01002dbd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="800102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004008000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400ffffffff08000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004009800000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400c90000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000800000008000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c000400040006b2ecf3ffff08000100", @ANYRES32=r10, @ANYBLOB="2801028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000500000034000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000004000400400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000200000008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008"], 0x52c}, 0x1, 0x0, 0x0, 0x4000854}, 0x4000010) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r12) syz_usb_connect(0x0, 0x24, &(0x7f00000006c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(r12, 0x41015500, &(0x7f0000000500)) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='mm_page_free\x00', r13}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r9}, 0x18) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xe4}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 1.501132631s ago: executing program 5 (id=6280): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2) 1.483429502s ago: executing program 5 (id=6281): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f0000000bc0)=ANY=[@ANYBLOB="757466383d302c757466383d302c6572726f72733d636f6e74696e75652c756e695f786c5974653d312c6e6f6e756d7461696c3d302c726f6469722c696f636861727365743d63703433372c756e695f786c6174653d302c726f6469722c747a3d5554432c73686f72746e616d653d77696e39352c756e695f786c6174653d312c6e66733d6e6f7374616c655f06002c73686f72746e616d653d77696e39352c646f733178666c6f7070792c757466383d302c636865636b3d72656c617865642c00"], 0x6, 0x2d2, &(0x7f00000008c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000003680)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000200)=0x7ffffffc) ioctl$EVIOCGRAB(r2, 0x40044590, 0x0) bpf$MAP_CREATE(0x2000000000000021, &(0x7f0000000340)=@bloom_filter={0x1e, 0xaf, 0x89, 0xaa93, 0x4000, 0xffffffffffffffff, 0x1fa, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0xa, @void, @value, @void, @value}, 0x50) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/16], 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0xfffffffffffffdec) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="2000230c1100"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x28, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x2) readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) 1.407292122s ago: executing program 5 (id=6282): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_emit_ethernet(0x36, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="08010000", @ANYBLOB="1f6918acdeed86c24f759696fa3b2be4cab5640cd661898b8a858550c13b5099908b6d7347bf"], 0x108}, 0x1, 0x0, 0x0, 0x4010}, 0x4040094) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2010008, &(0x7f0000000100)={[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/snd/seq\x00'}}]}, 0xff, 0x531, &(0x7f0000000640)="$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") 1.386829773s ago: executing program 5 (id=6283): pipe2(&(0x7f0000000040), 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x66200, 0x0) 1.311318664s ago: executing program 6 (id=6285): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x400, 0x80, 0x0, 0x21e}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x3ff, 0x2, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xde, 0x52d, &(0x7f0000001500)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=ANY=[], 0x835, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000006040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@getchain={0x24, 0x66, 0x201, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0xd, 0x4}, {0x1, 0xfff1}, {0xf, 0xfff2}}}, 0x24}, 0x1, 0x0, 0x0, 0x8c8}, 0x20004804) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0x40305829, &(0x7f00000003c0)={0x17c04, 0xffffffffffffffff, 0x4ea, 0x10001, 0x0, 0x8}) 1.256608475s ago: executing program 6 (id=6287): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="acc870bde54caaeacb0000108cef4fa7bf44702b284b2e80cb32d33a86853c8c28797c", 0x23}, {&(0x7f0000000840)="b1f56ee29c433328d3b2a83bd97e37007087acae7568edff43ed556d76770122635aea1dc48755381c71590cd542e796cc2669e2af442a03760c5cdfc691b3da35ad6a8d2ef9c2baa53a8dec36a2e434d46e643a1277b1dd932f3ef2cf46c257d6a19523b8b789ef34b46e461725b5e437323385b88c368f8bb5b933aa9169f5f7b51dd5319b8016623d1863d70581691a79a6678db1e5e7fa1c98c5b9e4a87272e9", 0xa2}], 0x2}}], 0x1, 0xc0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)='H', 0xfffffffffffffe64, 0x10008095, 0x0, 0x0) 1.083259717s ago: executing program 2 (id=6293): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000010000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000116608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.005789538s ago: executing program 2 (id=6294): sched_setattr(0x0, 0x0, 0x0) mlockall(0x7) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f00000002c0)=';', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000380)="12", 0x1}], 0x1}}], 0x2, 0x10) syz_usb_disconnect(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) shutdown(r0, 0x2) 869.679249ms ago: executing program 4 (id=6296): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000001}, 0x1100, 0x5dd8, 0x0, 0x8, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800002, &(0x7f0000000000)={[{@noblock_validity}, {@dioread_nolock}, {@errors_remount}, {@minixdf}, {@jqfmt_vfsv0}, {@usrjquota, 0x2e}], [], 0x22}, 0x84, 0x464, &(0x7f0000000ac0)="$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") getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@mcast2, 0x0}, &(0x7f00000002c0)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x8}}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x5}, {0xb, 0x4}, {0xc, 0x1}, {0x4, 0x1}, {0x5, 0x2}, {0x6, 0x4}, {0x7}]}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000300)=""/60, 0x78, 0x3c, 0x1, 0x1, 0x0, @void, @value}, 0x28) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r5, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001100), 0x4) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r8, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) setsockopt$bt_hci_HCI_FILTER(r8, 0x0, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001380)={0xffffffffffffffff, 0x20, &(0x7f0000001340)={&(0x7f0000001180)=""/207, 0xcf, 0x0, &(0x7f0000001280)=""/190, 0xbe}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000f80)=@raw=[@tail_call, @generic={0x9, 0x0, 0x1, 0x4, 0x7}, @ringbuf_query, @generic={0x2c, 0x6, 0x9, 0x7fff, 0x3}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000001080)='syzkaller\x00', 0x1, 0x11, &(0x7f00000010c0)=""/17, 0x41100, 0x4, '\x00', r5, 0x1b, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001140)={0x4, 0xe, 0xfffffffc, 0x6}, 0x10, r9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x8, &(0x7f0000000080)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x40, '\x00', r2, @fallback=0x10, r3, 0x8, &(0x7f0000000500)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xd, 0x10000, 0x5}, 0x10, r9, r1, 0x2, 0x0, &(0x7f0000000580)=[{0x0, 0x2, 0x2, 0x3}, {0x1, 0x1, 0xb, 0xa}], 0x10, 0x6, @void, @value}, 0x94) r10 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r10, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000e600000000508cb6c8e6d517dc0000001100008736e4865ae94597f9f4791bc6c0", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r12}, 0x10) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, r13, 0x1, 0x0, 0x0, {0x1a}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0x2c}}, 0x0) 788.131541ms ago: executing program 4 (id=6299): sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) ioctl$TIOCL_SETVESABLANK(r3, 0x560e, &(0x7f0000000140)) 730.224301ms ago: executing program 1 (id=6301): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r0, 0xfffffffc) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)={0x28, r3, 0x1, 0x70bd2c, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x1c}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}]}, 0x28}, 0x1, 0xff07}, 0x2000000) 715.149461ms ago: executing program 1 (id=6302): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) 696.849011ms ago: executing program 1 (id=6303): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f0000000bc0)=ANY=[@ANYBLOB="757466383d302c757466383d302c6572726f72733d636f6e74696e75652c756e695f786c5974653d312c6e6f6e756d7461696c3d302c726f6469722c696f636861727365743d63703433372c756e695f786c6174653d302c726f6469722c747a3d5554432c73686f72746e616d653d77696e39352c756e695f786c6174653d312c6e66733d6e6f7374616c655f06002c73686f72746e616d653d77696e39352c646f733178666c6f7070792c757466383d302c636865636b3d72656c617865642c00"], 0x6, 0x2d2, &(0x7f00000008c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000003680)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000200)=0x7ffffffc) ioctl$EVIOCGRAB(r2, 0x40044590, 0x0) bpf$MAP_CREATE(0x2000000000000021, &(0x7f0000000340)=@bloom_filter={0x1e, 0xaf, 0x89, 0xaa93, 0x4000, 0xffffffffffffffff, 0x1fa, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0xa, @void, @value, @void, @value}, 0x50) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/16], 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0xfffffffffffffdec) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="2000230c1100"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x28, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000077cb0000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000202020db1af80801000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000ca00000095"], &(0x7f0000000400)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00170000000000120000f1850000007d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 662.294432ms ago: executing program 1 (id=6304): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000002000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), &(0x7f0000000a40)=r1}, 0x20) 662.002942ms ago: executing program 1 (id=6305): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2f00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021bc0000000c0a01010000000000000000070000000900020073797a31000000000900010073797a3000000000900003808c000080080003400000000280000b807c000180090001006c617374000000006c000280080001400000000508000140000000090c0002"], 0x140}}, 0x0) 638.271012ms ago: executing program 1 (id=6306): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000104000000000000feffffffffffffff030000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000008400050020010000000000000000000000000000000000002b00000000000000000000000000000000000000000500000000000002000700000000000000000000000000e00000020000000000000000000000004000000033"], 0x13c}}, 0x20040880) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$char_usb(r2, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffff0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x286540) r8 = fcntl$dupfd(r7, 0x0, r7) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYRESHEX=r5, @ANYRES16=r4, @ANYRESOCT=r0, @ANYRESDEC=r1, @ANYRESHEX=r1], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000900)={@private2, 0x0}, &(0x7f0000000940)=0x14) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000005c0)={'vlan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000000f40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000980)={&(0x7f0000000f80)=ANY=[@ANYBLOB="2c050000", @ANYRES16=0x0, @ANYBLOB="01002dbd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="800102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004008000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400ffffffff08000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004009800000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400c90000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000800000008000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c000400040006b2ecf3ffff08000100", @ANYRES32=r10, @ANYBLOB="2801028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000500000034000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000004000400400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000200000008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040005"], 0x52c}, 0x1, 0x0, 0x0, 0x4000854}, 0x4000010) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r12) syz_usb_connect(0x0, 0x24, &(0x7f00000006c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(r12, 0x41015500, &(0x7f0000000500)) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='mm_page_free\x00', r13}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r9}, 0x18) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xe4}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 613.181032ms ago: executing program 4 (id=6307): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x6, 0x0) 555.539333ms ago: executing program 4 (id=6308): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x400, 0x80, 0x0, 0x21e}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) io_uring_enter(r1, 0x47fa, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x3ff, 0x2, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xde, 0x52d, &(0x7f0000001500)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=ANY=[], 0x835, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r8, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000006040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@getchain={0x24, 0x66, 0x201, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0xd, 0x4}, {0x1, 0xfff1}, {0xf, 0xfff2}}}, 0x24}, 0x1, 0x0, 0x0, 0x8c8}, 0x20004804) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) 501.513324ms ago: executing program 5 (id=6309): r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) r1 = socket(0x15, 0x5, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt(r1, 0x200000000114, 0x2715, 0x0, &(0x7f0000000000)) 484.394374ms ago: executing program 5 (id=6310): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) sendmsg$can_j1939(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)="4905d6a348eb34d2c2", 0x9}}, 0x40) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000340)={0x1d, r4, 0x1, {0x2, 0x0, 0x6}, 0xfe}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r2, {0xfffd, 0xffeb}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x850) 409.111535ms ago: executing program 6 (id=6311): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_read_part_table(0x60d, &(0x7f0000002200)="$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") 324.144286ms ago: executing program 6 (id=6312): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000001}, 0x1100, 0x5dd8, 0x0, 0x8, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800002, &(0x7f0000000000)={[{@noblock_validity}, {@dioread_nolock}, {@errors_remount}, {@minixdf}, {@jqfmt_vfsv0}, {@usrjquota, 0x2e}], [], 0x22}, 0x84, 0x464, &(0x7f0000000ac0)="$eJzs3EtvG0UcAPD/bpq+S0Ipjz6AQEFEPJImLdADFxBIvSAhwaEcQ5pWpWmDmiDRKqIpQuWI+gmAIxKfgBNcEHACcYU7QqpQLgQOaNHau6lx7GAncZ3g30/aeGZ31jt/7449O2MngJ41lP9JIvZGxM8RMRARffUFhqoPS4vzk38uzk8mkWWv/57ku8Ufi/OTZdGkeNxTZIbTiPTDJA43OO7slasXJqanpy4X+dG5i++Mzl65+sz5ixPnps5NXRo/efLE8bHnnxt/dkPi3JfX9dD7M0cOnnrz5quTp2++9d0XeX33Fttr46gaXPcxh2Jo+TWp9/i6n31z2VeTTrZ1sSK0JW/r+enqr7T/geiL2ydvIF75oKuVAzoqy7Jsx4q1yz2AhQz4H0ui2zUAuqP8oM/vf8vlDnY/uu7Wi9UboDzupWKpbtkWaVGmv+7+diMNRcTphb8+yZdoOA4BALCxvsr7P0836v+lcV9NubuKuaHBiLg7IvZHxD0RcSAi7o2olL0/Ih5o8/hDdfmV/Z8fd60psBbl/b8Xirmtf/f/yt5fDPYVuX2V+PuTs+enp44Vr8lw9O/I82OrHOPrl3/6uNm22v5fviz1x2TZFyzq8du2ugG6MxNzE+uJudat65UxwGsr40+WZwKSiDgYEYfW8Pw7I+L8k58fabZ9RfyL83Xxr2ID5pmyzyKeqJ7/haiLv5SsPj85ujOmp46NllfFSt//cOO1ZsdfV/wbID//uxte/8vxDya187Wz7R/jxi8fNb2n+e/4G1//25M3Kuntxbr3JubmLo9FbE8WVq4fv71vmS/L5/EPH23c/vdH/P1psd/hiMgv4gcj4qGIeLio+yMR8WhEHF0l/m9feuzttcffWXn8Z9o6/+0n+i5882Wz47d2/k9UUsPFmlbe/1qt4HpeOwAAANgq0sp34JN0ZDmdpiMj1e/wH4jd6fTM7NxTZ2fevXSm+l35wehPy5GugZrx0LFibLjMj9flj1fGjbMsy3ZV8iOTM9OdmlMHWrOnSfvP/drX7doBHdfWPFqzX7QBW5Lfa0Lv0v6hd2n/0Lu0f+hdjdr/tYilVXe63rHqAHeQz3/oXdo/9C7tH3qX9g89aT2/618tsf9Ua4XLf0DYoWpsgUTf5qhG24lIN0U11pZIN0c1qokdEdFq4Wt3rKV0+Y0JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgg/wTAAD//7YA6Ok=") getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@mcast2, 0x0}, &(0x7f00000002c0)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x8}}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xb, 0x5}, {0xb, 0x4}, {0xc, 0x1}, {0x4, 0x1}, {0x5, 0x2}, {0x6, 0x4}, {0x7}]}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000300)=""/60, 0x78, 0x3c, 0x1, 0x1, 0x0, @void, @value}, 0x28) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r5, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001100), 0x4) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r8, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) setsockopt$bt_hci_HCI_FILTER(r8, 0x0, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001380)={0xffffffffffffffff, 0x20, &(0x7f0000001340)={&(0x7f0000001180)=""/207, 0xcf, 0x0, &(0x7f0000001280)=""/190, 0xbe}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000f80)=@raw=[@tail_call, @generic={0x9, 0x0, 0x1, 0x4, 0x7}, @ringbuf_query, @generic={0x2c, 0x6, 0x9, 0x7fff, 0x3}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000001080)='syzkaller\x00', 0x1, 0x11, &(0x7f00000010c0)=""/17, 0x41100, 0x4, '\x00', r5, 0x1b, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001140)={0x4, 0xe, 0xfffffffc, 0x6}, 0x10, r9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x8, &(0x7f0000000080)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x40, '\x00', r2, @fallback=0x10, r3, 0x8, &(0x7f0000000500)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xd, 0x10000, 0x5}, 0x10, r9, r1, 0x2, 0x0, &(0x7f0000000580)=[{0x0, 0x2, 0x2, 0x3}, {0x1, 0x1, 0xb, 0xa}], 0x10, 0x6, @void, @value}, 0x94) r10 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r10, &(0x7f0000000240)=@reiserfs_2={0x8, 0x2, {0xb}}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000e600000000508cb6c8e6d517dc0000001100008736e4865ae94597f9f4791bc6c0", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r12}, 0x10) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, r13, 0x1, 0x0, 0x0, {0x1a}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0x2c}}, 0x0) 288.152306ms ago: executing program 6 (id=6313): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) 269.309157ms ago: executing program 6 (id=6314): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fdf, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioperm(0x0, 0xd, 0x4000000000000020) unshare(0x62040200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x800810, &(0x7f0000000180)={[{@nobh}, {@max_dir_size_kb}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="d80000001b0001002dbd7000fddbdf2500000000000000000000000000000000ac1e00010000000000000000000000004e2200004e23000c0a00008032000000", @ANYRES32=0x0, @ANYBLOB="00080009000000008000000000000000f8ffffffffffffffff01000000000000010000000000000001000000000000800900000000000000000000008015010002000000000000000100000000000000fd002ceb3950466f6ff00000000000000700000000000000000002030000000029000000000000000c001500"], 0xd8}, 0x1, 0x0, 0x0, 0xc044}, 0x8010) memfd_create(&(0x7f0000000580)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec=\x9e\xc3\xfd\x85d\x0fl5\xf3\xbe\" 6\r<\xea\x8dz\xcf6\x99\x91\xear8p\xaaR\xd5\xa6\xab#N>\x9a\xdf\xea\x009\xfbB\xc1\xd0_\xc0\'Z\xeb\xd8\xaf\xf0\'J\xe2\xff\xe5x*;(p\xf7p\xce\xbb\xa7\xfe\x04\xd0t\x81\x1a\x1b?m/\x1ex\xf8\x88^\xbaU\xb9\xa6\xab\x8d\a\xa6\"\xd9\x13\xeb\xe2\rh\x8dsx\xaa!\xd5Q\xf8\xce*\x95\x0es\xfaZ\x94t\x19\xdc\xdc\xcf\x0f\x9a\xa2O>\xb9\xfc\x01\fW\xee\xffh\xbd\xb2\xb4z\xeb\x84\x13\x13u\x8f', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={r1}, &(0x7f0000000180)=0x8) 224.588487ms ago: executing program 2 (id=6315): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f0000000bc0)=ANY=[@ANYBLOB="757466383d302c757466383d302c6572726f72733d636f6e74696e75652c756e695f786c5974653d312c6e6f6e756d7461696c3d302c726f6469722c696f636861727365743d63703433372c756e695f786c6174653d302c726f6469722c747a3d5554432c73686f72746e616d653d77696e39352c756e695f786c6174653d312c6e66733d6e6f7374616c655f06002c73686f72746e616d653d77696e39352c646f733178666c6f7070792c757466383d302c636865636b3d72656c617865642c00"], 0x6, 0x2d2, &(0x7f00000008c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000003680)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000200)=0x7ffffffc) ioctl$EVIOCGRAB(r2, 0x40044590, 0x0) bpf$MAP_CREATE(0x2000000000000021, &(0x7f0000000340)=@bloom_filter={0x1e, 0xaf, 0x89, 0xaa93, 0x4000, 0xffffffffffffffff, 0x1fa, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0xa, @void, @value, @void, @value}, 0x50) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/16], 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0xfffffffffffffdec) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="2000230c1100"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x28, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000077cb0000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000202020db1af80801000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000ca00000095"], &(0x7f0000000400)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00170000000000120000f1850000007d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 174.152238ms ago: executing program 2 (id=6316): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2f00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021bc0000000c0a01010000000000000000070000000900020073797a31000000000900010073797a3000000000900003808c000080080003400000000280000b807c000180090001006c617374000000006c000280080001400000000508000140000000090c0002"], 0x140}}, 0x0) 173.738508ms ago: executing program 2 (id=6317): sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) ioctl$TIOCL_SETVESABLANK(r3, 0x560e, &(0x7f0000000140)) 0s ago: executing program 2 (id=6318): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) r1 = creat(&(0x7f0000000080)='./bus\x00', 0xcb) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02"], 0xfe44, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000005c0)='./control\x00', 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000100000000000100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000fffb9500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) umount2(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x18) socket$inet6_icmp(0xa, 0x2, 0x3a) getitimer(0x0, &(0x7f0000000440)) syz_extract_tcp_res(&(0x7f0000000080), 0x80000000, 0xa) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) r3 = semget$private(0x0, 0x4, 0x181) semctl$SEM_STAT_ANY(r3, 0x1, 0x14, &(0x7f00000000c0)=""/88) semop(r3, &(0x7f0000000600)=[{0x3, 0x1ec9, 0x800}], 0x1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) pread64(r4, &(0x7f0000000340)=""/114, 0x72, 0x100000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x8, 0x3, 0x298, 0xf8, 0xffffffff, 0xffffffff, 0xf8, 0xffffffff, 0x1c8, 0xffffffff, 0xffffffff, 0x1c8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x3}, [], [], 'batadv0\x00', 'wg1\x00', {}, {}, 0x6, 0x0, 0x6}, 0x0, 0xd0, 0xf8, 0x0, {0x0, 0x4c00}, [@common=@inet=@socket2={{0x28}, 0x1}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2f8) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x8, 0x1, 0x9, 0x200, 0x0, 0x24}, &(0x7f0000000100)=0x9c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000240)={r8, 0x6}, 0x8) kernel console output (not intermixed with test programs): lter+0x69d/0x10d0 [ 968.384433][T19119] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 968.384465][T19119] ? vfs_write+0x75e/0x8d0 [ 968.384571][T19119] __secure_computing+0x82/0x150 [ 968.384591][T19119] syscall_trace_enter+0xcf/0x1e0 [ 968.384616][T19119] do_syscall_64+0xaa/0x1a0 [ 968.384646][T19119] ? clear_bhb_loop+0x40/0x90 [ 968.384671][T19119] ? clear_bhb_loop+0x40/0x90 [ 968.384697][T19119] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 968.384722][T19119] RIP: 0033:0x7fe8a870e969 [ 968.384738][T19119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 968.384805][T19119] RSP: 002b:00007fe8a6d77038 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 968.384821][T19119] RAX: ffffffffffffffda RBX: 00007fe8a8935fa0 RCX: 00007fe8a870e969 [ 968.384832][T19119] RDX: 0000200000000140 RSI: 000000000000000e RDI: 0000000000000000 [ 968.384925][T19119] RBP: 00007fe8a6d77090 R08: 0000000000000000 R09: 0000000000000000 [ 968.384940][T19119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 968.384954][T19119] R13: 0000000000000000 R14: 00007fe8a8935fa0 R15: 00007ffeecae0f38 [ 968.384977][T19119] [ 968.734779][T19147] xt_TCPMSS: Only works on TCP SYN packets [ 969.146746][T19160] netlink: 'syz.1.4667': attribute type 11 has an invalid length. [ 969.340663][T19170] FAULT_INJECTION: forcing a failure. [ 969.340663][T19170] name failslab, interval 1, probability 0, space 0, times 0 [ 969.353397][T19170] CPU: 1 UID: 0 PID: 19170 Comm: syz.2.4671 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 969.353431][T19170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 969.353447][T19170] Call Trace: [ 969.353454][T19170] [ 969.353463][T19170] __dump_stack+0x1d/0x30 [ 969.353502][T19170] dump_stack_lvl+0xe8/0x140 [ 969.353526][T19170] dump_stack+0x15/0x1b [ 969.353623][T19170] should_fail_ex+0x265/0x280 [ 969.353662][T19170] should_failslab+0x8c/0xb0 [ 969.353698][T19170] kmem_cache_alloc_noprof+0x50/0x310 [ 969.353762][T19170] ? dst_alloc+0xbd/0x100 [ 969.353778][T19170] dst_alloc+0xbd/0x100 [ 969.353794][T19170] ip_route_output_key_hash_rcu+0xebb/0x13d0 [ 969.353910][T19170] ip_route_output_flow+0x7b/0x130 [ 969.353957][T19170] udp_sendmsg+0x118b/0x13a0 [ 969.353987][T19170] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 969.354071][T19170] ? avc_has_perm+0xd3/0x150 [ 969.354104][T19170] ? __pfx_udp_sendmsg+0x10/0x10 [ 969.354130][T19170] inet_sendmsg+0xac/0xd0 [ 969.354312][T19170] __sock_sendmsg+0x102/0x180 [ 969.354351][T19170] ____sys_sendmsg+0x345/0x4e0 [ 969.354385][T19170] ___sys_sendmsg+0x17b/0x1d0 [ 969.354434][T19170] __sys_sendmmsg+0x178/0x300 [ 969.354468][T19170] __x64_sys_sendmmsg+0x57/0x70 [ 969.354503][T19170] x64_sys_call+0x2f2f/0x2fb0 [ 969.354530][T19170] do_syscall_64+0xd0/0x1a0 [ 969.354594][T19170] ? clear_bhb_loop+0x40/0x90 [ 969.354625][T19170] ? clear_bhb_loop+0x40/0x90 [ 969.354655][T19170] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 969.354682][T19170] RIP: 0033:0x7fa1ab07e969 [ 969.354702][T19170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 969.354762][T19170] RSP: 002b:00007fa1a96e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 969.354787][T19170] RAX: ffffffffffffffda RBX: 00007fa1ab2a5fa0 RCX: 00007fa1ab07e969 [ 969.354804][T19170] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000003 [ 969.354847][T19170] RBP: 00007fa1a96e7090 R08: 0000000000000000 R09: 0000000000000000 [ 969.354879][T19170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 969.354896][T19170] R13: 0000000000000000 R14: 00007fa1ab2a5fa0 R15: 00007fff0838f028 [ 969.354989][T19170] [ 969.663705][T19179] FAULT_INJECTION: forcing a failure. [ 969.663705][T19179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 969.676871][T19179] CPU: 0 UID: 0 PID: 19179 Comm: syz.5.4674 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 969.676906][T19179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 969.677003][T19179] Call Trace: [ 969.677012][T19179] [ 969.677021][T19179] __dump_stack+0x1d/0x30 [ 969.677067][T19179] dump_stack_lvl+0xe8/0x140 [ 969.677154][T19179] dump_stack+0x15/0x1b [ 969.677202][T19179] should_fail_ex+0x265/0x280 [ 969.677239][T19179] should_fail+0xb/0x20 [ 969.677270][T19179] should_fail_usercopy+0x1a/0x20 [ 969.677297][T19179] _copy_to_user+0x20/0xa0 [ 969.677398][T19179] simple_read_from_buffer+0xb5/0x130 [ 969.677432][T19179] proc_fail_nth_read+0x100/0x140 [ 969.677464][T19179] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 969.677624][T19179] vfs_read+0x19d/0x6f0 [ 969.677653][T19179] ? __rcu_read_unlock+0x4f/0x70 [ 969.677680][T19179] ? __fget_files+0x184/0x1c0 [ 969.677711][T19179] ksys_read+0xda/0x1a0 [ 969.677828][T19179] __x64_sys_read+0x40/0x50 [ 969.677875][T19179] x64_sys_call+0x2d77/0x2fb0 [ 969.677897][T19179] do_syscall_64+0xd0/0x1a0 [ 969.677932][T19179] ? clear_bhb_loop+0x40/0x90 [ 969.677971][T19179] ? clear_bhb_loop+0x40/0x90 [ 969.677995][T19179] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 969.678023][T19179] RIP: 0033:0x7fd6c107d37c [ 969.678043][T19179] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 969.678122][T19179] RSP: 002b:00007fd6bf6e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 969.678141][T19179] RAX: ffffffffffffffda RBX: 00007fd6c12a5fa0 RCX: 00007fd6c107d37c [ 969.678159][T19179] RDX: 000000000000000f RSI: 00007fd6bf6e70a0 RDI: 0000000000000003 [ 969.678176][T19179] RBP: 00007fd6bf6e7090 R08: 0000000000000000 R09: 0000000000000000 [ 969.678192][T19179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 969.678291][T19179] R13: 0000000000000000 R14: 00007fd6c12a5fa0 R15: 00007ffc5ead79d8 [ 969.678309][T19179] [ 969.961287][T19190] vxcan1 speed is unknown, defaulting to 1000 [ 969.971455][T19195] wg2: left promiscuous mode [ 969.976377][T19195] wg2: left allmulticast mode [ 970.006257][T19195] wg2: entered promiscuous mode [ 970.011546][T19195] wg2: entered allmulticast mode [ 970.040772][T19200] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4680'. [ 970.078300][T19199] syz.5.4678: attempt to access beyond end of device [ 970.078300][T19199] loop11: rw=0, sector=0, nr_sectors = 1 limit=0 [ 970.091356][T19199] FAT-fs (loop11): unable to read boot sector [ 970.335287][T19213] vxcan1 speed is unknown, defaulting to 1000 [ 970.444585][T19218] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4686'. [ 970.498859][T19217] xt_TCPMSS: Only works on TCP SYN packets [ 970.945052][T19233] wg2: left promiscuous mode [ 970.950241][T19233] wg2: left allmulticast mode [ 970.984203][T19233] wg2: entered promiscuous mode [ 970.989401][T19233] wg2: entered allmulticast mode [ 971.108499][T19242] vxcan1 speed is unknown, defaulting to 1000 [ 971.151478][T19247] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4697'. [ 971.480311][T19256] block device autoloading is deprecated and will be removed. [ 971.491970][T19256] syz.1.4701: attempt to access beyond end of device [ 971.491970][T19256] loop3: rw=0, sector=0, nr_sectors = 1 limit=0 [ 971.507405][T19256] FAT-fs (loop3): unable to read boot sector [ 971.514036][T19255] syz.6.4702: attempt to access beyond end of device [ 971.514036][T19255] loop13: rw=0, sector=0, nr_sectors = 1 limit=0 [ 971.530415][T19255] FAT-fs (loop13): unable to read boot sector [ 972.030765][T19268] wg2: left promiscuous mode [ 972.035685][T19268] wg2: left allmulticast mode [ 972.128350][T19269] wg2: entered promiscuous mode [ 972.133258][T19269] wg2: entered allmulticast mode [ 972.460038][T19298] random: crng reseeded on system resumption [ 972.520637][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 972.520650][ T29] audit: type=1326 audit(1747890446.160:5678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19297 comm="syz.2.4717" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x0 [ 972.605761][T19307] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4721'. [ 972.609706][ T29] audit: type=1326 audit(1747890446.240:5679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.638229][ T29] audit: type=1326 audit(1747890446.240:5680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.661805][ T29] audit: type=1326 audit(1747890446.240:5681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.685304][ T29] audit: type=1326 audit(1747890446.240:5682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.708937][ T29] audit: type=1326 audit(1747890446.240:5683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.732464][ T29] audit: type=1326 audit(1747890446.240:5684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.756028][ T29] audit: type=1326 audit(1747890446.240:5685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.779558][ T29] audit: type=1326 audit(1747890446.240:5686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.803209][ T29] audit: type=1326 audit(1747890446.240:5687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19306 comm="syz.2.4722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 972.901191][T19319] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 972.911986][T19319] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 974.046745][T19365] wg2: left promiscuous mode [ 974.051935][T19365] wg2: left allmulticast mode [ 974.091019][T19365] wg2: entered promiscuous mode [ 974.096405][T19365] wg2: entered allmulticast mode [ 974.901604][T19395] xt_TCPMSS: Only works on TCP SYN packets [ 975.316296][T19411] vxcan1 speed is unknown, defaulting to 1000 [ 975.464946][T19427] FAULT_INJECTION: forcing a failure. [ 975.464946][T19427] name failslab, interval 1, probability 0, space 0, times 0 [ 975.477692][T19427] CPU: 1 UID: 0 PID: 19427 Comm: syz.1.4764 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 975.477798][T19427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 975.477813][T19427] Call Trace: [ 975.477819][T19427] [ 975.477826][T19427] __dump_stack+0x1d/0x30 [ 975.477848][T19427] dump_stack_lvl+0xe8/0x140 [ 975.477901][T19427] dump_stack+0x15/0x1b [ 975.477920][T19427] should_fail_ex+0x265/0x280 [ 975.477957][T19427] should_failslab+0x8c/0xb0 [ 975.478049][T19427] kmem_cache_alloc_node_noprof+0x57/0x320 [ 975.478087][T19427] ? __alloc_skb+0x101/0x320 [ 975.478121][T19427] __alloc_skb+0x101/0x320 [ 975.478161][T19427] netlink_alloc_large_skb+0xba/0xf0 [ 975.478279][T19427] netlink_sendmsg+0x3cf/0x6b0 [ 975.478339][T19427] ? __pfx_netlink_sendmsg+0x10/0x10 [ 975.478363][T19427] __sock_sendmsg+0x145/0x180 [ 975.478464][T19427] ____sys_sendmsg+0x31e/0x4e0 [ 975.478491][T19427] ___sys_sendmsg+0x17b/0x1d0 [ 975.478530][T19427] __x64_sys_sendmsg+0xd4/0x160 [ 975.478559][T19427] x64_sys_call+0x2999/0x2fb0 [ 975.478620][T19427] do_syscall_64+0xd0/0x1a0 [ 975.478687][T19427] ? clear_bhb_loop+0x40/0x90 [ 975.478712][T19427] ? clear_bhb_loop+0x40/0x90 [ 975.478784][T19427] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 975.478803][T19427] RIP: 0033:0x7f372ff7e969 [ 975.478815][T19427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 975.478834][T19427] RSP: 002b:00007f372e5e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 975.478855][T19427] RAX: ffffffffffffffda RBX: 00007f37301a5fa0 RCX: 00007f372ff7e969 [ 975.478869][T19427] RDX: 0000000000000800 RSI: 0000200000000380 RDI: 0000000000000003 [ 975.478883][T19427] RBP: 00007f372e5e7090 R08: 0000000000000000 R09: 0000000000000000 [ 975.479038][T19427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 975.479051][T19427] R13: 0000000000000000 R14: 00007f37301a5fa0 R15: 00007ffc7f3847b8 [ 975.479073][T19427] [ 975.696671][T19433] random: crng reseeded on system resumption [ 976.552034][T19463] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 976.558539][T19463] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 976.687073][T19463] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.754611][T19463] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.815447][T19470] syz.6.4776: attempt to access beyond end of device [ 976.815447][T19470] loop13: rw=0, sector=0, nr_sectors = 1 limit=0 [ 976.877560][T19470] FAT-fs (loop13): unable to read boot sector [ 976.898708][T19463] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.960309][T19463] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 977.031418][T19463] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.045349][T19463] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.069904][T19463] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.086437][T19463] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.259956][T19491] random: crng reseeded on system resumption [ 977.768782][ T29] kauditd_printk_skb: 197 callbacks suppressed [ 977.768799][ T29] audit: type=1326 audit(1747890451.410:5885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 977.863963][ T29] audit: type=1326 audit(1747890451.440:5886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 977.887662][ T29] audit: type=1326 audit(1747890451.440:5887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 977.911109][ T29] audit: type=1326 audit(1747890451.440:5888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 977.934654][ T29] audit: type=1326 audit(1747890451.450:5889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=66 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 977.958111][ T29] audit: type=1326 audit(1747890451.450:5890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 977.981598][ T29] audit: type=1326 audit(1747890451.450:5891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 978.005050][ T29] audit: type=1326 audit(1747890451.450:5892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 978.028603][ T29] audit: type=1326 audit(1747890451.450:5893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 978.052076][ T29] audit: type=1326 audit(1747890451.450:5894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19496 comm="syz.2.4790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1ab07e969 code=0x7ffc0000 [ 978.294597][T19514] FAULT_INJECTION: forcing a failure. [ 978.294597][T19514] name failslab, interval 1, probability 0, space 0, times 0 [ 978.307350][T19514] CPU: 1 UID: 0 PID: 19514 Comm: syz.2.4798 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 978.307436][T19514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 978.307449][T19514] Call Trace: [ 978.307455][T19514] [ 978.307462][T19514] __dump_stack+0x1d/0x30 [ 978.307489][T19514] dump_stack_lvl+0xe8/0x140 [ 978.307587][T19514] dump_stack+0x15/0x1b [ 978.307606][T19514] should_fail_ex+0x265/0x280 [ 978.307641][T19514] should_failslab+0x8c/0xb0 [ 978.307676][T19514] __kmalloc_cache_node_noprof+0x54/0x320 [ 978.307766][T19514] ? __get_vm_area_node+0x106/0x1d0 [ 978.307813][T19514] __get_vm_area_node+0x106/0x1d0 [ 978.307842][T19514] __vmalloc_node_range_noprof+0x26a/0xdf0 [ 978.307931][T19514] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 978.307968][T19514] ? avc_has_perm_noaudit+0x1b1/0x200 [ 978.307997][T19514] ? selinux_capable+0x1f9/0x270 [ 978.308029][T19514] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 978.308058][T19514] __vmalloc_noprof+0x5f/0x70 [ 978.308114][T19514] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 978.308153][T19514] bpf_prog_alloc_no_stats+0x47/0x390 [ 978.308220][T19514] ? bpf_prog_alloc+0x2a/0x150 [ 978.308253][T19514] bpf_prog_alloc+0x3c/0x150 [ 978.308374][T19514] bpf_prog_load+0x514/0x1070 [ 978.308429][T19514] ? security_bpf+0x2b/0x90 [ 978.308457][T19514] __sys_bpf+0x51d/0x790 [ 978.308499][T19514] __x64_sys_bpf+0x41/0x50 [ 978.308673][T19514] x64_sys_call+0x2478/0x2fb0 [ 978.308702][T19514] do_syscall_64+0xd0/0x1a0 [ 978.308726][T19514] ? clear_bhb_loop+0x40/0x90 [ 978.308752][T19514] ? clear_bhb_loop+0x40/0x90 [ 978.308853][T19514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.308874][T19514] RIP: 0033:0x7fa1ab07e969 [ 978.308889][T19514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 978.308909][T19514] RSP: 002b:00007fa1a96e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 978.308933][T19514] RAX: ffffffffffffffda RBX: 00007fa1ab2a5fa0 RCX: 00007fa1ab07e969 [ 978.308951][T19514] RDX: 0000000000000090 RSI: 0000200000000200 RDI: 0000000000000005 [ 978.308968][T19514] RBP: 00007fa1a96e7090 R08: 0000000000000000 R09: 0000000000000000 [ 978.309018][T19514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 978.309074][T19514] R13: 0000000000000000 R14: 00007fa1ab2a5fa0 R15: 00007fff0838f028 [ 978.309104][T19514] [ 978.545504][T19514] syz.2.4798: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 978.561652][T19514] CPU: 1 UID: 0 PID: 19514 Comm: syz.2.4798 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 978.561808][T19514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 978.561819][T19514] Call Trace: [ 978.561825][T19514] [ 978.561832][T19514] __dump_stack+0x1d/0x30 [ 978.561851][T19514] dump_stack_lvl+0xe8/0x140 [ 978.561869][T19514] dump_stack+0x15/0x1b [ 978.561883][T19514] warn_alloc+0x12b/0x1a0 [ 978.561916][T19514] __vmalloc_node_range_noprof+0x28e/0xdf0 [ 978.561943][T19514] ? avc_has_perm_noaudit+0x1b1/0x200 [ 978.561969][T19514] ? selinux_capable+0x1f9/0x270 [ 978.561996][T19514] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 978.562043][T19514] __vmalloc_noprof+0x5f/0x70 [ 978.562067][T19514] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 978.562093][T19514] bpf_prog_alloc_no_stats+0x47/0x390 [ 978.562162][T19514] ? bpf_prog_alloc+0x2a/0x150 [ 978.562194][T19514] bpf_prog_alloc+0x3c/0x150 [ 978.562222][T19514] bpf_prog_load+0x514/0x1070 [ 978.562266][T19514] ? security_bpf+0x2b/0x90 [ 978.562294][T19514] __sys_bpf+0x51d/0x790 [ 978.562415][T19514] __x64_sys_bpf+0x41/0x50 [ 978.562446][T19514] x64_sys_call+0x2478/0x2fb0 [ 978.562518][T19514] do_syscall_64+0xd0/0x1a0 [ 978.562572][T19514] ? clear_bhb_loop+0x40/0x90 [ 978.562596][T19514] ? clear_bhb_loop+0x40/0x90 [ 978.562619][T19514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.562682][T19514] RIP: 0033:0x7fa1ab07e969 [ 978.562698][T19514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 978.562718][T19514] RSP: 002b:00007fa1a96e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 978.562737][T19514] RAX: ffffffffffffffda RBX: 00007fa1ab2a5fa0 RCX: 00007fa1ab07e969 [ 978.562750][T19514] RDX: 0000000000000090 RSI: 0000200000000200 RDI: 0000000000000005 [ 978.562793][T19514] RBP: 00007fa1a96e7090 R08: 0000000000000000 R09: 0000000000000000 [ 978.562806][T19514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 978.562869][T19514] R13: 0000000000000000 R14: 00007fa1ab2a5fa0 R15: 00007fff0838f028 [ 978.562890][T19514] [ 978.562903][T19514] Mem-Info: [ 978.776741][T19514] active_anon:124865 inactive_anon:0 isolated_anon:0 [ 978.776741][T19514] active_file:26370 inactive_file:2593 isolated_file:0 [ 978.776741][T19514] unevictable:0 dirty:286 writeback:0 [ 978.776741][T19514] slab_reclaimable:3683 slab_unreclaimable:39525 [ 978.776741][T19514] mapped:29764 shmem:101208 pagetables:926 [ 978.776741][T19514] sec_pagetables:0 bounce:0 [ 978.776741][T19514] kernel_misc_reclaimable:0 [ 978.776741][T19514] free:1737898 free_pcp:9325 free_cma:0 [ 978.821901][T19514] Node 0 active_anon:495980kB inactive_anon:0kB active_file:105480kB inactive_file:10372kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:119056kB dirty:1144kB writeback:0kB shmem:401468kB writeback_tmp:0kB kernel_stack:3200kB pagetables:3704kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 978.851398][T19514] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 978.878411][T19514] lowmem_reserve[]: 0 2884 7863 7863 [ 978.883721][T19514] Node 0 DMA32 free:2950028kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953560kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB [ 978.912030][T19514] lowmem_reserve[]: 0 0 4978 4978 [ 978.917241][T19514] Node 0 Normal free:3990612kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:490644kB inactive_anon:0kB active_file:105480kB inactive_file:10372kB unevictable:0kB writepending:1144kB present:5242880kB managed:5098244kB mlocked:0kB bounce:0kB free_pcp:37640kB local_pcp:23708kB free_cma:0kB [ 978.947756][T19514] lowmem_reserve[]: 0 0 0 0 [ 978.952370][T19514] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 978.965209][T19514] Node 0 DMA32: 3*4kB (M) 4*8kB (M) 2*16kB (M) 4*32kB (M) 3*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2950028kB [ 978.981532][T19514] Node 0 Normal: 1714*4kB (UME) 1828*8kB (UME) 3012*16kB (UME) 1298*32kB (UME) 338*64kB (UME) 112*128kB (UME) 55*256kB (UM) 39*512kB (UME) 38*1024kB (UM) 28*2048kB (UME) 908*4096kB (UM) = 3996648kB [ 979.001143][T19514] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 979.010548][T19514] 127326 total pagecache pages [ 979.015320][T19514] 0 pages in swap cache [ 979.019492][T19514] Free swap = 124996kB [ 979.023724][T19514] Total swap = 124996kB [ 979.027912][T19514] 2097051 pages RAM [ 979.031781][T19514] 0 pages HighMem/MovableOnly [ 979.036463][T19514] 80260 pages reserved [ 979.685384][T19552] xt_TCPMSS: Only works on TCP SYN packets [ 980.156822][T19578] netlink: 76 bytes leftover after parsing attributes in process `syz.6.4820'. [ 980.482337][T19592] random: crng reseeded on system resumption [ 980.723425][T19607] vxcan1 speed is unknown, defaulting to 1000 [ 980.818426][T19612] random: crng reseeded on system resumption [ 981.034560][T19624] random: crng reseeded on system resumption [ 981.727783][T19650] wg2: left promiscuous mode [ 981.732822][T19650] wg2: left allmulticast mode [ 981.751668][T19650] wg2: entered promiscuous mode [ 981.756849][T19650] wg2: entered allmulticast mode [ 982.046574][T19679] wg2: left promiscuous mode [ 982.054855][T19679] wg2: left allmulticast mode [ 982.086728][T19679] wg2: entered promiscuous mode [ 982.092738][T19679] wg2: entered allmulticast mode [ 982.162787][T19685] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4865'. [ 982.174808][T19685] vlan0: entered allmulticast mode [ 982.293818][T19687] syz.6.4860: attempt to access beyond end of device [ 982.293818][T19687] loop13: rw=0, sector=0, nr_sectors = 1 limit=0 [ 982.376456][T19687] FAT-fs (loop13): unable to read boot sector [ 982.520986][T19697] capability: warning: `syz.2.4868' uses 32-bit capabilities (legacy support in use) [ 982.531381][T19697] program syz.2.4868 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 982.576398][T19701] random: crng reseeded on system resumption [ 982.834173][ T29] kauditd_printk_skb: 292 callbacks suppressed [ 982.834190][ T29] audit: type=1326 audit(1747890456.470:6187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 982.864119][ T29] audit: type=1326 audit(1747890456.470:6188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 982.933541][ T29] audit: type=1326 audit(1747890456.470:6189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 982.957121][ T29] audit: type=1326 audit(1747890456.470:6190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 982.980731][ T29] audit: type=1326 audit(1747890456.470:6191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 983.004354][ T29] audit: type=1326 audit(1747890456.470:6192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd6c107d2d0 code=0x7ffc0000 [ 983.027932][ T29] audit: type=1326 audit(1747890456.470:6193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 983.051539][ T29] audit: type=1326 audit(1747890456.470:6194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 983.074999][ T29] audit: type=1326 audit(1747890456.470:6195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19705 comm="syz.5.4872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 983.099947][T19715] wg2: left promiscuous mode [ 983.105317][T19715] wg2: left allmulticast mode [ 983.116927][T19717] wg2: entered promiscuous mode [ 983.121833][T19717] wg2: entered allmulticast mode [ 983.343117][ T29] audit: type=1326 audit(1747890456.980:6196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19733 comm="syz.4.4882" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 983.567943][T19754] vxcan1 speed is unknown, defaulting to 1000 [ 983.800688][T19764] random: crng reseeded on system resumption [ 984.053610][T19787] random: crng reseeded on system resumption [ 984.660452][T19842] IPv6: NLM_F_CREATE should be specified when creating new route [ 985.071405][T19873] FAULT_INJECTION: forcing a failure. [ 985.071405][T19873] name failslab, interval 1, probability 0, space 0, times 0 [ 985.084328][T19873] CPU: 1 UID: 0 PID: 19873 Comm: syz.5.4935 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 985.084400][T19873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 985.084416][T19873] Call Trace: [ 985.084423][T19873] [ 985.084429][T19873] __dump_stack+0x1d/0x30 [ 985.084514][T19873] dump_stack_lvl+0xe8/0x140 [ 985.084540][T19873] dump_stack+0x15/0x1b [ 985.084556][T19873] should_fail_ex+0x265/0x280 [ 985.084586][T19873] should_failslab+0x8c/0xb0 [ 985.084614][T19873] kmem_cache_alloc_noprof+0x50/0x310 [ 985.084642][T19873] ? skb_clone+0x151/0x1f0 [ 985.084663][T19873] skb_clone+0x151/0x1f0 [ 985.084688][T19873] __netlink_deliver_tap+0x2c9/0x500 [ 985.084797][T19873] netlink_unicast+0x64c/0x670 [ 985.084836][T19873] netlink_sendmsg+0x58b/0x6b0 [ 985.084860][T19873] ? __pfx_netlink_sendmsg+0x10/0x10 [ 985.084903][T19873] __sock_sendmsg+0x145/0x180 [ 985.084988][T19873] ____sys_sendmsg+0x31e/0x4e0 [ 985.085013][T19873] ___sys_sendmsg+0x17b/0x1d0 [ 985.085047][T19873] __x64_sys_sendmsg+0xd4/0x160 [ 985.085069][T19873] x64_sys_call+0x2999/0x2fb0 [ 985.085090][T19873] do_syscall_64+0xd0/0x1a0 [ 985.085141][T19873] ? clear_bhb_loop+0x40/0x90 [ 985.085160][T19873] ? clear_bhb_loop+0x40/0x90 [ 985.085186][T19873] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 985.085207][T19873] RIP: 0033:0x7fd6c107e969 [ 985.085264][T19873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 985.085320][T19873] RSP: 002b:00007fd6bf6e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 985.085339][T19873] RAX: ffffffffffffffda RBX: 00007fd6c12a5fa0 RCX: 00007fd6c107e969 [ 985.085439][T19873] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000003 [ 985.085450][T19873] RBP: 00007fd6bf6e7090 R08: 0000000000000000 R09: 0000000000000000 [ 985.085464][T19873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 985.085478][T19873] R13: 0000000000000000 R14: 00007fd6c12a5fa0 R15: 00007ffc5ead79d8 [ 985.085570][T19873] [ 985.137621][T19873] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4935'. [ 985.301380][T19873] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4935'. [ 985.554639][T19892] netlink: 24 bytes leftover after parsing attributes in process `+}[@'. [ 985.624194][T19911] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4953'. [ 985.636255][T19911] netlink: 'syz.4.4953': attribute type 4 has an invalid length. [ 985.815429][T19940] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4967'. [ 985.824483][T19940] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4967'. [ 985.833426][T19940] netlink: 2 bytes leftover after parsing attributes in process `syz.1.4967'. [ 985.948597][T19962] wg2: left promiscuous mode [ 985.953605][T19962] wg2: left allmulticast mode [ 986.001530][T19962] wg2: entered promiscuous mode [ 986.006079][T19972] FAULT_INJECTION: forcing a failure. [ 986.006079][T19972] name failslab, interval 1, probability 0, space 0, times 0 [ 986.006741][T19962] wg2: entered allmulticast mode [ 986.019180][T19972] CPU: 0 UID: 0 PID: 19972 Comm: syz.6.4979 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 986.019211][T19972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 986.019287][T19972] Call Trace: [ 986.019294][T19972] [ 986.019302][T19972] __dump_stack+0x1d/0x30 [ 986.019326][T19972] dump_stack_lvl+0xe8/0x140 [ 986.019349][T19972] dump_stack+0x15/0x1b [ 986.019366][T19972] should_fail_ex+0x265/0x280 [ 986.019470][T19972] should_failslab+0x8c/0xb0 [ 986.019509][T19972] kmem_cache_alloc_noprof+0x50/0x310 [ 986.019533][T19972] ? skb_clone+0x151/0x1f0 [ 986.019560][T19972] skb_clone+0x151/0x1f0 [ 986.019611][T19972] __netlink_deliver_tap+0x2c9/0x500 [ 986.019640][T19972] netlink_unicast+0x64c/0x670 [ 986.019718][T19972] netlink_sendmsg+0x58b/0x6b0 [ 986.019767][T19972] ? __pfx_netlink_sendmsg+0x10/0x10 [ 986.019828][T19972] __sock_sendmsg+0x145/0x180 [ 986.019895][T19972] ____sys_sendmsg+0x31e/0x4e0 [ 986.019957][T19972] ___sys_sendmsg+0x17b/0x1d0 [ 986.020082][T19972] __x64_sys_sendmsg+0xd4/0x160 [ 986.020112][T19972] x64_sys_call+0x2999/0x2fb0 [ 986.020138][T19972] do_syscall_64+0xd0/0x1a0 [ 986.020166][T19972] ? clear_bhb_loop+0x40/0x90 [ 986.020191][T19972] ? clear_bhb_loop+0x40/0x90 [ 986.020245][T19972] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 986.020269][T19972] RIP: 0033:0x7fe8a870e969 [ 986.020287][T19972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 986.020308][T19972] RSP: 002b:00007fe8a6d77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 986.020356][T19972] RAX: ffffffffffffffda RBX: 00007fe8a8935fa0 RCX: 00007fe8a870e969 [ 986.020371][T19972] RDX: 0000000000000000 RSI: 0000200000001200 RDI: 0000000000000003 [ 986.020386][T19972] RBP: 00007fe8a6d77090 R08: 0000000000000000 R09: 0000000000000000 [ 986.020400][T19972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.020415][T19972] R13: 0000000000000000 R14: 00007fe8a8935fa0 R15: 00007ffeecae0f38 [ 986.020462][T19972] [ 986.315133][T19989] xt_TCPMSS: Only works on TCP SYN packets [ 986.458718][T20015] netlink: 76 bytes leftover after parsing attributes in process `syz.6.4995'. [ 986.492359][T20018] Cannot find add_set index 0 as target [ 986.498974][T20018] netlink: 76 bytes leftover after parsing attributes in process `syz.1.4997'. [ 986.553367][T20021] wg2: left promiscuous mode [ 986.559117][T20021] wg2: left allmulticast mode [ 986.579084][T20021] wg2: entered promiscuous mode [ 986.584492][T20021] wg2: entered allmulticast mode [ 986.709819][T20025] IPv6: NLM_F_CREATE should be specified when creating new route [ 986.785804][T20030] FAULT_INJECTION: forcing a failure. [ 986.785804][T20030] name failslab, interval 1, probability 0, space 0, times 0 [ 986.798557][T20030] CPU: 1 UID: 0 PID: 20030 Comm: syz.2.5004 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 986.798600][T20030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 986.798614][T20030] Call Trace: [ 986.798622][T20030] [ 986.798628][T20030] __dump_stack+0x1d/0x30 [ 986.798648][T20030] dump_stack_lvl+0xe8/0x140 [ 986.798714][T20030] dump_stack+0x15/0x1b [ 986.798729][T20030] should_fail_ex+0x265/0x280 [ 986.798765][T20030] should_failslab+0x8c/0xb0 [ 986.798801][T20030] __kmalloc_cache_node_noprof+0x54/0x320 [ 986.798825][T20030] ? __get_vm_area_node+0x106/0x1d0 [ 986.798912][T20030] __get_vm_area_node+0x106/0x1d0 [ 986.798966][T20030] __vmalloc_node_range_noprof+0x26a/0xdf0 [ 986.798988][T20030] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 986.799077][T20030] ? avc_has_perm_noaudit+0x1b1/0x200 [ 986.799103][T20030] ? selinux_capable+0x1f9/0x270 [ 986.799138][T20030] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 986.799183][T20030] __vmalloc_noprof+0x5f/0x70 [ 986.799208][T20030] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 986.799235][T20030] bpf_prog_alloc_no_stats+0x47/0x390 [ 986.799301][T20030] ? bpf_prog_alloc+0x2a/0x150 [ 986.799408][T20030] bpf_prog_alloc+0x3c/0x150 [ 986.799440][T20030] bpf_prog_load+0x514/0x1070 [ 986.799484][T20030] ? security_bpf+0x2b/0x90 [ 986.799511][T20030] __sys_bpf+0x51d/0x790 [ 986.799543][T20030] __x64_sys_bpf+0x41/0x50 [ 986.799577][T20030] x64_sys_call+0x2478/0x2fb0 [ 986.799600][T20030] do_syscall_64+0xd0/0x1a0 [ 986.799626][T20030] ? clear_bhb_loop+0x40/0x90 [ 986.799664][T20030] ? clear_bhb_loop+0x40/0x90 [ 986.799720][T20030] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 986.799744][T20030] RIP: 0033:0x7fa1ab07e969 [ 986.799761][T20030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 986.799780][T20030] RSP: 002b:00007fa1a96e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 986.799838][T20030] RAX: ffffffffffffffda RBX: 00007fa1ab2a5fa0 RCX: 00007fa1ab07e969 [ 986.799852][T20030] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 986.799913][T20030] RBP: 00007fa1a96e7090 R08: 0000000000000000 R09: 0000000000000000 [ 986.799925][T20030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.799938][T20030] R13: 0000000000000000 R14: 00007fa1ab2a5fa0 R15: 00007fff0838f028 [ 986.799959][T20030] [ 987.052257][T20033] nfs: Unknown parameter '' [ 987.605794][T20054] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5015'. [ 987.822069][T20063] random: crng reseeded on system resumption [ 988.044005][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 988.044023][ T29] audit: type=1326 audit(1747890461.680:6350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.073772][ T29] audit: type=1326 audit(1747890461.680:6351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.097359][ T29] audit: type=1326 audit(1747890461.680:6352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.121009][ T29] audit: type=1326 audit(1747890461.680:6353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.144615][ T29] audit: type=1326 audit(1747890461.680:6354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.266138][ T29] audit: type=1326 audit(1747890461.680:6355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd6c107d2d0 code=0x7ffc0000 [ 988.289718][ T29] audit: type=1326 audit(1747890461.680:6356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.313446][ T29] audit: type=1326 audit(1747890461.680:6357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.336856][ T29] audit: type=1326 audit(1747890461.680:6358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20073 comm="syz.5.5024" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 988.360495][ T29] audit: type=1326 audit(1747890461.900:6359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20081 comm="syz.4.5027" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 988.483752][T20092] random: crng reseeded on system resumption [ 988.495740][T20094] netlink: 60 bytes leftover after parsing attributes in process `syz.1.5033'. [ 988.505098][T20094] unsupported nlmsg_type 40 [ 988.676777][T20114] wg2: left promiscuous mode [ 988.682383][T20114] wg2: left allmulticast mode [ 988.742733][T20114] wg2: entered promiscuous mode [ 988.749163][T20114] wg2: entered allmulticast mode [ 988.766985][T20129] FAULT_INJECTION: forcing a failure. [ 988.766985][T20129] name failslab, interval 1, probability 0, space 0, times 0 [ 988.779643][T20129] CPU: 1 UID: 0 PID: 20129 Comm: syz.1.5045 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 988.779709][T20129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 988.779725][T20129] Call Trace: [ 988.779732][T20129] [ 988.779741][T20129] __dump_stack+0x1d/0x30 [ 988.779772][T20129] dump_stack_lvl+0xe8/0x140 [ 988.779795][T20129] dump_stack+0x15/0x1b [ 988.779809][T20129] should_fail_ex+0x265/0x280 [ 988.779937][T20129] should_failslab+0x8c/0xb0 [ 988.779968][T20129] kmem_cache_alloc_noprof+0x50/0x310 [ 988.779985][T20129] ? getname_flags+0x80/0x3b0 [ 988.780013][T20129] getname_flags+0x80/0x3b0 [ 988.780164][T20129] user_path_at+0x28/0x130 [ 988.780188][T20129] __se_sys_mount+0x25b/0x2e0 [ 988.780275][T20129] ? fput+0x8f/0xc0 [ 988.780296][T20129] __x64_sys_mount+0x67/0x80 [ 988.780341][T20129] x64_sys_call+0xd36/0x2fb0 [ 988.780365][T20129] do_syscall_64+0xd0/0x1a0 [ 988.780426][T20129] ? clear_bhb_loop+0x40/0x90 [ 988.780482][T20129] ? clear_bhb_loop+0x40/0x90 [ 988.780506][T20129] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.780530][T20129] RIP: 0033:0x7f372ff7e969 [ 988.780546][T20129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 988.780567][T20129] RSP: 002b:00007f372e5e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 988.780602][T20129] RAX: ffffffffffffffda RBX: 00007f37301a5fa0 RCX: 00007f372ff7e969 [ 988.780613][T20129] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 988.780627][T20129] RBP: 00007f372e5e7090 R08: 0000200000000300 R09: 0000000000000000 [ 988.780641][T20129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 988.780655][T20129] R13: 0000000000000000 R14: 00007f37301a5fa0 R15: 00007ffc7f3847b8 [ 988.780678][T20129] [ 989.062622][T20148] random: crng reseeded on system resumption [ 989.280897][T20166] qrtr: Invalid version 4 [ 989.575567][T20186] wg2: left promiscuous mode [ 989.580706][T20186] wg2: left allmulticast mode [ 989.631041][T20187] wg2: entered promiscuous mode [ 989.635971][T20187] wg2: entered allmulticast mode [ 990.606819][T20218] xt_TCPMSS: Only works on TCP SYN packets [ 990.747108][T20224] wg2: left promiscuous mode [ 990.752279][T20224] wg2: left allmulticast mode [ 990.818533][T20229] wg2: entered promiscuous mode [ 990.823436][T20229] wg2: entered allmulticast mode [ 992.038714][T20271] __nla_validate_parse: 2 callbacks suppressed [ 992.038732][T20271] netlink: 76 bytes leftover after parsing attributes in process `syz.1.5094'. [ 992.126625][T20274] block device autoloading is deprecated and will be removed. [ 992.195605][T20274] syz.5.5092: attempt to access beyond end of device [ 992.195605][T20274] loop11: rw=0, sector=0, nr_sectors = 1 limit=0 [ 992.303243][T20274] FAT-fs (loop11): unable to read boot sector [ 992.650617][T20280] xt_TCPMSS: Only works on TCP SYN packets [ 993.030815][T20290] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5102'. [ 993.285479][ T29] kauditd_printk_skb: 459 callbacks suppressed [ 993.285497][ T29] audit: type=1326 audit(1747890466.920:6819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.323623][ T29] audit: type=1326 audit(1747890466.920:6820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.348463][ T29] audit: type=1326 audit(1747890466.920:6821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.373199][ T29] audit: type=1326 audit(1747890466.920:6822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.397945][ T29] audit: type=1326 audit(1747890466.920:6823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.422658][ T29] audit: type=1326 audit(1747890466.920:6824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.425291][T20312] 9pnet_fd: Insufficient options for proto=fd [ 993.447354][ T29] audit: type=1326 audit(1747890466.920:6825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.478220][ T29] audit: type=1326 audit(1747890466.920:6826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 993.502933][ T29] audit: type=1326 audit(1747890466.920:6827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd6c107d2d0 code=0x7ffc0000 [ 993.510027][T20309] netlink: 'syz.1.5109': attribute type 1 has an invalid length. [ 993.527686][ T29] audit: type=1326 audit(1747890466.920:6828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20302 comm=24402C21292F2ECF232D212B2B exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fd6c1080197 code=0x7ffc0000 [ 993.572150][T20309] 8021q: adding VLAN 0 to HW filter on device bond1 [ 993.616446][T20321] vxcan1 speed is unknown, defaulting to 1000 [ 993.626389][T20309] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20309 comm=syz.1.5109 [ 993.781765][T20334] netlink: 76 bytes leftover after parsing attributes in process `syz.6.5119'. [ 994.581995][T20344] vxcan1 speed is unknown, defaulting to 1000 [ 994.601156][T20345] vxcan1: tx drop: invalid da for name 0x0000000000000002 [ 995.707113][T20361] vxcan1 speed is unknown, defaulting to 1000 [ 996.253766][T20377] random: crng reseeded on system resumption [ 996.802982][T20396] random: crng reseeded on system resumption [ 996.864061][T20402] vxcan1 speed is unknown, defaulting to 1000 [ 997.153050][T20420] block device autoloading is deprecated and will be removed. [ 997.162313][T20420] syz.4.5148: attempt to access beyond end of device [ 997.162313][T20420] loop9: rw=0, sector=0, nr_sectors = 1 limit=0 [ 997.163597][T20422] xt_TCPMSS: Only works on TCP SYN packets [ 997.187715][T20420] FAT-fs (loop9): unable to read boot sector [ 997.650452][T20445] random: crng reseeded on system resumption [ 998.275449][T20472] wg2: left promiscuous mode [ 998.281464][T20472] wg2: left allmulticast mode [ 998.309491][T20472] wg2: entered promiscuous mode [ 998.314878][T20472] wg2: entered allmulticast mode [ 998.503500][ T29] kauditd_printk_skb: 244 callbacks suppressed [ 998.503516][ T29] audit: type=1326 audit(1747890472.140:7073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.562916][ T29] audit: type=1326 audit(1747890472.170:7074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.586463][ T29] audit: type=1326 audit(1747890472.170:7075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.610081][ T29] audit: type=1326 audit(1747890472.170:7076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.633642][ T29] audit: type=1326 audit(1747890472.170:7077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.657221][ T29] audit: type=1326 audit(1747890472.170:7078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.680888][ T29] audit: type=1326 audit(1747890472.170:7079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.704493][ T29] audit: type=1326 audit(1747890472.170:7080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.728133][ T29] audit: type=1326 audit(1747890472.170:7081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.751732][ T29] audit: type=1326 audit(1747890472.170:7082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20481 comm="syz.6.5176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 998.978135][T20476] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 998.991422][T20476] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 999.019755][T20505] vxcan1 speed is unknown, defaulting to 1000 [ 999.293177][T20496] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 999.304546][T20496] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 999.729167][T20517] wg2: left promiscuous mode [ 999.734098][T20517] wg2: left allmulticast mode [ 999.754057][T20517] wg2: entered promiscuous mode [ 999.759427][T20517] wg2: entered allmulticast mode [ 999.792562][T20512] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 999.803479][T20512] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1000.194518][T20551] wg2: left promiscuous mode [ 1000.201376][T20551] wg2: left allmulticast mode [ 1000.232043][T20551] wg2: entered promiscuous mode [ 1000.237410][T20551] wg2: entered allmulticast mode [ 1000.318306][T20565] netlink: 76 bytes leftover after parsing attributes in process `syz.1.5208'. [ 1000.430508][T20539] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1000.458915][T20539] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1000.527294][T20576] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5213'. [ 1000.536348][T20575] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5213'. [ 1002.360712][T20624] syz.6.5231: attempt to access beyond end of device [ 1002.360712][T20624] loop13: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1002.409858][T20624] FAT-fs (loop13): unable to read boot sector [ 1002.721990][T20629] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5234'. [ 1002.987022][T20638] vxcan1 speed is unknown, defaulting to 1000 [ 1003.382586][T20655] vxcan1 speed is unknown, defaulting to 1000 [ 1003.523041][T20664] netlink: 76 bytes leftover after parsing attributes in process `syz.4.5248'. [ 1003.818820][T20669] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5250'. [ 1004.253827][T20668] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1004.267781][T20668] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1004.298758][T20685] vxcan1 speed is unknown, defaulting to 1000 [ 1004.534978][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 1004.534994][ T29] audit: type=1326 audit(1747890478.170:7114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20695 comm="syz.6.5262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1004.564673][ T29] audit: type=1326 audit(1747890478.170:7115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20695 comm="syz.6.5262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1004.662654][ T29] audit: type=1326 audit(1747890478.230:7116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20695 comm="syz.6.5262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe8a870d2d0 code=0x7ffc0000 [ 1004.686235][ T29] audit: type=1326 audit(1747890478.230:7117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20695 comm="syz.6.5262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1004.709728][ T29] audit: type=1326 audit(1747890478.230:7118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20695 comm="syz.6.5262" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1004.746821][T20709] xt_TCPMSS: Only works on TCP SYN packets [ 1004.758871][ T29] audit: type=1326 audit(1747890478.380:7119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1004.782746][ T29] audit: type=1326 audit(1747890478.380:7120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1004.806383][ T29] audit: type=1326 audit(1747890478.380:7121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1004.829972][ T29] audit: type=1326 audit(1747890478.380:7122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1004.853547][ T29] audit: type=1326 audit(1747890478.380:7123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1005.296177][T20770] netlink: 76 bytes leftover after parsing attributes in process `syz.2.5290'. [ 1005.562170][T20755] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1005.571432][T20755] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1006.913551][T20816] syz.5.5310: attempt to access beyond end of device [ 1006.913551][T20816] loop11: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1007.012974][T20816] FAT-fs (loop11): unable to read boot sector [ 1009.777175][T20870] syz.4.5331: attempt to access beyond end of device [ 1009.777175][T20870] loop9: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1009.798373][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 1009.798385][ T29] audit: type=1400 audit(1747890483.440:7320): avc: denied { create } for pid=20872 comm="syz.1.5334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1009.846379][ T29] audit: type=1400 audit(1747890483.460:7321): avc: denied { bind } for pid=20872 comm="syz.1.5334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1009.856599][T20870] FAT-fs (loop9): unable to read boot sector [ 1009.865742][ T29] audit: type=1400 audit(1747890483.460:7322): avc: denied { setopt } for pid=20872 comm="syz.1.5334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1010.135042][T20899] wg2: left promiscuous mode [ 1010.140451][T20899] wg2: left allmulticast mode [ 1010.158517][T20900] syz.5.5341: attempt to access beyond end of device [ 1010.158517][T20900] loop11: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1010.171589][T20900] FAT-fs (loop11): unable to read boot sector [ 1010.198227][T20903] wg2: entered promiscuous mode [ 1010.203130][T20903] wg2: entered allmulticast mode [ 1010.667286][T20920] vxcan1 speed is unknown, defaulting to 1000 [ 1011.497770][T20929] pim6reg: entered allmulticast mode [ 1011.542216][T20929] SELinux: syz.4.5356 (20929) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1011.661669][T20929] pim6reg: left allmulticast mode [ 1011.732274][T20936] netlink: 16 bytes leftover after parsing attributes in process `syz.6.5358'. [ 1011.828904][T20941] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5355'. [ 1011.911101][T20945] vlan2: entered allmulticast mode [ 1011.954559][T20954] wg2: left promiscuous mode [ 1011.960656][T20954] wg2: left allmulticast mode [ 1011.965433][T20945] serio: Serial port ptm0 [ 1012.021137][T20954] wg2: entered promiscuous mode [ 1012.026546][T20954] wg2: entered allmulticast mode [ 1012.453626][ T29] audit: type=1400 audit(1747890486.090:7323): avc: denied { ioctl } for pid=20978 comm="syz.5.5375" path="/dev/input/event2" dev="devtmpfs" ino=249 ioctlcmd=0x4590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1012.533930][T20979] serio: Serial port ptm0 [ 1013.003614][T20992] block device autoloading is deprecated and will be removed. [ 1013.071832][T21000] syz.4.5377: attempt to access beyond end of device [ 1013.071832][T21000] loop9: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1013.091786][T21001] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5379'. [ 1013.130087][T21002] wg2: left promiscuous mode [ 1013.134888][T21002] wg2: left allmulticast mode [ 1013.154167][T20992] syz.1.5367: attempt to access beyond end of device [ 1013.154167][T20992] loop3: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1013.210989][T21000] FAT-fs (loop9): unable to read boot sector [ 1013.264023][T21004] wg2: entered promiscuous mode [ 1013.269012][T21004] wg2: entered allmulticast mode [ 1013.366844][T20992] FAT-fs (loop3): unable to read boot sector [ 1013.443322][ T29] audit: type=1326 audit(1747890487.080:7324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21005 comm="syz.6.5382" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1013.587515][ T29] audit: type=1326 audit(1747890487.110:7325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21005 comm="syz.6.5382" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe8a870d2d0 code=0x7ffc0000 [ 1013.611102][ T29] audit: type=1326 audit(1747890487.110:7326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21005 comm="syz.6.5382" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1013.634619][ T29] audit: type=1326 audit(1747890487.110:7327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21005 comm="syz.6.5382" exe="/root/syz-executor" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1013.658068][ T29] audit: type=1326 audit(1747890487.110:7328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21005 comm="syz.6.5382" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7ffc0000 [ 1013.745016][T21017] netlink: 76 bytes leftover after parsing attributes in process `syz.5.5387'. [ 1013.758148][T21011] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5385'. [ 1013.823243][T21011] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1013.837743][ T29] audit: type=1400 audit(1747890487.470:7329): avc: denied { bind } for pid=21021 comm="syz.5.5389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1013.880710][T21011] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1013.970167][T21011] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1014.016404][T21011] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1014.064831][T21011] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1014.076722][T21011] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1014.088701][T21011] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1014.100423][T21011] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1015.004861][T21050] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5399'. [ 1015.041638][T21053] syz.4.5401 (21053): attempted to duplicate a private mapping with mremap. This is not supported. [ 1015.088566][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 1015.088581][ T29] audit: type=1400 audit(1747890488.730:7355): avc: denied { write } for pid=21052 comm="syz.4.5401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1015.375818][ T29] audit: type=1326 audit(1747890488.910:7356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.399455][ T29] audit: type=1326 audit(1747890488.910:7357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.422986][ T29] audit: type=1326 audit(1747890488.910:7358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.446482][ T29] audit: type=1326 audit(1747890488.910:7359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.470125][ T29] audit: type=1326 audit(1747890488.910:7360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.493614][ T29] audit: type=1326 audit(1747890488.910:7361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.517136][ T29] audit: type=1326 audit(1747890489.000:7362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.540689][ T29] audit: type=1326 audit(1747890489.000:7363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.564281][ T29] audit: type=1326 audit(1747890489.000:7364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21060 comm="syz.5.5405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=92 compat=0 ip=0x7fd6c107e969 code=0x7ffc0000 [ 1015.594643][T21064] xt_TCPMSS: Only works on TCP SYN packets [ 1015.660305][T21072] FAULT_INJECTION: forcing a failure. [ 1015.660305][T21072] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1015.673494][T21072] CPU: 0 UID: 0 PID: 21072 Comm: syz.1.5408 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 1015.673526][T21072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1015.673537][T21072] Call Trace: [ 1015.673542][T21072] [ 1015.673548][T21072] __dump_stack+0x1d/0x30 [ 1015.673651][T21072] dump_stack_lvl+0xe8/0x140 [ 1015.673674][T21072] dump_stack+0x15/0x1b [ 1015.673705][T21072] should_fail_ex+0x265/0x280 [ 1015.673802][T21072] should_fail+0xb/0x20 [ 1015.673827][T21072] should_fail_usercopy+0x1a/0x20 [ 1015.673846][T21072] _copy_to_user+0x20/0xa0 [ 1015.673872][T21072] simple_read_from_buffer+0xb5/0x130 [ 1015.673903][T21072] proc_fail_nth_read+0x100/0x140 [ 1015.673995][T21072] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1015.674017][T21072] vfs_read+0x19d/0x6f0 [ 1015.674112][T21072] ? __rcu_read_unlock+0x4f/0x70 [ 1015.674131][T21072] ? __rcu_read_unlock+0x4f/0x70 [ 1015.674150][T21072] ? __fget_files+0x184/0x1c0 [ 1015.674184][T21072] ksys_read+0xda/0x1a0 [ 1015.674231][T21072] __x64_sys_read+0x40/0x50 [ 1015.674257][T21072] x64_sys_call+0x2d77/0x2fb0 [ 1015.674330][T21072] do_syscall_64+0xd0/0x1a0 [ 1015.674357][T21072] ? clear_bhb_loop+0x40/0x90 [ 1015.674457][T21072] ? clear_bhb_loop+0x40/0x90 [ 1015.674493][T21072] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1015.674517][T21072] RIP: 0033:0x7f372ff7d37c [ 1015.674532][T21072] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1015.674552][T21072] RSP: 002b:00007f372e5e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1015.674573][T21072] RAX: ffffffffffffffda RBX: 00007f37301a5fa0 RCX: 00007f372ff7d37c [ 1015.674588][T21072] RDX: 000000000000000f RSI: 00007f372e5e70a0 RDI: 0000000000000006 [ 1015.674627][T21072] RBP: 00007f372e5e7090 R08: 0000000000000000 R09: 0000000000000000 [ 1015.674637][T21072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1015.674647][T21072] R13: 0000000000000000 R14: 00007f37301a5fa0 R15: 00007ffc7f3847b8 [ 1015.674724][T21072] [ 1015.983578][T21083] serio: Serial port ptm0 [ 1016.048954][T21086] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5415'. [ 1016.116461][T21086] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1016.123938][T21086] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1016.165294][T21091] xt_TCPMSS: Only works on TCP SYN packets [ 1016.190520][T21086] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1016.198070][T21086] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1017.609267][T21110] vlan2: entered allmulticast mode [ 1017.652608][T21112] serio: Serial port ptm0 [ 1017.763714][T21117] vxcan1 speed is unknown, defaulting to 1000 [ 1018.439987][T21121] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5426'. [ 1018.629178][T21134] random: crng reseeded on system resumption [ 1018.751178][T21136] SELinux: Context system_u:object_r:net_conf_t:s0 is not valid (left unmapped). [ 1018.905188][T21150] netlink: 76 bytes leftover after parsing attributes in process `syz.1.5439'. [ 1019.004166][T21155] vlan2: entered allmulticast mode [ 1019.049798][T21156] serio: Serial port ptm0 [ 1020.227740][T21195] netlink: 'syz.4.5457': attribute type 13 has an invalid length. [ 1020.235621][T21195] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5457'. [ 1020.288499][T21199] serio: Serial port ptm0 [ 1021.074180][T21245] serio: Serial port ptm1 [ 1021.308065][T21265] wg2: left promiscuous mode [ 1021.313282][T21265] wg2: left allmulticast mode [ 1021.369944][T21265] wg2: entered promiscuous mode [ 1021.375264][T21265] wg2: entered allmulticast mode [ 1021.437954][ T29] kauditd_printk_skb: 172 callbacks suppressed [ 1021.437972][ T29] audit: type=1326 audit(1747890495.080:7537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.467731][ T29] audit: type=1326 audit(1747890495.080:7538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.550746][T21271] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5485'. [ 1021.562062][ T29] audit: type=1326 audit(1747890495.130:7539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.585633][ T29] audit: type=1326 audit(1747890495.130:7540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.609152][ T29] audit: type=1326 audit(1747890495.130:7541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.632710][ T29] audit: type=1326 audit(1747890495.130:7542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.656203][ T29] audit: type=1326 audit(1747890495.130:7543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.679719][ T29] audit: type=1326 audit(1747890495.130:7544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.703227][ T29] audit: type=1326 audit(1747890495.130:7545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.726842][ T29] audit: type=1326 audit(1747890495.130:7546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21267 comm="syz.1.5486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f372ff7e969 code=0x7ffc0000 [ 1021.882294][T21281] serio: Serial port ptm0 [ 1021.925999][T21284] netlink: 76 bytes leftover after parsing attributes in process `syz.5.5491'. [ 1022.025746][T21297] netlink: 'syz.4.5497': attribute type 13 has an invalid length. [ 1022.033729][T21297] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5497'. [ 1022.100892][T21305] xt_TCPMSS: Only works on TCP SYN packets [ 1022.237650][T21318] serio: Serial port ptm1 [ 1022.699520][T21348] wg2: left promiscuous mode [ 1022.704496][T21348] wg2: left allmulticast mode [ 1022.725488][T21348] wg2: entered promiscuous mode [ 1022.730578][T21348] wg2: entered allmulticast mode [ 1023.105543][T21382] syz.4.5523: attempt to access beyond end of device [ 1023.105543][T21382] loop9: rw=0, sector=0, nr_sectors = 1 limit=0 [ 1023.157855][T21382] FAT-fs (loop9): unable to read boot sector [ 1023.198344][T21388] vxcan1 speed is unknown, defaulting to 1000 [ 1023.371590][T21400] serio: Serial port ptm0 [ 1024.483712][T21429] netlink: 76 bytes leftover after parsing attributes in process `syz.5.5553'. [ 1024.556840][T21434] netlink: 76 bytes leftover after parsing attributes in process `syz.2.5552'. [ 1024.576680][T21432] serio: Serial port ptm0 [ 1024.795217][T21445] random: crng reseeded on system resumption [ 1025.325584][T21452] vxcan1 speed is unknown, defaulting to 1000 [ 1025.564043][T21469] netlink: 76 bytes leftover after parsing attributes in process `syz.5.5565'. [ 1025.671006][T21479] serio: Serial port ptm0 [ 1025.741932][T21483] serio: Serial port ptm0 [ 1026.463019][ T29] kauditd_printk_skb: 213 callbacks suppressed [ 1026.463035][ T29] audit: type=1326 audit(1747890500.100:7760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.544061][ T29] audit: type=1326 audit(1747890500.130:7761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.567717][ T29] audit: type=1326 audit(1747890500.130:7762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.591211][ T29] audit: type=1326 audit(1747890500.130:7763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.614768][ T29] audit: type=1326 audit(1747890500.130:7764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.638478][ T29] audit: type=1326 audit(1747890500.130:7765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.662076][ T29] audit: type=1326 audit(1747890500.130:7766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.685567][ T29] audit: type=1326 audit(1747890500.140:7767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.694720][T21514] xt_TCPMSS: Only works on TCP SYN packets [ 1026.709055][ T29] audit: type=1326 audit(1747890500.140:7768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.738439][ T29] audit: type=1326 audit(1747890500.140:7769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21507 comm="syz.4.5580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=92 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1026.782418][T21516] xt_TCPMSS: Only works on TCP SYN packets [ 1027.710239][T21554] serio: Serial port ptm1 [ 1027.895930][T21575] netlink: 76 bytes leftover after parsing attributes in process `syz.2.5606'. [ 1028.081193][T21587] serio: Serial port ptm0 [ 1028.257840][T21595] vxcan1 speed is unknown, defaulting to 1000 [ 1028.581634][T21612] random: crng reseeded on system resumption [ 1028.790176][T21629] wg2: left promiscuous mode [ 1028.795192][T21629] wg2: left allmulticast mode [ 1028.815619][T21629] wg2: entered promiscuous mode [ 1028.821029][T21629] wg2: entered allmulticast mode [ 1029.000406][T21636] vxcan1 speed is unknown, defaulting to 1000 [ 1029.283931][T21636] chnl_net:caif_netlink_parms(): no params data found [ 1029.393214][T21636] bridge0: port 1(bridge_slave_0) entered blocking state [ 1029.400447][T21636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1029.408006][T21636] bridge_slave_0: entered allmulticast mode [ 1029.413766][T21678] random: crng reseeded on system resumption [ 1029.414677][T21636] bridge_slave_0: entered promiscuous mode [ 1029.427395][T21636] bridge0: port 2(bridge_slave_1) entered blocking state [ 1029.434605][T21636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.458220][T21636] bridge_slave_1: entered allmulticast mode [ 1029.464862][T21636] bridge_slave_1: entered promiscuous mode [ 1029.498149][T21636] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1029.521179][T21636] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1029.544697][T21684] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5644'. [ 1029.571272][T21636] team0: Port device team_slave_0 added [ 1029.578932][T21636] team0: Port device team_slave_1 added [ 1029.600418][T21636] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1029.607524][T21636] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1029.633590][T21636] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1029.648314][T21636] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1029.655377][T21636] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1029.681471][T21636] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1029.903623][T21636] hsr_slave_0: entered promiscuous mode [ 1029.924852][T21636] hsr_slave_1: entered promiscuous mode [ 1029.950212][T21636] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1029.981081][T21636] Cannot create hsr debugfs directory [ 1030.063753][T21636] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.119979][T21636] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.153142][T21709] wg2: left promiscuous mode [ 1030.158492][T21709] wg2: left allmulticast mode [ 1030.172855][T21636] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.185537][T21709] wg2: entered promiscuous mode [ 1030.191084][T21709] wg2: entered allmulticast mode [ 1030.232257][T21636] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.243599][T21712] random: crng reseeded on system resumption [ 1030.298125][T21714] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5654'. [ 1030.336281][T21636] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1030.365597][T21636] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1030.375157][T21717] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5655'. [ 1030.391581][T21719] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5656'. [ 1030.395231][T21636] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1030.409561][T21636] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1030.418659][T21717] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1030.426095][T21717] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1030.435781][T21717] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1030.443298][T21717] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1030.459549][T21719] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1030.467005][T21719] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1030.476807][T21719] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1030.484430][T21719] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1030.541367][T21636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1030.552757][T21731] serio: Serial port ptm1 [ 1030.556693][T21636] 8021q: adding VLAN 0 to HW filter on device team0 [ 1030.567675][T16830] bridge0: port 1(bridge_slave_0) entered blocking state [ 1030.574779][T16830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1030.587250][ T4844] bridge0: port 2(bridge_slave_1) entered blocking state [ 1030.594402][ T4844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1030.634519][T21736] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5664'. [ 1030.636617][T21636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1030.735376][T21636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1030.896809][T21772] serio: Serial port ptm0 [ 1030.939492][T21636] veth0_vlan: entered promiscuous mode [ 1030.954882][T21636] veth1_vlan: entered promiscuous mode [ 1030.972476][T21636] veth0_macvtap: entered promiscuous mode [ 1030.993877][T21636] veth1_macvtap: entered promiscuous mode [ 1031.008180][T21781] netlink: 88 bytes leftover after parsing attributes in process `syz.6.5677'. [ 1031.018754][T21636] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1031.031253][T21636] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1031.041861][T21636] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.050649][T21636] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.059390][T21636] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.068368][T21636] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.171326][T21796] serio: Serial port ptm0 [ 1031.179249][T21800] random: crng reseeded on system resumption [ 1031.228449][T21804] serio: Serial port ptm1 [ 1031.665813][T21837] random: crng reseeded on system resumption [ 1031.793420][ T29] kauditd_printk_skb: 470 callbacks suppressed [ 1031.793436][ T29] audit: type=1326 audit(1747890505.430:8240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.823418][ T29] audit: type=1326 audit(1747890505.430:8241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.850601][ T29] audit: type=1326 audit(1747890505.430:8242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.874152][ T29] audit: type=1326 audit(1747890505.440:8243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.897847][ T29] audit: type=1326 audit(1747890505.440:8244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=48 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.921343][ T29] audit: type=1326 audit(1747890505.440:8245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.944874][ T29] audit: type=1326 audit(1747890505.440:8246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=299 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.968537][ T29] audit: type=1326 audit(1747890505.440:8247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1031.992097][ T29] audit: type=1326 audit(1747890505.440:8248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1032.015769][ T29] audit: type=1326 audit(1747890505.440:8249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21853 comm="syz.5.5708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab93fee969 code=0x7ffc0000 [ 1032.045577][T21854] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5708'. [ 1032.054767][T21854] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1032.062207][T21854] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1032.070356][T21854] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1032.077953][T21854] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1032.265107][T21873] capability: warning: `syz.1.5715' uses deprecated v2 capabilities in a way that may be insecure [ 1033.853078][T21898] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5723'. [ 1034.369322][T21914] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5730'. [ 1034.876260][T21930] 9pnet_virtio: no channels available for device syz [ 1035.641283][T21946] syz_tun: entered allmulticast mode [ 1035.648095][T21946] xfrm0: entered allmulticast mode [ 1035.656903][T21946] dvmrp1: entered allmulticast mode [ 1035.686850][T21945] syz_tun: left allmulticast mode [ 1036.005577][T21970] netlink: 60 bytes leftover after parsing attributes in process `syz.1.5751'. [ 1036.129257][T21975] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1036.168045][T21975] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1037.285743][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 1037.285755][ T29] audit: type=1400 audit(1747890510.920:8303): avc: denied { create } for pid=22004 comm="syz.1.5764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1037.323882][ T29] audit: type=1400 audit(1747890510.950:8304): avc: denied { connect } for pid=22004 comm="syz.1.5764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1037.344045][ T29] audit: type=1400 audit(1747890510.950:8305): avc: denied { write } for pid=22004 comm="syz.1.5764" path="socket:[61972]" dev="sockfs" ino=61972 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1037.997324][ T29] audit: type=1326 audit(1747890511.630:8306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21992 comm="syz.6.5760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7fc00000 [ 1038.021115][ T29] audit: type=1326 audit(1747890511.630:8307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21992 comm="syz.6.5760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fe8a870e969 code=0x7fc00000 [ 1038.044614][ T29] audit: type=1326 audit(1747890511.630:8308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21992 comm="syz.6.5760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x7fc00000 [ 1038.349975][T22017] serio: Serial port ptm0 [ 1038.640299][T22030] xt_nat: multiple ranges no longer supported [ 1039.021779][ T29] audit: type=1400 audit(1747890512.280:8309): avc: denied { ioctl } for pid=22025 comm="syz.2.5771" path="socket:[62924]" dev="sockfs" ino=62924 ioctlcmd=0x48cb scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1039.163351][ T29] audit: type=1400 audit(1747890512.800:8310): avc: denied { sqpoll } for pid=22036 comm="syz.5.5774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1039.517375][T22040] atomic_op ffff888161f54d28 conn xmit_atomic 0000000000000000 [ 1039.525311][ T29] audit: type=1400 audit(1747890513.150:8311): avc: denied { write } for pid=22039 comm="syz.5.5775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1040.497359][ T29] audit: type=1400 audit(1747890513.570:8312): avc: denied { write } for pid=22044 comm="syz.6.5777" name="usbmon1" dev="devtmpfs" ino=143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1040.535054][T22054] dvmrp1: entered allmulticast mode [ 1041.721365][T22100] dvmrp1: entered allmulticast mode [ 1041.753613][T22102] vxcan1 speed is unknown, defaulting to 1000 [ 1041.795174][T22114] netlink: 'syz.1.5802': attribute type 1 has an invalid length. [ 1041.839199][T22114] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1041.867705][T22114] vlan2: entered promiscuous mode [ 1041.872782][T22114] bond2: entered promiscuous mode [ 1041.877986][T22114] vlan2: entered allmulticast mode [ 1041.883103][T22114] bond2: entered allmulticast mode [ 1041.901844][T22114] bond2: (slave gretap1): making interface the new active one [ 1041.909347][T22114] gretap1: entered promiscuous mode [ 1041.914687][T22114] gretap1: entered allmulticast mode [ 1041.921271][T22114] bond2: (slave gretap1): Enslaving as an active interface with an up link [ 1042.111165][T22137] syz_tun: entered allmulticast mode [ 1042.128557][T22136] syz_tun: left allmulticast mode [ 1042.556370][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 1042.556396][ T29] audit: type=1400 audit(1747890516.190:8326): avc: denied { watch watch_reads } for pid=22151 comm="syz.6.5818" path="/357" dev="tmpfs" ino=1909 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1042.587964][T22159] netlink: 36 bytes leftover after parsing attributes in process `syz.1.5819'. [ 1042.596937][T22159] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5819'. [ 1042.605977][T22159] netlink: 36 bytes leftover after parsing attributes in process `syz.1.5819'. [ 1042.614947][T22159] netlink: 36 bytes leftover after parsing attributes in process `syz.1.5819'. [ 1043.250761][ T29] audit: type=1400 audit(1747890516.880:8327): avc: denied { wake_alarm } for pid=22160 comm="syz.2.5820" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1044.487268][T22180] syz_tun: entered allmulticast mode [ 1044.493589][T22180] xfrm0: entered allmulticast mode [ 1044.510227][T22179] syz_tun: left allmulticast mode [ 1044.543548][T22183] batadv_slave_1: entered promiscuous mode [ 1044.560021][T22182] batadv_slave_1: left promiscuous mode [ 1045.061132][T22202] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5835'. [ 1045.309704][ C0] vcan0: j1939_tp_rxtimer: 0xffff88810e9f3600: rx timeout, send abort [ 1045.529128][ T29] audit: type=1400 audit(1747890519.150:8328): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1045.551312][ T29] audit: type=1400 audit(1747890519.150:8329): avc: denied { search } for pid=2987 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1045.573123][ T29] audit: type=1400 audit(1747890519.150:8330): avc: denied { write } for pid=2987 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1045.594669][ T29] audit: type=1400 audit(1747890519.150:8331): avc: denied { add_name } for pid=2987 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1045.615508][ T29] audit: type=1400 audit(1747890519.150:8332): avc: denied { create } for pid=2987 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1045.636249][ T29] audit: type=1400 audit(1747890519.150:8333): avc: denied { append open } for pid=2987 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1045.659508][ T29] audit: type=1400 audit(1747890519.150:8334): avc: denied { getattr } for pid=2987 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1046.050143][T21886] hid-generic 0000:0004:0000.0023: unknown main item tag 0x0 [ 1046.057771][T21886] hid-generic 0000:0004:0000.0023: unknown main item tag 0x0 [ 1046.065193][T21886] hid-generic 0000:0004:0000.0023: unknown main item tag 0x0 [ 1046.194999][T21886] hid-generic 0000:0004:0000.0023: hidraw0: HID v0.00 Device [syz0] on syz1 [ 1046.252752][T22226] fido_id[22226]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1046.345229][T22230] vxcan1 speed is unknown, defaulting to 1000 [ 1046.354942][ T29] audit: type=1400 audit(1747890519.990:8335): avc: denied { write } for pid=22227 comm="syz.6.5842" path="socket:[63241]" dev="sockfs" ino=63241 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1047.561194][ T29] audit: type=1326 audit(1747890521.200:8336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.623119][ T29] audit: type=1326 audit(1747890521.230:8337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.646689][ T29] audit: type=1326 audit(1747890521.230:8338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.670298][ T29] audit: type=1326 audit(1747890521.230:8339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.693781][ T29] audit: type=1326 audit(1747890521.230:8340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.717309][ T29] audit: type=1326 audit(1747890521.230:8341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.740813][ T29] audit: type=1326 audit(1747890521.230:8342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.764344][ T29] audit: type=1326 audit(1747890521.230:8343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.787854][ T29] audit: type=1326 audit(1747890521.230:8344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1047.811344][ T29] audit: type=1326 audit(1747890521.230:8345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22270 comm="syz.4.5856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=92 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1048.542585][T22306] batadv_slave_1: entered promiscuous mode [ 1048.551109][T22305] batadv_slave_1: left promiscuous mode [ 1048.753381][T22325] netlink: 76 bytes leftover after parsing attributes in process `syz.5.5878'. [ 1049.095409][T22345] wg2: left promiscuous mode [ 1049.100450][T22345] wg2: left allmulticast mode [ 1049.121311][T22345] wg2: entered promiscuous mode [ 1049.126469][T22345] wg2: entered allmulticast mode [ 1049.218189][T22347] random: crng reseeded on system resumption [ 1049.285143][T22332] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1049.307644][T22332] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1049.389406][T22355] netlink: 76 bytes leftover after parsing attributes in process `syz.1.5890'. [ 1049.518742][T22369] syz_tun: entered allmulticast mode [ 1049.525055][T22368] syz_tun: left allmulticast mode [ 1049.775732][T22379] xt_nat: multiple ranges no longer supported [ 1050.312205][T22387] netlink: 76 bytes leftover after parsing attributes in process `syz.6.5904'. [ 1050.433629][T22396] syz_tun: entered allmulticast mode [ 1050.440993][T22395] syz_tun: left allmulticast mode [ 1050.620299][T22405] random: crng reseeded on system resumption [ 1050.829814][T22419] netlink: 76 bytes leftover after parsing attributes in process `syz.5.5916'. [ 1050.913512][T22427] syz_tun: entered allmulticast mode [ 1050.919688][T22426] syz_tun: left allmulticast mode [ 1051.039868][T22440] random: crng reseeded on system resumption [ 1051.096263][T22411] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1051.104978][T22411] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1051.319803][T22443] netlink: 'syz.6.5926': attribute type 1 has an invalid length. [ 1051.332884][T22443] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1051.345219][T22443] vlan2: entered promiscuous mode [ 1051.350306][T22443] bond1: entered promiscuous mode [ 1051.355511][T22443] vlan2: entered allmulticast mode [ 1051.360655][T22443] bond1: entered allmulticast mode [ 1052.600827][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 1052.600840][ T29] audit: type=1326 audit(1747890526.240:8382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.690480][ T29] audit: type=1326 audit(1747890526.320:8383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.714102][ T29] audit: type=1326 audit(1747890526.320:8384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.737646][ T29] audit: type=1326 audit(1747890526.320:8385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.761187][ T29] audit: type=1326 audit(1747890526.320:8386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.784688][ T29] audit: type=1326 audit(1747890526.320:8387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.808197][ T29] audit: type=1326 audit(1747890526.320:8388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.831703][ T29] audit: type=1326 audit(1747890526.320:8389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.855243][ T29] audit: type=1326 audit(1747890526.320:8390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1052.878759][ T29] audit: type=1326 audit(1747890526.320:8391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22497 comm="syz.4.5946" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9633a2e969 code=0x7ffc0000 [ 1053.715471][T22529] vxcan1 speed is unknown, defaulting to 1000 [ 1054.080178][T22529] chnl_net:caif_netlink_parms(): no params data found [ 1054.160380][ T12] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1054.800912][ T12] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1054.849830][T22529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.856934][T22529] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.904548][T22529] bridge_slave_0: entered allmulticast mode [ 1054.922614][T22529] bridge_slave_0: entered promiscuous mode [ 1054.936802][ T12] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1054.958090][T22529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.965241][T22529] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.989823][T22529] bridge_slave_1: entered allmulticast mode [ 1055.003486][T22529] bridge_slave_1: entered promiscuous mode [ 1055.021211][T22579] wg2: left promiscuous mode [ 1055.026162][T22579] wg2: left allmulticast mode [ 1055.043527][ T12] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1055.061178][T22584] wg2: entered promiscuous mode [ 1055.066064][T22584] wg2: entered allmulticast mode [ 1055.116926][T22529] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1055.153963][ T12] bridge_slave_1: left allmulticast mode [ 1055.163482][ T12] bridge_slave_1: left promiscuous mode [ 1055.169155][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.185208][ T12] bridge_slave_0: left promiscuous mode [ 1055.191124][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.356685][ T12] bond2 (unregistering): (slave gretap1): Releasing active interface [ 1055.375844][ T12] gretap1 (unregistering): left promiscuous mode [ 1055.382258][ T12] gretap1 (unregistering): left allmulticast mode [ 1055.420246][ T12] dvmrp1 (unregistering): left allmulticast mode [ 1055.491681][ T12] bond0 (unregistering): left promiscuous mode [ 1055.497954][ T12] bond_slave_0: left promiscuous mode [ 1055.503448][ T12] bond_slave_1: left promiscuous mode [ 1055.522376][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1055.543111][T22597] xt_TCPMSS: Only works on TCP SYN packets [ 1055.551208][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1055.570151][ T12] bond0 (unregistering): Released all slaves [ 1055.581039][ T12] bond1 (unregistering): Released all slaves [ 1055.591489][ T12] bond2 (unregistering): Released all slaves [ 1055.601107][T22529] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1055.644535][T22529] team0: Port device team_slave_0 added [ 1055.660094][T22529] team0: Port device team_slave_1 added [ 1055.709719][T22529] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1055.716695][T22529] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1055.742810][T22529] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1055.757249][ T12] team0: left promiscuous mode [ 1055.762066][ T12] team_slave_0: left promiscuous mode [ 1055.767674][ T12] team_slave_1: left promiscuous mode [ 1055.779460][ T12] hsr_slave_0: left promiscuous mode [ 1055.800462][ T12] hsr_slave_1: left promiscuous mode [ 1055.818663][ T12] veth1_macvtap: left promiscuous mode [ 1055.824226][ T12] veth0_macvtap: left promiscuous mode [ 1055.830188][ T12] veth1_vlan: left promiscuous mode [ 1055.897885][T22614] xt_nat: multiple ranges no longer supported [ 1056.166254][ T12] team0 (unregistering): Port device team_slave_1 removed [ 1056.212456][ T12] team0 (unregistering): Port device team_slave_0 removed [ 1056.244967][T22529] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1056.252073][T22529] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1056.278081][T22529] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1056.305695][T22615] wg2: entered promiscuous mode [ 1056.310594][T22615] wg2: entered allmulticast mode [ 1056.342955][ T1040] Process accounting resumed [ 1056.355807][T22529] hsr_slave_0: entered promiscuous mode [ 1056.379981][T22529] hsr_slave_1: entered promiscuous mode [ 1056.386031][T22529] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1056.417378][T22529] Cannot create hsr debugfs directory [ 1056.520369][ T12] IPVS: stop unused estimator thread 0... [ 1056.722618][T22529] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1056.737776][T22529] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1056.750667][T22529] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1056.764539][T22529] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1056.825260][T22529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1056.844993][T22529] 8021q: adding VLAN 0 to HW filter on device team0 [ 1056.860089][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 1056.867223][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1056.891914][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.899043][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.166637][T22648] serio: Serial port ptm0 [ 1057.187006][T22529] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1058.385975][T22529] veth0_vlan: entered promiscuous mode [ 1058.394097][T22529] veth1_vlan: entered promiscuous mode [ 1058.408481][T22529] veth0_macvtap: entered promiscuous mode [ 1058.416106][T22529] veth1_macvtap: entered promiscuous mode [ 1058.427459][T22529] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1058.436920][T22529] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1058.445387][T22529] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.454226][T22529] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.462973][T22529] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.471707][T22529] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.537541][T22649] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1058.555848][T22671] vxcan1 speed is unknown, defaulting to 1000 [ 1058.586998][T22649] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1058.628633][ T29] kauditd_printk_skb: 144 callbacks suppressed [ 1058.628645][ T29] audit: type=1400 audit(1747890532.260:8536): avc: denied { write } for pid=22529 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 1058.661763][ T29] audit: type=1400 audit(1747890532.260:8537): avc: denied { open } for pid=22529 comm="syz-executor" path="/syzcgroup/cpu/syz1/cgroup.procs" dev="cgroup" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 1058.850823][ T29] audit: type=1326 audit(1747890532.420:8538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1058.874369][ T29] audit: type=1326 audit(1747890532.420:8539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1058.897898][ T29] audit: type=1326 audit(1747890532.420:8540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1058.921477][ T29] audit: type=1326 audit(1747890532.420:8541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1058.945048][ T29] audit: type=1326 audit(1747890532.420:8542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1058.968676][ T29] audit: type=1326 audit(1747890532.420:8543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1058.992302][ T29] audit: type=1326 audit(1747890532.420:8544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1059.015877][ T29] audit: type=1326 audit(1747890532.420:8545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22679 comm="syz.1.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1059.107279][T22694] xfrm0: entered allmulticast mode [ 1059.123838][T22694] dvmrp1: entered allmulticast mode [ 1059.169453][T22684] vxcan1 speed is unknown, defaulting to 1000 [ 1059.353729][T22684] chnl_net:caif_netlink_parms(): no params data found [ 1059.379850][T22708] batadv_slave_1: entered promiscuous mode [ 1059.412896][T22707] batadv_slave_1: left promiscuous mode [ 1059.437826][T22684] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.444912][T22684] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.456351][T22684] bridge_slave_0: entered allmulticast mode [ 1059.463723][T22684] bridge_slave_0: entered promiscuous mode [ 1059.472892][T22684] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.480381][T22684] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.490929][T22684] bridge_slave_1: entered allmulticast mode [ 1059.497789][T22684] bridge_slave_1: entered promiscuous mode [ 1059.519695][T22684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1059.539022][T22684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1059.569485][T22684] team0: Port device team_slave_0 added [ 1059.580761][T22684] team0: Port device team_slave_1 added [ 1059.606289][T22684] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1059.613307][T22684] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1059.639385][T22684] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1059.651965][T22684] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1059.659051][T22684] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1059.685055][T22684] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1059.699069][T22726] xfrm0: entered allmulticast mode [ 1059.732253][T22684] hsr_slave_0: entered promiscuous mode [ 1059.738413][T22684] hsr_slave_1: entered promiscuous mode [ 1059.744292][T22684] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1059.751878][T22684] Cannot create hsr debugfs directory [ 1059.759863][T22730] vxcan1 speed is unknown, defaulting to 1000 [ 1059.822406][T22684] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1059.878814][T22684] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1059.938650][T22684] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1059.978688][T22684] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1060.066047][T22684] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1060.077198][T22684] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1060.087356][T22684] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1060.098804][T22684] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1060.116226][T22684] bridge0: port 2(bridge_slave_1) entered blocking state [ 1060.123300][T22684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1060.130563][T22684] bridge0: port 1(bridge_slave_0) entered blocking state [ 1060.137616][T22684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1060.181991][T22684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1060.197986][T22684] 8021q: adding VLAN 0 to HW filter on device team0 [ 1060.457235][T22684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1060.532592][T22755] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6027'. [ 1060.590198][T22684] veth0_vlan: entered promiscuous mode [ 1060.599574][T22684] veth1_vlan: entered promiscuous mode [ 1060.612627][T22763] dvmrp1: entered allmulticast mode [ 1060.636167][T22684] veth0_macvtap: entered promiscuous mode [ 1060.650985][T22767] netlink: 'syz.4.6031': attribute type 1 has an invalid length. [ 1060.653003][T22684] veth1_macvtap: entered promiscuous mode [ 1060.690875][T22767] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1060.704488][T22684] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1060.725724][T22767] bond2: (slave gretap1): making interface the new active one [ 1060.735409][T22767] bond2: (slave gretap1): Enslaving as an active interface with an up link [ 1060.748195][T22684] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1060.762277][T22684] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.771120][T22684] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.780042][T22684] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.788994][T22684] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.934611][T22790] syz_tun: entered allmulticast mode [ 1060.961427][T22792] vxcan1 speed is unknown, defaulting to 1000 [ 1061.521885][T22820] syz_tun: entered allmulticast mode [ 1061.530444][T22820] xfrm0: entered allmulticast mode [ 1061.541893][T22820] dvmrp1: entered allmulticast mode [ 1061.612334][T22822] serio: Serial port ptm0 [ 1061.864209][T22854] netlink: 'syz.6.6068': attribute type 1 has an invalid length. [ 1061.893335][T22854] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1061.993568][T22869] vxcan1 speed is unknown, defaulting to 1000 [ 1062.150340][T22882] netlink: 'syz.1.6080': attribute type 1 has an invalid length. [ 1062.182645][T22888] random: crng reseeded on system resumption [ 1062.196509][T22890] serio: Serial port ptm1 [ 1062.523703][T22908] serio: Serial port ptm1 [ 1063.230993][T22950] vxcan1 speed is unknown, defaulting to 1000 [ 1063.713258][T22956] serio: Serial port ptm0 [ 1063.779035][T22959] random: crng reseeded on system resumption [ 1063.848881][ T29] kauditd_printk_skb: 152 callbacks suppressed [ 1063.848905][ T29] audit: type=1326 audit(1747890537.490:8698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22958 comm="syz.6.6111" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe8a870e969 code=0x0 [ 1064.077945][ T29] audit: type=1326 audit(1747890537.710:8699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.101624][ T29] audit: type=1326 audit(1747890537.710:8700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.125133][ T29] audit: type=1326 audit(1747890537.710:8701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.148843][ T29] audit: type=1326 audit(1747890537.710:8702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.172423][ T29] audit: type=1326 audit(1747890537.710:8703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.195998][ T29] audit: type=1326 audit(1747890537.710:8704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.219545][ T29] audit: type=1326 audit(1747890537.710:8705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.243118][ T29] audit: type=1326 audit(1747890537.710:8706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.266797][ T29] audit: type=1326 audit(1747890537.710:8707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22973 comm="syz.1.6117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1064.299223][T22979] wg2: entered promiscuous mode [ 1064.304172][T22979] wg2: entered allmulticast mode [ 1064.775105][T22995] serio: Serial port ptm0 [ 1064.932292][T23018] random: crng reseeded on system resumption [ 1065.130537][T23033] serio: Serial port ptm0 [ 1065.232575][T23041] serio: Serial port ptm0 [ 1065.904574][T23072] serio: Serial port ptm0 [ 1065.982344][T23081] wg2: left promiscuous mode [ 1065.988213][T23081] wg2: left allmulticast mode [ 1066.003934][T23085] random: crng reseeded on system resumption [ 1066.026800][T23081] wg2: entered promiscuous mode [ 1066.032154][T23081] wg2: entered allmulticast mode [ 1066.408898][T23112] serio: Serial port ptm0 [ 1067.243436][T23149] random: crng reseeded on system resumption [ 1068.055465][T23179] wg2: left promiscuous mode [ 1068.060138][T23179] wg2: left allmulticast mode [ 1068.076046][T23183] wg2: entered promiscuous mode [ 1068.080990][T23183] wg2: entered allmulticast mode [ 1068.202434][T23194] batadv_slave_1: entered promiscuous mode [ 1068.208955][T23193] batadv_slave_1: left promiscuous mode [ 1068.656213][T23225] syz_tun: entered allmulticast mode [ 1068.674011][T23224] syz_tun: left allmulticast mode [ 1068.815841][T23234] netlink: 76 bytes leftover after parsing attributes in process `syz.1.6216'. [ 1069.957786][T23299] netlink: 20 bytes leftover after parsing attributes in process `syz.5.6243'. [ 1070.439839][T23324] syz_tun: entered allmulticast mode [ 1070.480975][T23324] xfrm0: entered allmulticast mode [ 1070.527913][T23324] dvmrp1: entered allmulticast mode [ 1070.540756][T23323] syz_tun: left allmulticast mode [ 1070.556224][T23332] serio: Serial port ptm0 [ 1070.842991][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 1070.843009][ T29] audit: type=1326 audit(1747890544.480:8785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1070.873791][ T29] audit: type=1326 audit(1747890544.480:8786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1070.897556][ T29] audit: type=1326 audit(1747890544.480:8787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1070.905223][T23360] xt_TCPMSS: Only works on TCP SYN packets [ 1070.921020][ T29] audit: type=1326 audit(1747890544.480:8788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1070.950311][ T29] audit: type=1326 audit(1747890544.480:8789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=66 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1070.973906][ T29] audit: type=1326 audit(1747890544.480:8790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1070.997652][ T29] audit: type=1326 audit(1747890544.480:8791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1071.000652][T23346] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1071.021425][ T29] audit: type=1326 audit(1747890544.480:8792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1071.053073][ T29] audit: type=1326 audit(1747890544.480:8793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1071.076674][ T29] audit: type=1326 audit(1747890544.480:8794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23357 comm="syz.1.6268" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa5214ce969 code=0x7ffc0000 [ 1071.121593][T23346] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1071.173446][T23368] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6272'. [ 1071.204799][T23368] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1071.212275][T23368] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1071.257711][T23368] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1071.265239][T23368] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1071.354027][T23389] serio: Serial port ptm0 [ 1071.793557][T23417] serio: Serial port ptm0 [ 1071.973871][T23424] xt_TCPMSS: Only works on TCP SYN packets [ 1071.990160][T23426] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6296'. [ 1072.170372][T23448] netlink: 76 bytes leftover after parsing attributes in process `syz.1.6305'. [ 1072.351543][T23461] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6310'. [ 1072.484425][T23465] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6312'. [ 1072.492708][T23450] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1072.502966][T23450] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1072.572799][T23471] vxcan1 speed is unknown, defaulting to 1000 [ 1072.633339][T23476] netlink: 76 bytes leftover after parsing attributes in process `syz.2.6316'. [ 1072.834810][T23481] ================================================================== [ 1072.842919][T23481] BUG: KCSAN: data-race in print_cpu / tick_nohz_idle_enter [ 1072.850207][T23481] [ 1072.852521][T23481] read-write to 0xffff888237d1b3b0 of 8 bytes by task 0 on cpu 1: [ 1072.860312][T23481] tick_nohz_idle_enter+0x59/0xe0 [ 1072.865330][T23481] do_idle+0x3d/0x240 [ 1072.869310][T23481] cpu_startup_entry+0x25/0x30 [ 1072.874075][T23481] start_secondary+0x95/0xa0 [ 1072.878655][T23481] common_startup_64+0x13e/0x147 [ 1072.883595][T23481] [ 1072.885924][T23481] read to 0xffff888237d1b3b0 of 8 bytes by task 23481 on cpu 0: [ 1072.893560][T23481] print_cpu+0x463/0x680 [ 1072.897810][T23481] timer_list_show+0x107/0x170 [ 1072.902581][T23481] traverse+0x141/0x3a0 [ 1072.906736][T23481] seq_read_iter+0x853/0x940 [ 1072.911326][T23481] proc_reg_read_iter+0x10d/0x180 [ 1072.916360][T23481] vfs_read+0x5cd/0x6f0 [ 1072.920521][T23481] __x64_sys_pread64+0xfd/0x150 [ 1072.925378][T23481] x64_sys_call+0x296d/0x2fb0 [ 1072.930054][T23481] do_syscall_64+0xd0/0x1a0 [ 1072.934559][T23481] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1072.940449][T23481] [ 1072.942767][T23481] value changed: 0x0000000000000030 -> 0x0000000000000035 [ 1072.949867][T23481] [ 1072.952182][T23481] Reported by Kernel Concurrency Sanitizer on: [ 1072.958330][T23481] CPU: 0 UID: 0 PID: 23481 Comm: syz.2.6318 Not tainted 6.15.0-rc7-syzkaller-00014-gd608703fcdd9 #0 PREEMPT(voluntary) [ 1072.970850][T23481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1072.980905][T23481] ================================================================== [ 1073.000547][T23481] xt_TCPMSS: Only works on TCP SYN packets