last executing test programs: 1.130295023s ago: executing program 2 (id=628): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1, 0x0, 0x6fea}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x2) 1.022510015s ago: executing program 2 (id=633): r0 = socket(0x2a, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}}, 0x24}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000014c0)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0xe, 0x3}, {}, {0x8, 0xffe0}}, [@filter_kind_options=@f_fw={{0x7}, {0x30, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0xffff}}, @TCA_FW_MASK={0x8, 0x5, 0x8001}, @TCA_FW_MASK={0x8, 0x5, 0x7}, @TCA_FW_INDEV={0x14, 0x3, 'veth0_virt_wifi\x00'}]}}]}, 0x5c}}, 0x4000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 998.347795ms ago: executing program 2 (id=635): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) 919.206746ms ago: executing program 0 (id=638): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD_OLD(r2, 0x40045402, &(0x7f0000000140)=0x1) 900.564926ms ago: executing program 0 (id=639): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r1}, 0x10) sendto$inet6(r0, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 838.705158ms ago: executing program 2 (id=640): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 838.233338ms ago: executing program 0 (id=641): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) lsetxattr$security_selinux(&(0x7f0000000140)='./cgroup\x00', &(0x7f0000000200), &(0x7f0000000280)='system_u:object_r:hald_sonypic_exec_t:s0\x00', 0x29, 0x2) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="0100010000000000000002", 0xb, 0xfffffffffffffffd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x10001}, [@printk={@llu}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @generic={0x2, 0x6, 0x5, 0x0, 0x6}, @exit]}, &(0x7f0000000080)='syzkaller\x00', 0x52, 0x4c, &(0x7f0000000240)=""/76, 0x40e00, 0x53, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xb, 0xa0e, 0xe}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x10, 0xe591, @void, @value}, 0x94) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5400000007060300000000000000000003000000050001000700000005000100"], 0x54}, 0x1, 0x0, 0x0, 0x4042851}, 0x4000) 837.978347ms ago: executing program 0 (id=642): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) io_setup(0x9, &(0x7f0000003080)=0x0) io_getevents(r2, 0x1, 0x1, &(0x7f0000000000)=[{}], 0x0) io_submit(r2, 0x1, &(0x7f0000000940)=[&(0x7f0000001940)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0}]) 837.761927ms ago: executing program 2 (id=643): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000380), 0x12) 817.677168ms ago: executing program 2 (id=644): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x14e24}, 0x1c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000000c0)="90", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="a4f8a26bb450c3737a3070ba625dedc012c4edb4dceb39f14bc2a327b6849de7b239dd195f074a2db8d7b064df353537c75cf850e4d13c4863b621c75c04506c7b864c39", 0x44}], 0x1}}], 0x2, 0xc8040) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x6) 707.78146ms ago: executing program 0 (id=645): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 650.91155ms ago: executing program 0 (id=646): r0 = io_uring_setup(0x4f66, &(0x7f00000000c0)={0x0, 0xcb50, 0x2}) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x8042, 0x0) fcntl$setlease(r1, 0x400, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000001a00)='./file1\x00', 0x141240, 0x42) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 218.898617ms ago: executing program 4 (id=670): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x1200000, &(0x7f0000000200)={[{@noblock_validity}, {}, {@noinit_itable}, {@nobarrier}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@noquota}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x1, 0x56a, &(0x7f00000015c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9WajdN4o8KQutRtFjQe12SaSjZdEt2U5pYaHuwFy9SBBEL4h/g3WPxH/CvKGihSAl68BKZzWy7TbL5uXW3zucD0743M5s3b998335nZ5cNoLBGsn9KEa9GxDdJxOG2bYORbxxZ2W/p8Y3JbEliefmzP5NI8nWt/ZP8/4N55ZWI+PWriJOlte3WFxZnKtVqOpfXRxuzV0frC4unLs9WptPp9Mr4xMSZdybG33/v3a719c0Lf3//6f2Pznx9fOm7nx8euZvEuTiUb2vvxy7caq+MxEj+nAzFuVU7jnWhsX6S9PoA2JGBPM6HIpsDDsdAHvXA/9/NiFgGCioR/1BQrTygdW3fpevgF8ajD1cugNb2f3DlvZHY17w2OrCUPHNllF3vDneh/ayNX/64dzdbYpP3IW52oT2Allu3I+L04ODa+S/J57+dO91883hjq9so2usP9NL9LP95a738p/Qk/4l18p+D68TuTmwe/6WHXWimoyz/+2Dd/PfJ1DU8kNdeauZ8Q8mly9X0dES8HBEnYmhvVt/ofs6ZpQfLnba153/ZkrXfygXz43g4uPfZx0xVGpXd9Lndo9sRrz3Nf5NYM//va+a6q8c/ez4ubLGNY+m91ztt27z/7bqfAS//FPHGuuP/9I5WsvH9ydHm+TDaOivW+uvOsd86tb+9/ndfNv4HNu7/cNJ+v7a+/TZ+3PdP2mnbTs//PcnnzfKefN31SqMxNxaxJ/lk7frxp49t1Vv7Z/0/cXzj+W+9839/RHyxxf7fOXqn4679MP5T2xr/7RcefPzlD53a39r4v90sncjXbGX+2+oB7ua5AwAAAAAAgH5TiohDkZTKT8qlUrm88vmOo3GgVK3VGycv1eavTEXzu7LDMVRq3ek+3PZ5iLH887Ct+viq+kREHImIbwf2N+vlyVp1qtedBwAAAAAAAAAAAAAAAAAAgD5xsMP3/zO/D/T66IDnzk9+Q3FtGv/d+KUnoC95/YfiEv9QXOIfikv8Q3GJfygu8Q/FJf6huMQ/AAAAAAAAAAAAAAAAAAAAAAAAAAAAdNWF8+ezZXnp8Y3JrD51bWF+pnbt1FRanynPzk+WJ2tzV8vTtdp0NS1P1mY3+3vVWu3q2HjMXx9tpPXGaH1h8eJsbf5K4+Ll2cp0ejEd+k96BQAAAAAAAAAAAAAAAAAAAC+W+sLiTKVaTecUOhbORl8cxo4LyWajfDY/GXbUxGDvO6jwHAo9npgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoM2/AQAA///fKTPH") bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000b00)=""/4096, 0x1000) 218.413307ms ago: executing program 3 (id=672): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0xf1, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000023"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000540)='inet_sock_set_state\x00', r1}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) listen(r2, 0x0) 209.279847ms ago: executing program 4 (id=674): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000380)={@val={0x0, 0x800}, @void, @eth={@empty, @random="1f00", @val, {@mpls_mc={0x8848, {[], @llc={@llc={0x8e, 0xf8, "f0"}}}}}}}, 0x1d) 207.137977ms ago: executing program 1 (id=675): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r0, 0x0, 0x7ffff088) 206.792597ms ago: executing program 3 (id=676): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}]}}) 146.951618ms ago: executing program 1 (id=677): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000012c0)=ANY=[@ANYBLOB], 0x290) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 146.726008ms ago: executing program 3 (id=678): r0 = socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newtfilter={0x88, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x58, 0x2, [@TCA_FLOWER_ACT={0x54, 0x3, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0xfff, 0x0, 0x5, 0xb}, 0x3}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}]}}]}, 0x88}}, 0x24000000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 146.575958ms ago: executing program 1 (id=679): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000043c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = open(&(0x7f0000000280)='.\x00', 0x20000, 0x0) fcntl$notify(r1, 0x402, 0x5) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000003d) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x104) 146.323018ms ago: executing program 3 (id=680): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010700000000fcdbdf256700000008000300", @ANYRES32=0x0, @ANYBLOB="0800c300741300000800c4"], 0x2c}, 0x1, 0x0, 0x0, 0x24000891}, 0x40000c0) 138.956168ms ago: executing program 1 (id=681): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x512, &(0x7f0000000c40)="$eJzs3W1rZFcdAPD/vcmk2d3UTFVkLdgWW9ktujNJY9so0lYQfVVQ6/s1JpMQMsmEzKRuQtEsfgBBRAU/gG8EP4Ag+xFEWND3oqKI7upL3St35kbzMJMMySSzTn4/OJlz7sP5n3PJ3LkPh3sDuLJeioh3ImIsIl6NiOlielqk2OukfLnHjz5YzFMSWfbe35JIimn7deXl8Yi4Uaw2GRFf/0rEt5LjcZs7u2sL9XptqyhXW+ub1ebO7p3V9YWV2kptY25u9o35N+dfn5/JCufqZzki3vrSn370/Z99+a1ffebbv7/7l9vfyZv1hY912h0Ri+cK0EOn7lJ7W+zLt9HWRQQbkrw/pbFhtwIAgH7kx/gfjohPto//p2OsfTQHAAAAjJLs7an4VxKRAQAAACMrjYipSNJKMRZgKtK0UumM4f1oXE/rjWbr08uN7Y2lfF5EOUrp8mq9NlOMFS5HKcnLs8UY2/3ya0fKcxHxXET8cPpau1xZbNSXhn3xAwAAAK6IGy8ePv//53TazgMAAAAjptyzAAAAAIwKp/wAAAAw+pz/AwAAwEj76rvv5inbf4/30vs722uN9+8s1ZprlfXtxcpiY2uzstJorLSf2bd+Wn31RmPzs7Gxfa/aqjVb1ebO7t31xvZG6+7qoVdgAwAAAJfouRcf/C6JiL3PX2unKJ4DCHDIH4fdAGCQxobdAGBoxofdAGBoSqcuYQ8Boy45Zf7xwTuda4Xx64tpDwAAMHi3Pn78/v9EMe/0awPA/zNjfQDg6nF3D66u0llHAN4cdEuAYflQ5+OZXvN7Pryjj/v/nWsMWXamhgEAAAMz1U5JWimO06ciTSuViGfbrwUoJcur9dpMcX7w2+nSM3l5tr1mcuqYYQAAAAAAAAAAAAAAAAAAAAAAAACgI8uSyAAAAICRFpH+OWk/zT/i1vQrU4evDhx569dP3/vxvYVWa2s2YiL5+3Q+aSIiWj8ppr+WeSUAAAAAPAU65+nF5+ywWwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn86IPF/XSZcf/6xYgod4s/HpPtz8koRcT1fyQxfmC9JCLGBhB/735E3OwWP4knWZaVi1Z0i3/tguOX25ume/w0Im4MID5cZQ/y/c873b5/abzU/uz+/Rsv0nn13v+l/93/jfXY/zx7pNzL8w9/Ue0Z/37E8+Pd9z/78ZNO/EMh8sLLffbxm9/Y3e0640CV3eIfjFVtrW9Wmzu7d1bXF1ZqK7WNubnZN+bfnH99fqa6vFqvFX+7hvnBJ3755KT+X+8Rv3y4/8e2/yt99T6Lfz+89+gjnUKpW/zbL3f//b3ZI35a/PZ9qsjn82/t5/c6+YNe+PlvXjip/0s9+j95Sv9v99X/+NyrX/veH7rOObY1AIDL0NzZXVuo12tbJ2Qm+1jmkjNvPx3NGGAmno5mDCuTfbfz/3i+es65+rFMdp7Vx2MAzZg49j0di7NWmETs5XX1+Q8JAACMmP8d9J90BwkAAAAAAAAAAAAAAAAAAAC4SGd8LNlkRPS98NGYe8PpKgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAif4TAAD//4RX0Xo=") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x100}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x2904c, 0x0, 0x10003, '\x00', [{0x0, 0x0, 0x700}, {0xffffffff}]}) 128.839399ms ago: executing program 4 (id=682): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='batadv_slave_1\x00', 0x10) r1 = socket$inet(0x2, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 79.002429ms ago: executing program 3 (id=683): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 78.696469ms ago: executing program 4 (id=684): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000440)={'wg1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x503, 0x2070bd2d, 0x4000000, {0x0, 0x0, 0x0, 0x0, 0x40004}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x58}, 0x1, 0x0, 0x0, 0x2004c012}, 0x0) 78.433059ms ago: executing program 1 (id=685): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000005c0)=ANY=[@ANYBLOB="fdffffffffcf3b316b9cffffffffffff7f"]) 6.98902ms ago: executing program 4 (id=686): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a", 0x15}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d80000001c0081044e81f782db44b9040a1d08030e000000e8fea4a1180015000600142603600e1208000f1000810401a80016000a0001", 0x37}], 0x1, 0x0, 0x0, 0x7400}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, 0x0, 0x5c8}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce620300fe"], 0xfe1b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0eab070004000523"], 0xfe33) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="563f000019"], 0xfe33) 6.72571ms ago: executing program 1 (id=687): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)) r1 = syz_open_pts(r0, 0x101000) r2 = dup3(r1, r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x16) 6.47611ms ago: executing program 4 (id=688): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x9a974000) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1809049, 0x0, 0xff, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=""/203, 0xfffffffffffffe5f) 0s ago: executing program 3 (id=689): bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x43, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x8, 0x3, 0x7ffffdbd}]}) clock_adjtime(0x0, &(0x7f00000006c0)={0x7fff, 0x1000000007fff, 0x0, 0x0, 0x10000000000000, 0x2c43, 0xfffffffffffffffa, 0x2, 0x0, 0x300, 0x0, 0x2902, 0x20, 0x100000001, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x5, 0x6}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.77' (ED25519) to the list of known hosts. [ 26.061735][ T29] audit: type=1400 audit(1750717612.477:62): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.062598][ T3294] cgroup: Unknown subsys name 'net' [ 26.084453][ T29] audit: type=1400 audit(1750717612.477:63): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.111797][ T29] audit: type=1400 audit(1750717612.507:64): avc: denied { unmount } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.289803][ T3294] cgroup: Unknown subsys name 'cpuset' [ 26.295846][ T3294] cgroup: Unknown subsys name 'rlimit' [ 26.425611][ T29] audit: type=1400 audit(1750717612.837:65): avc: denied { setattr } for pid=3294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.448902][ T29] audit: type=1400 audit(1750717612.837:66): avc: denied { create } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.469387][ T29] audit: type=1400 audit(1750717612.837:67): avc: denied { write } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.489362][ T3296] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.489724][ T29] audit: type=1400 audit(1750717612.837:68): avc: denied { read } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.518560][ T29] audit: type=1400 audit(1750717612.847:69): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.535206][ T3294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.543306][ T29] audit: type=1400 audit(1750717612.847:70): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.543338][ T29] audit: type=1400 audit(1750717612.907:71): avc: denied { relabelto } for pid=3296 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.638029][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 27.685674][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 27.715237][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.722351][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.729693][ T3302] bridge_slave_0: entered allmulticast mode [ 27.735832][ T3302] bridge_slave_0: entered promiscuous mode [ 27.744900][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.751992][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.759206][ T3302] bridge_slave_1: entered allmulticast mode [ 27.765635][ T3302] bridge_slave_1: entered promiscuous mode [ 27.779754][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 27.817317][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.829166][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.849849][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 27.892630][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.899758][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.907098][ T3308] bridge_slave_0: entered allmulticast mode [ 27.913593][ T3308] bridge_slave_0: entered promiscuous mode [ 27.920361][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.927415][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.934635][ T3308] bridge_slave_1: entered allmulticast mode [ 27.940905][ T3308] bridge_slave_1: entered promiscuous mode [ 27.947406][ T3302] team0: Port device team_slave_0 added [ 27.962494][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.969582][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.976709][ T3310] bridge_slave_0: entered allmulticast mode [ 27.983053][ T3310] bridge_slave_0: entered promiscuous mode [ 27.989951][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.996995][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.004191][ T3310] bridge_slave_1: entered allmulticast mode [ 28.010444][ T3310] bridge_slave_1: entered promiscuous mode [ 28.026709][ T3302] team0: Port device team_slave_1 added [ 28.061039][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.075338][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.084666][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.091608][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.117659][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.131163][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.145257][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.154560][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.161661][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.168809][ T3311] bridge_slave_0: entered allmulticast mode [ 28.175183][ T3311] bridge_slave_0: entered promiscuous mode [ 28.181752][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.188695][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.214633][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.227360][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 28.245262][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.252500][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.259647][ T3311] bridge_slave_1: entered allmulticast mode [ 28.266073][ T3311] bridge_slave_1: entered promiscuous mode [ 28.284512][ T3310] team0: Port device team_slave_0 added [ 28.295078][ T3308] team0: Port device team_slave_0 added [ 28.306331][ T3308] team0: Port device team_slave_1 added [ 28.319690][ T3310] team0: Port device team_slave_1 added [ 28.330130][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.355369][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.370276][ T3302] hsr_slave_0: entered promiscuous mode [ 28.376255][ T3302] hsr_slave_1: entered promiscuous mode [ 28.393315][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.400295][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.426280][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.437465][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.444412][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.470385][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.483940][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.491103][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.517070][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.549641][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.556647][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.582632][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.594083][ T3311] team0: Port device team_slave_0 added [ 28.604666][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.611739][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.618819][ T3303] bridge_slave_0: entered allmulticast mode [ 28.625171][ T3303] bridge_slave_0: entered promiscuous mode [ 28.631718][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.638812][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.646004][ T3303] bridge_slave_1: entered allmulticast mode [ 28.652420][ T3303] bridge_slave_1: entered promiscuous mode [ 28.661320][ T3311] team0: Port device team_slave_1 added [ 28.699847][ T3308] hsr_slave_0: entered promiscuous mode [ 28.705882][ T3308] hsr_slave_1: entered promiscuous mode [ 28.712691][ T3308] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.721212][ T3308] Cannot create hsr debugfs directory [ 28.733083][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.744391][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.751374][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.777354][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.788553][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.795576][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.821535][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.837897][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.869382][ T3310] hsr_slave_0: entered promiscuous mode [ 28.875705][ T3310] hsr_slave_1: entered promiscuous mode [ 28.881816][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.889452][ T3310] Cannot create hsr debugfs directory [ 28.895471][ T3303] team0: Port device team_slave_0 added [ 28.902022][ T3303] team0: Port device team_slave_1 added [ 28.945485][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.952555][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.978573][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.991737][ T3311] hsr_slave_0: entered promiscuous mode [ 28.997640][ T3311] hsr_slave_1: entered promiscuous mode [ 29.003822][ T3311] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.011392][ T3311] Cannot create hsr debugfs directory [ 29.038304][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.045295][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.071344][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.118469][ T3303] hsr_slave_0: entered promiscuous mode [ 29.124562][ T3303] hsr_slave_1: entered promiscuous mode [ 29.130520][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.138052][ T3303] Cannot create hsr debugfs directory [ 29.198035][ T3302] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.219602][ T3302] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.241787][ T3302] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.250273][ T3302] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.297539][ T3310] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.306331][ T3310] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.317904][ T3310] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.326160][ T3310] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.354437][ T3311] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.364335][ T3311] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.373189][ T3311] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.382129][ T3311] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.413296][ T3308] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.425681][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.435513][ T3308] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.444091][ T3308] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.453027][ T3308] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.491269][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.504423][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.519146][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.526271][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.539559][ T3303] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.548642][ T3303] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.557392][ T3303] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.570757][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.577811][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.588766][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.595792][ T3303] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.617370][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.624505][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.633789][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.640838][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.684596][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.703199][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.719436][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.728467][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.735540][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.762500][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.769848][ T3311] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.780219][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.803195][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.810423][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.828374][ T1717] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.835534][ T1717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.856727][ T1717] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.863823][ T1717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.890229][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.902207][ T3308] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.922961][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.942156][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.966569][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.982079][ T1717] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.989299][ T1717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.004599][ T1717] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.012078][ T1717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.028483][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.041096][ T3303] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.051564][ T3303] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.082244][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.157988][ T3302] veth0_vlan: entered promiscuous mode [ 30.179874][ T3302] veth1_vlan: entered promiscuous mode [ 30.211330][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.227364][ T3310] veth0_vlan: entered promiscuous mode [ 30.244757][ T3311] veth0_vlan: entered promiscuous mode [ 30.252910][ T3310] veth1_vlan: entered promiscuous mode [ 30.269728][ T3302] veth0_macvtap: entered promiscuous mode [ 30.276989][ T3302] veth1_macvtap: entered promiscuous mode [ 30.284495][ T3311] veth1_vlan: entered promiscuous mode [ 30.305103][ T3308] veth0_vlan: entered promiscuous mode [ 30.314231][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.325721][ T3310] veth0_macvtap: entered promiscuous mode [ 30.334699][ T3308] veth1_vlan: entered promiscuous mode [ 30.342255][ T3310] veth1_macvtap: entered promiscuous mode [ 30.350396][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.365453][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.376451][ T3302] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.385277][ T3302] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.394234][ T3302] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.403072][ T3302] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.414675][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.429217][ T3311] veth0_macvtap: entered promiscuous mode [ 30.437145][ T3311] veth1_macvtap: entered promiscuous mode [ 30.446755][ T3310] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.455647][ T3310] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.464387][ T3310] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.473089][ T3310] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.485916][ T3303] veth0_vlan: entered promiscuous mode [ 30.501920][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.515785][ T3303] veth1_vlan: entered promiscuous mode [ 30.527415][ T3308] veth0_macvtap: entered promiscuous mode [ 30.540900][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.558000][ T3302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.574713][ T3308] veth1_macvtap: entered promiscuous mode [ 30.586312][ T3303] veth0_macvtap: entered promiscuous mode [ 30.597451][ T3311] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.606363][ T3311] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.615213][ T3311] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.624098][ T3311] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.643139][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.651103][ T3303] veth1_macvtap: entered promiscuous mode [ 30.671485][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.692332][ T2995] udevd[2995]: worker [3290] terminated by signal 33 (Unknown signal 33) [ 30.707671][ T2995] udevd[2995]: worker [3290] failed while handling '/devices/virtual/block/loop4' [ 30.710918][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.737423][ T3308] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.745503][ T3480] loop1: detected capacity change from 0 to 1024 [ 30.746318][ T3308] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.754746][ T3480] ======================================================= [ 30.754746][ T3480] WARNING: The mand mount option has been deprecated and [ 30.754746][ T3480] and is ignored by this kernel. Remove the mand [ 30.754746][ T3480] option from the mount to silence this warning. [ 30.754746][ T3480] ======================================================= [ 30.761306][ T3308] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.761339][ T3308] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.844082][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.854546][ T3480] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 30.877629][ T3480] ext4 filesystem being mounted at /1/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 30.894368][ T3303] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.903391][ T3303] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.912155][ T3303] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.920932][ T3303] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.961535][ T3480] syz.1.6 (3480) used greatest stack depth: 10816 bytes left [ 30.980485][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.035030][ T3501] loop1: detected capacity change from 0 to 512 [ 31.061241][ T3501] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 31.074459][ T3501] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 31.074546][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 31.074557][ T29] audit: type=1326 audit(1750717617.487:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3496 comm="syz.0.1" exe="/root/syz-executor" sig=0 arch=c000003e syscall=434 compat=0 ip=0x7ff1f6bde929 code=0x7ffc0000 [ 31.084350][ T3501] EXT4-fs (loop1): #clusters per group too big: 729088 [ 31.121617][ T29] audit: type=1400 audit(1750717617.507:127): avc: denied { allowed } for pid=3505 comm="syz.3.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 31.140752][ T29] audit: type=1326 audit(1750717617.527:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3496 comm="syz.0.1" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff1f6bde929 code=0x7ffc0000 [ 31.164038][ T29] audit: type=1326 audit(1750717617.527:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3496 comm="syz.0.1" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff1f6bde929 code=0x7ffc0000 [ 31.187142][ T29] audit: type=1326 audit(1750717617.527:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3496 comm="syz.0.1" exe="/root/syz-executor" sig=0 arch=c000003e syscall=440 compat=0 ip=0x7ff1f6bde929 code=0x7ffc0000 [ 31.199633][ T3510] netem: change failed [ 31.210313][ T29] audit: type=1326 audit(1750717617.527:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3496 comm="syz.0.1" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff1f6bde929 code=0x7ffc0000 [ 31.237482][ T29] audit: type=1326 audit(1750717617.527:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3496 comm="syz.0.1" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff1f6bde929 code=0x7ffc0000 [ 31.264730][ T29] audit: type=1400 audit(1750717617.677:133): avc: denied { create } for pid=3505 comm="syz.3.12" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 31.320315][ T29] audit: type=1400 audit(1750717617.737:134): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 31.359793][ T3519] netlink: 'syz.2.17': attribute type 21 has an invalid length. [ 31.383549][ T3521] loop1: detected capacity change from 0 to 512 [ 31.393770][ T3519] netlink: 'syz.2.17': attribute type 1 has an invalid length. [ 31.401476][ T3519] netlink: 144 bytes leftover after parsing attributes in process `syz.2.17'. [ 31.447966][ T3521] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.450684][ T3528] loop4: detected capacity change from 0 to 512 [ 31.467091][ T3528] EXT4-fs: Ignoring removed bh option [ 31.470992][ T3521] ext4 filesystem being mounted at /4/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 31.492371][ T29] audit: type=1400 audit(1750717617.907:135): avc: denied { add_name } for pid=3520 comm="syz.1.18" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 31.495705][ T3528] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 31.534107][ T3528] EXT4-fs warning (device loop4): ext4_expand_extra_isize_ea:2848: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 31.547464][ T3528] EXT4-fs (loop4): 1 truncate cleaned up [ 31.547615][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.578940][ T3528] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.635768][ T3535] hub 2-0:1.0: USB hub found [ 31.640567][ T3535] hub 2-0:1.0: 8 ports detected [ 31.667384][ T3538] netlink: 8 bytes leftover after parsing attributes in process `syz.0.24'. [ 31.712626][ T3310] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.810885][ T3538] syz.0.24 (3538) used greatest stack depth: 10192 bytes left [ 32.142236][ T3590] C: renamed from team_slave_0 (while UP) [ 32.150945][ T3590] netlink: 'syz.2.47': attribute type 1 has an invalid length. [ 32.158605][ T3590] netlink: 152 bytes leftover after parsing attributes in process `syz.2.47'. [ 32.167567][ T3590] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 32.276818][ T3594] netlink: 304 bytes leftover after parsing attributes in process `syz.2.50'. [ 32.291358][ T3594] netlink: 4 bytes leftover after parsing attributes in process `syz.2.50'. [ 32.320219][ T3598] C: renamed from team_slave_0 (while UP) [ 32.331417][ T3598] netlink: 152 bytes leftover after parsing attributes in process `syz.0.51'. [ 32.388641][ T3607] bridge0: entered promiscuous mode [ 32.407619][ T3607] macsec1: entered promiscuous mode [ 32.428553][ T3607] bridge0: port 3(macsec1) entered blocking state [ 32.435150][ T3607] bridge0: port 3(macsec1) entered disabled state [ 32.437699][ T3612] netlink: 'syz.3.58': attribute type 21 has an invalid length. [ 32.449407][ T3612] IPv6: NLM_F_CREATE should be specified when creating new route [ 32.450107][ T3607] macsec1: entered allmulticast mode [ 32.462539][ T3607] bridge0: entered allmulticast mode [ 32.468545][ T3607] macsec1: left allmulticast mode [ 32.473843][ T3607] bridge0: left allmulticast mode [ 32.480512][ T3607] bridge0: left promiscuous mode [ 32.673007][ T3641] bridge_slave_0: left allmulticast mode [ 32.678771][ T3641] bridge_slave_0: left promiscuous mode [ 32.684729][ T3641] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.697397][ T3641] bridge_slave_1: left allmulticast mode [ 32.703193][ T3641] bridge_slave_1: left promiscuous mode [ 32.708894][ T3641] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.721510][ T3641] bond0: (slave bond_slave_0): Releasing backup interface [ 32.731315][ T3641] bond0: (slave bond_slave_1): Releasing backup interface [ 32.743147][ T3641] team0: Port device team_slave_0 removed [ 32.752940][ T3641] team0: Port device team_slave_1 removed [ 32.761755][ T3641] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 32.769406][ T3641] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 32.780371][ T3641] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 32.787841][ T3641] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 32.976018][ T3675] syz.4.87 uses obsolete (PF_INET,SOCK_PACKET) [ 33.822265][ T3772] bridge_slave_0: left allmulticast mode [ 33.828039][ T3772] bridge_slave_0: left promiscuous mode [ 33.833829][ T3772] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.844302][ T3772] bridge_slave_1: left allmulticast mode [ 33.850187][ T3772] bridge_slave_1: left promiscuous mode [ 33.855888][ T3772] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.866373][ T3772] bond0: (slave bond_slave_0): Releasing backup interface [ 33.876417][ T3772] bond0: (slave bond_slave_1): Releasing backup interface [ 33.888505][ T3772] team0: Port device team_slave_0 removed [ 33.897266][ T3772] team0: Port device team_slave_1 removed [ 33.904204][ T3772] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 33.911820][ T3772] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 33.921438][ T3772] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 33.928864][ T3772] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 34.111967][ T3797] netlink: 304 bytes leftover after parsing attributes in process `syz.1.143'. [ 34.130538][ T3797] netlink: 4 bytes leftover after parsing attributes in process `syz.1.143'. [ 34.225968][ T3813] bridge0: entered promiscuous mode [ 34.231345][ T3813] macsec1: entered promiscuous mode [ 34.238270][ T3813] bridge0: port 1(macsec1) entered blocking state [ 34.244829][ T3813] bridge0: port 1(macsec1) entered disabled state [ 34.251629][ T3813] macsec1: entered allmulticast mode [ 34.256916][ T3813] bridge0: entered allmulticast mode [ 34.262726][ T3813] macsec1: left allmulticast mode [ 34.267744][ T3813] bridge0: left allmulticast mode [ 34.273519][ T3813] bridge0: left promiscuous mode [ 34.291447][ T3815] bridge_slave_0: left allmulticast mode [ 34.297115][ T3815] bridge_slave_0: left promiscuous mode [ 34.302763][ T3815] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.312330][ T3815] bridge_slave_1: left allmulticast mode [ 34.318108][ T3815] bridge_slave_1: left promiscuous mode [ 34.323845][ T3815] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.333787][ T3815] bond0: (slave bond_slave_0): Releasing backup interface [ 34.344698][ T3815] bond0: (slave bond_slave_1): Releasing backup interface [ 34.360500][ T3815] team0: Port device team_slave_0 removed [ 34.371645][ T3815] team0: Port device team_slave_1 removed [ 34.381762][ T3815] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 34.389224][ T3815] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 34.399436][ T3815] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 34.406872][ T3815] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 34.561318][ T3851] syz.4.167 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 34.700600][ T3876] netlink: 12 bytes leftover after parsing attributes in process `syz.1.181'. [ 34.818108][ T3903] netlink: 'syz.4.192': attribute type 13 has an invalid length. [ 34.864301][ T3903] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 35.013802][ T3940] netlink: 96 bytes leftover after parsing attributes in process `syz.3.211'. [ 35.440948][ T4004] erspan0: entered promiscuous mode [ 35.446262][ T4004] macvtap1: entered promiscuous mode [ 35.451858][ T4004] macvtap1: entered allmulticast mode [ 35.457218][ T4004] erspan0: entered allmulticast mode [ 35.465586][ T4004] erspan0: left allmulticast mode [ 35.470748][ T4004] erspan0: left promiscuous mode [ 35.483772][ T4013] all: renamed from lo (while UP) [ 35.512547][ T4019] netlink: 'syz.3.245': attribute type 4 has an invalid length. [ 36.037634][ T4082] Process accounting resumed [ 36.079783][ T29] kauditd_printk_skb: 2505 callbacks suppressed [ 36.079796][ T29] audit: type=1400 audit(1750717622.497:2641): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 36.115016][ T29] audit: type=1400 audit(1750717622.517:2642): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 36.115151][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 36.136151][ T29] audit: type=1400 audit(1750717622.517:2643): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 36.136174][ T29] audit: type=1400 audit(1750717622.517:2644): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 36.142701][ T3034] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 36.142715][ T3034] audit: backlog limit exceeded [ 36.163863][ T29] audit: type=1400 audit(1750717622.517:2645): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 36.163888][ T29] audit: type=1400 audit(1750717622.517:2646): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 36.163908][ T29] audit: type=1400 audit(1750717622.517:2647): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 36.667641][ T4141] __nla_validate_parse: 5 callbacks suppressed [ 36.667657][ T4141] netlink: 4 bytes leftover after parsing attributes in process `syz.2.302'. [ 37.415899][ T4218] pim6reg1: entered promiscuous mode [ 37.421547][ T4218] pim6reg1: entered allmulticast mode [ 37.776002][ T4260] netem: incorrect gi model size [ 37.781028][ T4260] netem: change failed [ 38.001076][ T4296] netlink: 'syz.4.377': attribute type 13 has an invalid length. [ 38.150567][ T4296] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.159797][ T4296] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.168687][ T4296] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.177817][ T4296] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.886021][ T4470] netlink: 'syz.1.457': attribute type 13 has an invalid length. [ 40.097049][ T4470] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.106110][ T4470] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.115295][ T4470] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.124355][ T4470] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.144838][ T4479] netlink: 8 bytes leftover after parsing attributes in process `syz.3.461'. [ 40.153716][ T4479] netlink: 8 bytes leftover after parsing attributes in process `syz.3.461'. [ 40.193781][ T4479] Zero length message leads to an empty skb [ 40.465257][ T4518] netlink: 4 bytes leftover after parsing attributes in process `syz.1.478'. [ 40.681804][ T4542] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4542 comm=syz.3.490 [ 41.090283][ T29] kauditd_printk_skb: 34785 callbacks suppressed [ 41.090342][ T29] audit: type=1400 audit(1750717627.507:33212): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 41.115475][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 41.119166][ T29] audit: type=1400 audit(1750717627.507:33213): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.124493][ T3034] audit: audit_lost=1409 audit_rate_limit=0 audit_backlog_limit=64 [ 41.148885][ T29] audit: type=1400 audit(1750717627.507:33214): avc: denied { map_create } for pid=4593 comm="syz.4.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.156732][ T3034] audit: backlog limit exceeded [ 41.157148][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 41.175927][ T29] audit: type=1400 audit(1750717627.507:33215): avc: denied { read write } for pid=3308 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.180925][ T3034] audit: audit_lost=1410 audit_rate_limit=0 audit_backlog_limit=64 [ 41.187320][ T29] audit: type=1400 audit(1750717627.507:33216): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 41.763682][ T4652] netlink: 36 bytes leftover after parsing attributes in process `syz.1.542'. [ 41.779119][ T4652] netlink: 'syz.1.542': attribute type 4 has an invalid length. [ 41.995026][ T4686] netlink: 112 bytes leftover after parsing attributes in process `syz.3.558'. [ 42.009868][ T4688] xt_TPROXY: Can be used only with -p tcp or -p udp [ 43.523517][ T4785] netlink: 8 bytes leftover after parsing attributes in process `syz.4.604'. [ 43.565888][ T4785] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for ip6erspan0 [ 43.607897][ T4787] netlink: 8 bytes leftover after parsing attributes in process `syz.4.604'. [ 43.955694][ T4815] netlink: 36 bytes leftover after parsing attributes in process `syz.0.618'. [ 43.965885][ T4815] netlink: 12 bytes leftover after parsing attributes in process `syz.0.618'. [ 43.974886][ T4815] netlink: 204 bytes leftover after parsing attributes in process `syz.0.618'. [ 43.983851][ T4815] netlink: 8 bytes leftover after parsing attributes in process `syz.0.618'. [ 44.103863][ T4825] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4825 comm=syz.0.622 [ 44.409515][ T4853] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 44.463722][ T4860] netlink: 96 bytes leftover after parsing attributes in process `syz.0.639'. [ 44.955530][ T4904] netlink: 28 bytes leftover after parsing attributes in process `syz.3.659'. [ 44.964596][ T4904] netlink: 'syz.3.659': attribute type 7 has an invalid length. [ 44.972339][ T4904] netlink: 'syz.3.659': attribute type 8 has an invalid length. [ 45.278857][ T4952] syzkaller0: entered promiscuous mode [ 45.284503][ T4952] syzkaller0: entered allmulticast mode [ 45.310538][ T4958] netlink: 'syz.4.686': attribute type 1 has an invalid length. [ 45.318246][ T4958] netlink: 'syz.4.686': attribute type 4 has an invalid length. [ 45.385672][ T12] ================================================================== [ 45.393805][ T12] BUG: KCSAN: data-race in __stop_tty / n_tty_receive_char [ 45.401047][ T12] [ 45.403367][ T12] write to 0xffff888119f699bc of 1 bytes by task 4965 on cpu 0: [ 45.411001][ T12] __stop_tty+0x36/0x90 [ 45.415176][ T12] n_tty_ioctl_helper+0x1e9/0x210 [ 45.420204][ T12] n_tty_ioctl+0x101/0x200 [ 45.424625][ T12] tty_ioctl+0x845/0xb80 [ 45.428910][ T12] __se_sys_ioctl+0xce/0x140 [ 45.433511][ T12] __x64_sys_ioctl+0x43/0x50 [ 45.438106][ T12] x64_sys_call+0x19a8/0x2fb0 [ 45.442792][ T12] do_syscall_64+0xd2/0x200 [ 45.447285][ T12] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.453181][ T12] [ 45.455494][ T12] read to 0xffff888119f699bc of 1 bytes by task 12 on cpu 1: [ 45.462857][ T12] n_tty_receive_char+0x3d/0x6a0 [ 45.467789][ T12] n_tty_receive_buf_standard+0x473/0x2f10 [ 45.473592][ T12] n_tty_receive_buf_common+0x805/0xbe0 [ 45.479130][ T12] n_tty_receive_buf2+0x33/0x40 [ 45.483967][ T12] tty_ldisc_receive_buf+0x63/0xf0 [ 45.489072][ T12] tty_port_default_receive_buf+0x59/0x90 [ 45.494788][ T12] flush_to_ldisc+0x141/0x360 [ 45.499462][ T12] process_scheduled_works+0x4ce/0x9d0 [ 45.504916][ T12] worker_thread+0x582/0x770 [ 45.509499][ T12] kthread+0x486/0x510 [ 45.513564][ T12] ret_from_fork+0xda/0x150 [ 45.518069][ T12] ret_from_fork_asm+0x1a/0x30 [ 45.522828][ T12] [ 45.525133][ T12] value changed: 0x00 -> 0x01 [ 45.529789][ T12] [ 45.532100][ T12] Reported by Kernel Concurrency Sanitizer on: [ 45.538252][ T12] CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT(voluntary) [ 45.548916][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 45.559048][ T12] Workqueue: events_unbound flush_to_ldisc [ 45.564865][ T12] ================================================================== [ 46.062002][ T29] kauditd_printk_skb: 37399 callbacks suppressed [ 46.062016][ T29] audit: type=1400 audit(1750718400.507:68860): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 46.067979][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 46.068409][ T29] audit: type=1400 audit(1750718400.517:68861): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 46.089486][ T3034] audit: audit_lost=1996 audit_rate_limit=0 audit_backlog_limit=64 [ 46.089500][ T3034] audit: backlog limit exceeded [ 46.089713][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 46.096022][ T29] audit: type=1400 audit(1750718400.517:68862): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 46.117105][ T3034] audit: audit_lost=1997 audit_rate_limit=0 audit_backlog_limit=64 [ 46.124989][ T29] audit: type=1400 audit(1750718400.517:68863): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 46.129812][ T3034] audit: backlog limit exceeded [ 50.800488][ T29] kauditd_printk_skb: 55228 callbacks suppressed [ 50.800501][ T29] audit: type=1400 audit(1750718405.518:123732): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 50.806633][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.806926][ T29] audit: type=1400 audit(1750718405.518:123733): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 50.828203][ T3034] audit: audit_lost=2118 audit_rate_limit=0 audit_backlog_limit=64 [ 50.828219][ T3034] audit: backlog limit exceeded [ 50.834710][ T29] audit: type=1400 audit(1750718405.518:123734): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 50.856206][ T3034] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.863777][ T29] audit: type=1400 audit(1750718405.518:123735): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 50.868612][ T3034] audit: audit_lost=2119 audit_rate_limit=0 audit_backlog_limit=64 [ 50.889819][ T29] audit: type=1400 audit(1750718405.518:123736): avc: denied { read } for pid=3034 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0