last executing test programs: 42.577763707s ago: executing program 1 (id=2624): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r1}, 0x18) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000021c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002180)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001fc0)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/48, 0x30}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001ec0)=[{&(0x7f0000001a00)=""/161, 0xa1}], 0x1}}], 0x90}, 0x0) 42.485068607s ago: executing program 1 (id=2626): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {0x35, 0x0, 0x5}, {}, {0x0, 0x1}, {0x40, 0x0, 0x0, 0x9}, {0x0, 0x20}, {}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xffffffff, 0x0, 0x0, 0x0, 0xffffffff}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) 42.457729697s ago: executing program 1 (id=2628): r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0xec) r2 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/locks\x00', 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r2, r3, 0x0, 0x200) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f00000002c0)='GPL\x00', 0xf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r5}, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000f40), r6) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000044}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)={0xac, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0xac}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000680), r8) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) r11 = getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000001400000008000300", @ANYRES32=r10, @ANYBLOB="08001c00", @ANYRES32=r11], 0x24}}, 0x0) sendmsg$IEEE802154_ADD_IFACE(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x34, r7, 0x1, 0x801000, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x34}}, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r5, {0x10001, 0x36}}, './file0\x00'}) mknodat$null(r13, &(0x7f0000000280)='./file0\x00', 0xfdf399f5aa06aeed, 0x103) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x4, &(0x7f0000000180)=[{0x2d, 0x0, 0x2}, {}, {}, {0x6}]}) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) recvmmsg(r4, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/101}, {&(0x7f0000000000)=""/39}, {&(0x7f0000000100)=""/46}], 0x1, 0x0, 0x23}, 0x2}], 0x1, 0x100, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r12, 0x6, 0x15, &(0x7f00000001c0)=0xcc3, 0x4) 41.535562667s ago: executing program 1 (id=2639): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x1018003, &(0x7f0000000100)={[{@grpquota}, {@delalloc}, {@noblock_validity}, {@usrquota}, {@dioread_nolock}, {@jqfmt_vfsold}, {@nomblk_io_submit}, {@grpjquota}, {@nogrpid}, {@grpquota}]}, 0x1, 0x5f8, &(0x7f00000004c0)="$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") r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000b40), 0xffffffffffffffff) sendmsg$GTP_CMD_ECHOREQ(r2, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x30, r3, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@GTPA_PEER_ADDR6={0x14, 0xb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}]}, 0x30}}, 0x40040) r4 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$peeksig(0x4209, r5, &(0x7f0000000480)={0x100000000005, 0x1, 0xfffffffffffffd9b}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x1c0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000c80)=ANY=[@ANYRES8=r2, @ANYRES8=r5, @ANYBLOB="010000000000000000002500001733fc4362b722cb000e0001006e657464657673696d0000e40e0002006e657464", @ANYRESOCT=0x0], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f00000000c0)={r9, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xce024d}, 0x9c) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r9, 0x3523, 0x3}, &(0x7f00000001c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) sendto$phonet(r10, &(0x7f0000000180)="6d15878daaf569a7f1b259fb28eadd2de7a6b6f897a8dd623cccfe1ae11f099ee1b9cb9a25a3e6fc666c0c32950187506f0177b3158d59ea37d90427253e8541a45e52904e", 0x45, 0x4004, &(0x7f0000000200)={0x23, 0xf, 0x5, 0xd}, 0x10) 41.086779358s ago: executing program 1 (id=2649): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000580), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="810000000000000000000200001608000500ac1414aa08000100", @ANYRES32=r1, @ANYBLOB="080002"], 0x2c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000740)={'syztnl0\x00', &(0x7f00000008c0)={'erspan0\x00', 0x0, 0x10, 0x700, 0x5, 0x3, {{0x35, 0x4, 0x2, 0x5, 0xd4, 0x65, 0x0, 0x9, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x13}, @loopback, {[@cipso={0x86, 0x42, 0x0, [{0x6, 0x2}, {0x0, 0x5, "04c11a"}, {0x0, 0xd, "5f8826d5d9e32dca3fc5bf"}, {0x6, 0x4, '\fB'}, {0x6, 0xc, "4bb0f507feea92c19dd2"}, {0x7, 0xa, "1eee7b0eca179d71"}, {0x5, 0xe, "1e42da433a6b1f6eebe01351"}]}, @timestamp_prespec={0x44, 0x1c, 0xb7, 0x3, 0x4, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@private=0xa010102, 0x5}, {@multicast1, 0x2}]}, @ssrr={0x89, 0x17, 0xdc, [@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @local]}, @lsrr={0x83, 0xb, 0x16, [@rand_addr=0x64010101, @local]}, @timestamp_prespec={0x44, 0x2c, 0xcb, 0x3, 0x8, [{@initdev={0xac, 0x1e, 0x9, 0x0}, 0x8}, {@loopback, 0x6}, {@broadcast, 0xd}, {@rand_addr=0x64010101, 0xffff}, {@multicast1, 0x9}]}, @rr={0x7, 0xf, 0x6e, [@multicast1, @private=0xa010100, @multicast2]}, @noop, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000007c0)={'syztnl1\x00', &(0x7f00000009c0)={'ip6gre0\x00', 0x0, 0x4, 0x8, 0x0, 0x80000000, 0x6, @local, @private1, 0x1, 0x40, 0xb, 0xfffffff7}}) socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) r7 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000a40)={0x230, 0x0, 0x800, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x230}}, 0x4048044) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) 40.559875218s ago: executing program 1 (id=2661): socket$kcm(0x10, 0x2, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) r0 = socket(0x27, 0x3, 0x66) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x7, 0xd0000e0}, 0x6e) socket$kcm(0x10, 0x2, 0x0) r1 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x101000, 0x0) socket(0x10, 0x3, 0x0) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='kfree\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4, 0x0, 0x7}, 0x18) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000001000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x43, 0xa0, 0x118, 0x98, 0x2a0, 0x178, 0x178, 0x2a0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0xff000000, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0xd0, 0x118, 0x0, {0x0, 0x7a010000}, [@inet=@rpfilter={{0x28}, {0x2}}, @common=@unspec=@connbytes={{0x38}, {[{}, {0xe}], 0x0, 0x2}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0xc, {0x80000001}}}}, {{@uncond, 0x0, 0x158, 0x188, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@rand_addr=0x64010101, [0x0, 0xffffff00, 0xff000000], @ipv4=@private=0xa010100, [0x0, 0x0, 0xffffff00, 0xff], @ipv4=@multicast1, [0xffffff00, 0xffffffff, 0x0, 0xffffffff], @ipv6=@loopback, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], 0x7, 0xa, 0x5c, 0x4e24, 0x4e20, 0x4e23, 0x4e22, 0x40, 0xa2}, 0x80}}, @common=@icmp={{0x28}, {0x11, "bccf"}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x398) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) sched_setscheduler(r7, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r9, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@xdp={0x2c, 0x7, 0x0, 0x2c}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)="a6", 0x1}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYRES8=r2], 0x10b8}, 0x2008c090) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 40.559499918s ago: executing program 32 (id=2661): socket$kcm(0x10, 0x2, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) r0 = socket(0x27, 0x3, 0x66) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x7, 0xd0000e0}, 0x6e) socket$kcm(0x10, 0x2, 0x0) r1 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x101000, 0x0) socket(0x10, 0x3, 0x0) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='kfree\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4, 0x0, 0x7}, 0x18) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000001000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x43, 0xa0, 0x118, 0x98, 0x2a0, 0x178, 0x178, 0x2a0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0xff000000, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0xd0, 0x118, 0x0, {0x0, 0x7a010000}, [@inet=@rpfilter={{0x28}, {0x2}}, @common=@unspec=@connbytes={{0x38}, {[{}, {0xe}], 0x0, 0x2}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0xc, {0x80000001}}}}, {{@uncond, 0x0, 0x158, 0x188, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@rand_addr=0x64010101, [0x0, 0xffffff00, 0xff000000], @ipv4=@private=0xa010100, [0x0, 0x0, 0xffffff00, 0xff], @ipv4=@multicast1, [0xffffff00, 0xffffffff, 0x0, 0xffffffff], @ipv6=@loopback, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], 0x7, 0xa, 0x5c, 0x4e24, 0x4e20, 0x4e23, 0x4e22, 0x40, 0xa2}, 0x80}}, @common=@icmp={{0x28}, {0x11, "bccf"}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x398) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) sched_setscheduler(r7, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r9, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@xdp={0x2c, 0x7, 0x0, 0x2c}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)="a6", 0x1}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYRES8=r2], 0x10b8}, 0x2008c090) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 1.968043968s ago: executing program 3 (id=3684): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0x98, 0x30, 0x9, 0x0, 0x0, {}, [{0x84, 0x1, [@m_bpf={0x80, 0x1, 0x0, 0x0, {{0x8}, {0x58, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x34, 0x4, [{}, {0x35, 0x0, 0x5}, {0x0, 0x1}, {0x40, 0x0, 0x0, 0x9}, {0x0, 0x20}, {}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xffffffff, 0x0, 0x0, 0x0, 0xffffffff}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 1.954712198s ago: executing program 3 (id=3685): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x600, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xf8, 0x30, 0xffff, 0xfffffffe, 0x0, {}, [{0xe4, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x52, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x5}}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_bpf={0x2c, 0x3, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0xf8}}, 0x0) 1.904285549s ago: executing program 3 (id=3687): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000580)='thermal_zone_trip\x00', r1, 0x0, 0x6000000000}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r4, {0x0, 0xfff2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}}, 0x10) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='hrtimer_init\x00', r7}, 0x18) timerfd_create(0x9, 0x0) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) bind$inet(r6, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x20000f3d, &(0x7f0000000000)={0x2, 0x24e23, @empty}, 0x10) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000040)=0x197a, 0x4) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/29, 0x1d}, 0x80}], 0x1, 0x0, 0x0) 1.584620309s ago: executing program 5 (id=3696): bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xd, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2}, 0x10) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x404c051}, 0x2004c0c4) 1.557623459s ago: executing program 5 (id=3697): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x1000000000006005, 0x1) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup2(r0, r0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1ff, 0xa, 0x1, 0x10}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESETUP(r1, 0x1276, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f00000034c0)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xf00, 0x736f}, 0x100000, 0x0, 0x0, 0x2, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newqdisc={0x468, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x10}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x43c, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000, 0x0, 0xfffffffd, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffa, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffe000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @TCA_TBF_RATE64={0xc}, @TCA_TBF_PARMS={0x28, 0x1, {{}, {0x2, 0x0, 0x0, 0x0, 0x0, 0x40}}}]}}]}, 0x468}}, 0x0) r6 = dup(r2) getresgid(&(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000340)) chdir(0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) syz_open_dev$MSR(&(0x7f0000000000), 0x0, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0xff00) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r7, 0x0, 0xd, 0xffffffffffffffff, &(0x7f0000000080)=0x57) ioctl$FS_IOC_FSSETXATTR(r7, 0x401c5820, 0x0) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x13d, 0x0, 0x0, 0x204}}) socket$inet6_udplite(0xa, 0x2, 0x88) 1.432763759s ago: executing program 5 (id=3704): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100000, 0x5dd8, 0x7, 0x0, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f8, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)="bda033176eb146b36ef41f221a4e7ce4a02598d750606488520915c6806affc0a913781c7211ce1fcd59a12b5d5afdaf9d723f092ce9d1eed16e208f2e79831ca049e8979ad94621175c2c48c10e33b29f2def51498743b057efc21efe4be4d9f02e9d236f27190c29c5da0f3799452f5e3640340502fde4ae8c56b303e1b79b3d1842bf6277771bef544c745e7a80c9e7efdd1c619f69b9d01839aa326776d335689e4db7cb7e32fad8f4c40e943b43eb4ea173d720cbaa1b2ef3bf6f8ad001d40702cbdbbf5998149625a731643636c8ddbe61e1d7d4736f8414a84acc40557012c82697d8a59c873424aefb3c7ff0dba302efaaf887a477b1ab7ea6c1def9db3514e444c1ef36c6cf42cde90d4bbb2e923a5d16a1bb191ad91cab867cd55037d507a12803f3df1b81f1857fad085dbc5c46aac14230d7a4f8b36d6bc63b4a16cd309b7697b421a662b83001b5ce5ab3ff80800243107df7aa6cae9a5db6a8f2a53ef7d6c6aeac76b83a15466c74a9cdbcde8505e3d14c0c3a47a36bf464168202dc88e25f4c1da57faf0eaa7ff16bdd751c2ae5778e169c8ffba57c9a20e24ad51e6e8e02b721e8ca94f131cc98e03b34b615a1db4080362de4ef215d5a0541aeb0c742a2636ac5af8538ceb3585ef9dca8037df55baa072096073b005b53eff0b899de59bc2b5d687d109520571eeacb30124c4012fe6cb9e3bf451be3d239206ddc3509f664052a6c66c62f62a49fde8fbe4c1d0a292da83db26a8a870ac1d8751c4bc0d495277295cd3a17f9e9a25d70214a17b981b62d5c75356ed025df3557a8b59648edd9d1dbdf169d91f9d85cfac11a57db0a14f03e8934a2cc98d389912a0d9942a40c3ee98d35da61d3bab1a32c9d788e9f74ee57012ca5bfd0dc090b591c64aae6a205fbd349fc372bbd7429983a69cae26ff8b5b059144d318ba225e46bc6cf8d7d3e5952333042542b2fd4fb4d88a3651dd8e14ecc2845d4e71f7dfd128e9e2ee2ab0062a3e701bb2477bfd73d7396ae522f11fa481078d1c7f7905e0846fb072dcf7c06102b3816ec4a3518514c7166d7385b680469f5184a93953258952554e68d93ea8f789c4f13982b65996d7d9cf19f0b39b72e1dc9079d84413bbc30d24fc481e24ef1beacb8bc15f50c2663d684d16a1c71b2c8a568481f4f1b254ccd66fbef4cacfc3e13f2c943a264e429824bef7297f930763df331695024bd1e53369a87caf6894fce811a64dad315402678de7600"/917, 0x395}, {&(0x7f00000003c0)="439e9c06fc666cabc8569d63a866b31ff3ceda1e28f23f455e96a02001fc3fb0", 0x20}], 0x2}}], 0x2, 0x40000) 1.220334359s ago: executing program 0 (id=3716): r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0xb}, 0x8}}, 0x6b) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200400004000000080000000100000080"], 0x48) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x1c, 0x0, 0x1, 0x8000000, 0x0, {{}, {@val={0x7}, @void}}}, 0x1c}}, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8}, 0x2000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x3, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(0xffffffffffffffff, &(0x7f0000000040)={@val, @void, @eth={@multicast, @remote, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x6, 0x14, 0x64, 0x0, 0x1, 0x11, 0x0, @dev={0xac, 0x14, 0x14, 0x29}, @rand_addr=0x64010100}}}}}}, 0x26) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r5}, 0x10) dup2(r3, r4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) 1.163724629s ago: executing program 0 (id=3717): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="c82a5fc5d1f10cf713ecfa90a7da3da54e8208a7dcea7d7861857791183cbf8c339152c49a8b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_io_uring_setup(0x10d, &(0x7f0000000140), 0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000640), 0x40000, 0x0) write$snapshot(r3, &(0x7f0000000680)="966da6d8354df79f5e76674b5a3c9dcfe65e2a614a0784b741db47fbf6d373b612b80bc3d347cf91822ba55e86079de35a4929cf56f4acba08e1f80e923bea112d3b89e04c90bdd85ec2919fe00a707f26c689de05190d77e6fc1955313bbbf8c123a9686e9e87610f78e8a1412733874debe17b348fb9226b7c8d8297173598cd0d01e3ee6f493e5a439593f4d501807485767ca1e0a9980d2e25be2622fe59e0fe0e42115e1b680f666e7ebcb58df5c0a9001c89b360e5df316b222df007865218da7e4bdf125482cb45d4e06bd15d55ca6d831b17998a", 0xd8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) syz_io_uring_submit(0x0, r1, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0x47f9, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x2, 0x100000000000000, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 1.045363789s ago: executing program 3 (id=3720): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x290}}, 0x4048010) 1.010825439s ago: executing program 3 (id=3721): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), 0x0, 0x0, 0x0) 1.010399389s ago: executing program 3 (id=3722): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001d80)=ANY=[@ANYBLOB="b70200001a000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b70600007fffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e6185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946e0ebc622003b538dfd8e012e79578e51bc5f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f659cb132b803000000661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7b148ba532e6ea09c346dfebd38608b32a0080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c61a137462c7f2539479f49d4eb2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e14861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc16e7c337642d3e5a815232f5e16b089f37b3591a15c0a9be6eb18208404c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b74cd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f50714600fb6241c6e955031795b2c2f56411e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c0977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6040099d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663dd472021d202eedd005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe3594d4a3f2239cfe00000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed180d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35f267632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e80339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd52364600000000000000000000000000000000000000000000dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000a5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f3390343c12a851810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f314001a62863f6e04b4506ac2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab79e609c57a2a7332f4d8764c302ccd5aac114482b619fca4d97a0ae75ccf11e29a854380e2b4bb9905a1517ec40bb3fa44f9959bad67ccaba76408da35e9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff17320adda5867947257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a927de6f4c09f4b742e037381c85d2ec7bb2a8152f0d6a99a0370e0cbd65744eb2efd7b65f04aa7e72588757b9612bb4253a63bb303c0c68a07f115d104f2007237a4f771416741bfd63fdfe3ae6f8bea755d8b7202c2bbae137dc1c3cf40db74a4c1c219d8ddec8f91dae2cdea1353fe062830fa1d233296e99d8317872257e154665485e7f31cdbfbf435517faf93015b57417d84b8bc8662e097d5ba55000048e150695ffae3a676555b10da11751865126d19336116a1e58ab727dda6b343cc97f9479136a66f552abf8fe3d134f6d69df1cf7800b4bda4db5e68aaccf44d24e09f8a769e3ae7bf246673f15e3d1adae4384bdb7cd30a33e30466b421feb96006c810fd3830a1c75af2580727ffc699d2b04f476acc21419fad9b1baec88974da2db29b80859bde08b85c8086e4b7f1fd568042ad5396d3179c71b1dc43291e450ce9b8d7d80fcb44966d7ad4691a37870000000000000000000000000000000000000000000000000000000000000000000083a5765d06da91165d24bc316607e2d69344aa1c07ff7cd7bc3d17f122478b6e81077782b9c298edc2546045feff90e7aa7dc1a869fa5551b873e2c838e979e033b7707df75b93cf5b8d25242741a88f2d54a7107375b25911aa11efa3a4f87fc14f180e353615b3cb9a5cf5ea843014a277c3694a5a83266f73ef039dd739187923715548d58ff43be997e357e0cbed29faef19c0082e26fb867bf0ff0000000000000000000000a0616252abda1102c3eee13eddef0275f21752ee474e32d790ae1f3df77e303ae1968c2a4419d1ca13b97b2c3123ab5b8473b880644e6acfe1d346d1528262c6e91f38029ec24eeb4fe5c1b3726bcfd386ba153fed11692170e5a09432bd02fa9dba861ecad4dbf61a93733a21aeff5f541b8f78bccbf1ac0000000000000000000000145aaaa62ff74b216b2977e7b9261824f663cea60ec6e0fa03bd596cec6d12316c8ed147d4cdd140857444c27c1946b1afcd4ec260694cb71e421744cf1f860840b0decf9be35aeb02d1bf6137b3189edb2d21557e6804ed52305e7deace8b97cd2b423cb79c541762097e29c386634a4bcc3ee91266d808706aadbc4650183d71bf5341edfe4c815d3a87c05d75da20b260d39cdd8559292000cb06faf9972683d379565dcd932fbc6bfb13f938a693252fc3af8088fcf8e06a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000000000db07000007020000f8ffffffb703000000020000000055440669ed48000000000000850000005700580e95"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x1, @ANYBLOB="00000000000a000000000000040000000000e8ff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fc0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) semctl$SETALL(0x0, 0x0, 0x11, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) syz_genetlink_get_family_id$mptcp(&(0x7f0000000280), r1) syz_usb_connect$cdc_ncm(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r1) 924.223599ms ago: executing program 4 (id=3725): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb0100180000a461f39500880000008800deff0300000005000000000000090210000010000000070000930c0000000f00000002000000000000000b00000002000000060000000b0000000500000011000000ff0f00000300000002000000000400000700000006f6000081000000ff0700000700000000000006040000000c00000000000011020000000a00020100616100"/164], &(0x7f00000008c0)=""/164, 0xa4, 0xa4, 0x1, 0x179, 0x10000, @value}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESOCT=r1], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000009c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xcea7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x72, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810df}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x40505330, &(0x7f00000000c0)={0x800000, 0x0, 0x9, 0x0, 0x0, 0x551}) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x40505330, &(0x7f00000000c0)={0x800000, 0x0, 0x0, 0x0, 0x0, 0x55a}) 854.179009ms ago: executing program 4 (id=3726): r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r4 = fsopen(&(0x7f0000000180)='proc\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsmount(r4, 0x0, 0x1) statx(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x800, 0x400, 0xffffffffffffffff) r5 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe800c00090008001100080000002d000f009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d2449155037", 0x55}], 0x1}, 0x4040044) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x1a, &(0x7f0000000240)={0x1, 'ip6erspan0\x00', 0x10}, 0x18) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r8, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000380)={0x28, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x28}}, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r11 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r11, 0x11b, 0x3, &(0x7f00000001c0)=0x200000, 0x4) r12 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000380)={'team_slave_1\x00', 0x0}) bind$xdp(r11, &(0x7f0000000100)={0x2c, 0x1, r13, 0x19, r10}, 0x30) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000002c0)={'veth1_macvtap\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f0000000640)={'syztnl0\x00', &(0x7f0000000400)={'syztnl2\x00', 0x0, 0x80, 0x80, 0x4, 0x8550, {{0x1e, 0x4, 0x0, 0x6, 0x78, 0x64, 0x0, 0x6, 0x29, 0x0, @empty, @remote, {[@cipso={0x86, 0x13, 0xffffffffffffffff, [{0x6, 0xb, "0d32d781c2f4333bab"}, {0x2, 0x2}]}, @rr={0x7, 0x13, 0xec, [@private=0xa010102, @loopback, @rand_addr=0x64010101, @rand_addr=0x64010100]}, @ssrr={0x89, 0x1b, 0xe9, [@loopback, @remote, @loopback, @rand_addr=0x64010100, @remote, @empty]}, @noop, @noop, @ssrr={0x89, 0x13, 0x80, [@dev={0xac, 0x14, 0x14, 0x19}, @rand_addr=0x64010101, @rand_addr=0x64010101, @private=0xa010102]}, @rr={0x7, 0xb, 0xb0, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102]}]}}}}}) r17 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r8) sendmsg$ETHTOOL_MSG_DEBUG_GET(r7, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000b80)=ANY=[@ANYBLOB="88010002c78f0b2645cda6bf309fbd31b956a1bd56d0115933e922ae2a66568f4f9dd967baad6bf13f0189cf9a27cedc793cbe2b2212dae4a725aceff9d25a60de258c6216510e67f04a8d2be8f89e356b9c9ba2bcdcecc6d2839a622b080ef2266ebef2829fed22578fc3", @ANYRES16=r17, @ANYBLOB="00082dbd7000fbdbdf25070000000c00018008000300010000006c00018008000100", @ANYRES32=r13, @ANYBLOB="14000200776c616e30000000000000000000000008000100", @ANYRES32=r14, @ANYBLOB="14000200766c616e300000000000000000000000140002006261746164763000000000000000000008000100", @ANYRES32=r15, @ANYBLOB="14000200697036746e6c300000000000000000007c0001800800030003000000140002007465616d5f736c6176655f30000000001400020076657468315f766c616e00000000000014000200626f6e645f736c6176655f310000000008000300030000000800030000000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c6572310000000000000c00018008000100", @ANYRES32=r14, @ANYBLOB="3400018008000100", @ANYRES32=r16, @ANYBLOB="140002006e6963766630000000000000000000001400020074756e6c3000000000000000000000003c0001801400020064756d6d793000000000000000000000080003000100000014000200626174616476300000000000000000000800030001000000"], 0x184}, 0x1, 0x0, 0x0, 0x4004000}, 0x4048080) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x80010, r7, 0x80000000) 838.611079ms ago: executing program 4 (id=3727): r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0xb}, 0x8}}, 0x6b) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200400004000000080000000100000080"], 0x48) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x1c, 0x0, 0x1, 0x8000000, 0x0, {{}, {@val={0x7}, @void}}}, 0x1c}}, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8}, 0x2000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x3, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(0xffffffffffffffff, &(0x7f0000000040)={@val, @void, @eth={@multicast, @remote, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x6, 0x14, 0x64, 0x0, 0x1, 0x11, 0x0, @dev={0xac, 0x14, 0x14, 0x29}, @rand_addr=0x64010100}}}}}}, 0x26) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r5}, 0x10) dup2(r3, r4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) 793.424249ms ago: executing program 4 (id=3728): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000500)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000001c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000440)=@gcm_128={{0x304}, "e453f079dff9d540", "1ec2d524d78682576ec2d9e13dad1018", "993161e3", "be0692db0b429ee8"}, 0x28) writev(r2, &(0x7f00000030c0)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) close(r2) 770.018839ms ago: executing program 4 (id=3729): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x2, 0x0, 0x7ffc0002}]}) timer_delete(0x0) 744.331629ms ago: executing program 4 (id=3730): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000580)='thermal_zone_trip\x00', r1, 0x0, 0x6000000000}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r4, {0x0, 0xfff2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}}, 0x10) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='hrtimer_init\x00', r7}, 0x18) timerfd_create(0x9, 0x0) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) bind$inet(r6, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x20000f3d, &(0x7f0000000000)={0x2, 0x24e23, @empty}, 0x10) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000040)=0x197a, 0x4) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/29, 0x1d}, 0x80}], 0x1, 0x0, 0x0) 497.46134ms ago: executing program 5 (id=3731): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000500)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000440)=@gcm_128={{0x304}, "e453f079dff9d540", "1ec2d524d78682576ec2d9e13dad1018", "993161e3", "be0692db0b429ee8"}, 0x28) write$binfmt_script(r0, &(0x7f0000000300), 0x4) 496.959299ms ago: executing program 5 (id=3732): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), 0x0, 0x0, 0x0) 472.687019ms ago: executing program 5 (id=3733): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xa7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000100)=0xc6, 0x4) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000780)=0x2, 0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xd2, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffbfff00000000000086dd600489f1009c1100fc010000000000000025030000000000ff02000000000000000000000000000100000e22"], 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) shutdown(r5, 0x1) getsockopt$bt_hci(r5, 0x84, 0x81, &(0x7f0000001280)=""/4107, &(0x7f00000000c0)=0x100b) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="3800000010004b04000200eeffffffff79000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100677265000c00028008000700e0000002"], 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) r6 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r6, 0x110, 0x3, 0x0, 0x3) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r8, @ANYRES16=r2, @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r8, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) 292.45413ms ago: executing program 2 (id=3734): r0 = eventfd2(0x9, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup3(r1, r0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f00000000c0)={0x1d, r4, 0x1, {0x2, 0x0, 0x4}, 0xfd}, 0x18) sendmsg$can_j1939(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2004c800}, 0x805) 230.4566ms ago: executing program 2 (id=3735): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000004200)={0x0, 0x0, &(0x7f00000041c0)={&(0x7f0000004180)={0x30, r1, 0xa07, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz0\x00'}}}}, 0x30}}, 0x0) 230.17115ms ago: executing program 0 (id=3736): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2}, 0x10) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x404c051}, 0x2004c0c4) 209.70293ms ago: executing program 2 (id=3737): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="034886dd020027000300300000006000000001082f0081e949b93897bc3b0000000000007d01ff020000000000000000000000000001", @ANYRESHEX], 0xfdef) 181.20411ms ago: executing program 0 (id=3738): r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0xb}, 0x8}}, 0x6b) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200400004000000080000000100000080"], 0x48) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x1c, 0x0, 0x1, 0x8000000, 0x0, {{}, {@val={0x7}, @void}}}, 0x1c}}, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8}, 0x2000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x3, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(0xffffffffffffffff, &(0x7f0000000040)={@val, @void, @eth={@multicast, @remote, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x6, 0x14, 0x64, 0x0, 0x1, 0x11, 0x0, @dev={0xac, 0x14, 0x14, 0x29}, @rand_addr=0x64010100}}}}}}, 0x26) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r5}, 0x10) dup2(r3, r4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) 70.34014ms ago: executing program 2 (id=3739): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) sendmsg$key(r0, 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000005c0)='fd', 0x0, 0xffffffffffffffff) bind$rds(r4, &(0x7f00000021c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r4, &(0x7f0000002180)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) 66.1014ms ago: executing program 0 (id=3740): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x2, 0x0, 0x7ffc0002}]}) timer_delete(0x0) 59.6488ms ago: executing program 2 (id=3741): getegid() r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000180), 0x3, 0x88000) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000001c0)) ioctl$EVIOCGRAB(r2, 0x40044590, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x48141, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a0010000000974dff7f0080cc00000000000000eae555e193c378001bc5c20d63ec1ff6948cb7d1daee114d802ded832c7e5ae24676c1f19f25241c61df5e7ab209d7b5b0d09601000000000000004ec1f0483de47622386737c5b225f86ff165b993877ce2ceda354609c652b55a6846e21810cf62418949add8123c197805b62b72b3c54415fb434a46e51d05215e5f9f85f1", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) 10.54482ms ago: executing program 0 (id=3742): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f00000021c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r3, &(0x7f0000002180)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) 0s ago: executing program 2 (id=3743): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 69558 [ 146.874492][T10702] [ 146.886878][T10692] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=10692 comm=syz.3.2542 [ 146.888264][T10707] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2545'. [ 146.899594][T10692] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=10692 comm=syz.3.2542 [ 146.944439][ T29] audit: type=1400 audit(1734922261.155:8464): avc: denied { setattr } for pid=10691 comm="syz.3.2542" name="file0" dev="loop3" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 146.966892][ T29] audit: type=1326 audit(1734922261.175:8465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 146.990474][ T29] audit: type=1326 audit(1734922261.175:8466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 147.014123][ T29] audit: type=1326 audit(1734922261.175:8467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 147.037677][ T29] audit: type=1326 audit(1734922261.175:8468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 147.061412][ T29] audit: type=1326 audit(1734922261.175:8469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 147.085124][ T29] audit: type=1326 audit(1734922261.175:8470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 147.108692][ T29] audit: type=1326 audit(1734922261.175:8471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 147.132226][ T29] audit: type=1326 audit(1734922261.175:8472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10709 comm="syz.4.2546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9e91b35d29 code=0x7ffc0000 [ 147.232711][T10733] SELinux: security policydb version 18 (MLS) not backwards compatible [ 147.251465][T10733] SELinux: failed to load policy [ 147.269233][T10736] loop2: detected capacity change from 0 to 256 [ 147.298854][T10736] FAT-fs (loop2): IO charset cp860vCÿ =ê|G·YÙO=4aË!ñÆÃÌiwDÅ=i”ÇšþýpoX`Žbî씟RDõ$EðvOZ74éÎÄ‚ç©áôÏe‰¬—®º'þ-m’ˆÌá?¤¿¿@¡é5ûˆñ„‰3.UÙ¶Sâ).--y -ïÈZ+¡üŽe{°6ó•WÓoyLJÛ1¨@8%´Ã㇋GkQÖéþ‚gd?à¢wMÑV¢³o+¥ not found [ 147.313567][T10741] SELinux: security policydb version 18 (MLS) not backwards compatible [ 147.328731][T10741] SELinux: failed to load policy [ 147.379810][T10744] loop2: detected capacity change from 0 to 128 [ 147.440311][T10744] vcan0: tx drop: invalid sa for name 0x0000000000000001 [ 147.822389][T10757] IPv6: Can't replace route, no match found [ 147.887404][T10759] loop4: detected capacity change from 0 to 2048 [ 147.947411][T10758] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 147.962866][T10758] EXT4-fs (loop4): Remounting filesystem read-only [ 147.998802][T10759] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 148.008445][T10759] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 148.017998][T10759] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 148.224254][T10771] SELinux: policydb version 0 does not match my version range 15-33 [ 148.233555][T10771] SELinux: failed to load policy [ 148.579896][T10797] bpf_get_probe_write_proto: 23 callbacks suppressed [ 148.579909][T10797] syz.0.2581[10797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.608819][T10797] syz.0.2581[10797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.650660][T10797] syz.0.2581[10797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.942305][T10814] IPv6: Can't replace route, no match found [ 149.560053][T10825] syz.1.2589[10825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.560230][T10825] syz.1.2589[10825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.589080][T10827] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=10827 comm=+}[@ [ 149.624502][T10825] syz.1.2589[10825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.649391][T10825] syz.1.2589[10825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.681777][T10825] syz.1.2589[10825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.704920][T10825] syz.1.2589[10825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.922173][T10840] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 149.947793][T10842] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 149.975028][T10842] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 149.995981][T10840] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 150.167823][T10844] loop7: detected capacity change from 0 to 16384 [ 150.224468][T10854] loop2: detected capacity change from 0 to 512 [ 150.268681][T10854] EXT4-fs (loop2): too many log groups per flexible block group [ 150.276489][T10854] EXT4-fs (loop2): failed to initialize mballoc (-12) [ 150.283435][T10854] EXT4-fs (loop2): mount failed [ 150.326082][T10863] syz.2.2602[10863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.374492][T10849] loop7: detected capacity change from 16384 to 16383 [ 150.484472][T10858] Invalid logical block size (-2147352640) [ 150.523280][T10878] SELinux: policydb version 0 does not match my version range 15-33 [ 150.531825][T10878] SELinux: failed to load policy [ 150.629549][T10885] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 150.799692][T10893] SELinux: policydb version 0 does not match my version range 15-33 [ 150.808181][T10893] SELinux: failed to load policy [ 150.872957][T10894] loop1: detected capacity change from 0 to 2048 [ 151.080209][T10905] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 151.384082][T10922] loop4: detected capacity change from 0 to 2048 [ 151.428119][T10928] SELinux: policydb version 0 does not match my version range 15-33 [ 151.453336][T10928] SELinux: failed to load policy [ 151.537083][T10933] lo speed is unknown, defaulting to 1000 [ 151.723865][ T29] kauditd_printk_skb: 268 callbacks suppressed [ 151.723877][ T29] audit: type=1326 audit(1734922265.935:8741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 151.753540][ T29] audit: type=1326 audit(1734922265.935:8742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 151.790343][T10948] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 151.843115][T10944] lo speed is unknown, defaulting to 1000 [ 151.882280][T10955] SELinux: policydb version 0 does not match my version range 15-33 [ 151.898642][T10955] SELinux: failed to load policy [ 151.938139][T10957] netlink: 'syz.3.2635': attribute type 10 has an invalid length. [ 151.954937][ T29] audit: type=1326 audit(1734922266.005:8743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 151.978518][ T29] audit: type=1326 audit(1734922266.005:8744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 152.003178][ T29] audit: type=1326 audit(1734922266.005:8745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 152.026962][ T29] audit: type=1326 audit(1734922266.005:8746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 152.050480][ T29] audit: type=1326 audit(1734922266.025:8747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 152.073967][ T29] audit: type=1326 audit(1734922266.025:8748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 152.097413][ T29] audit: type=1326 audit(1734922266.025:8749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 152.121045][ T29] audit: type=1326 audit(1734922266.025:8750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10946 comm="syz.3.2632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7ff85af95d29 code=0x7ffc0000 [ 152.171854][T10958] loop3: detected capacity change from 0 to 1024 [ 152.188612][T10958] EXT4-fs: Ignoring removed nobh option [ 152.194190][T10958] EXT4-fs: Ignoring removed nomblk_io_submit option [ 152.220510][T10960] SELinux: policydb version 0 does not match my version range 15-33 [ 152.235053][T10960] SELinux: failed to load policy [ 152.242586][T10958] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 152.279463][T10957] lo: entered promiscuous mode [ 152.301354][T10957] bond0: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 152.477021][T10970] loop1: detected capacity change from 0 to 1024 [ 152.531449][T10970] EXT4-fs: Ignoring removed nomblk_io_submit option [ 152.578391][T10970] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 152.658836][T10970] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. [ 152.820663][T11005] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2648'. [ 152.838838][T11003] loop3: detected capacity change from 0 to 164 [ 152.857749][ T3301] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz-executor: corrupted in-inode xattr: ea_inode specified without ea_inode feature enabled [ 152.947432][ T3301] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz-executor: corrupted in-inode xattr: ea_inode specified without ea_inode feature enabled [ 153.061264][T11019] loop3: detected capacity change from 0 to 512 [ 153.100019][T11019] EXT4-fs: Ignoring removed orlov option [ 153.140128][T11019] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 153.158089][T11026] loop4: detected capacity change from 0 to 2048 [ 153.203015][T11019] EXT4-fs (loop3): 1 truncate cleaned up [ 153.228633][T11019] EXT4-fs (loop3): Online resizing not supported with sparse_super2 [ 153.367788][ T9638] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 153.427873][T11057] loop3: detected capacity change from 0 to 128 [ 153.442680][T11058] loop2: detected capacity change from 0 to 128 [ 153.466709][ T9638] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 153.510666][T11067] SELinux: policydb version 0 does not match my version range 15-33 [ 153.539001][T11067] SELinux: failed to load policy [ 153.547262][T11065] lo speed is unknown, defaulting to 1000 [ 153.586791][ T9638] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 153.601343][T11078] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2673'. [ 153.616949][T11060] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2667'. [ 153.636636][ T9638] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 153.652663][T11052] lo speed is unknown, defaulting to 1000 [ 153.772073][T11099] loop4: detected capacity change from 0 to 512 [ 153.906966][T11099] EXT4-fs (loop4): too many log groups per flexible block group [ 153.914750][T11099] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 153.921676][T11099] EXT4-fs (loop4): mount failed [ 153.960736][T11117] SELinux: security policydb version 18 (MLS) not backwards compatible [ 153.969341][T11117] SELinux: failed to load policy [ 153.993305][ T9638] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 154.003517][ T9638] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 154.014076][ T9638] bond0 (unregistering): Released all slaves [ 154.030243][T11052] chnl_net:caif_netlink_parms(): no params data found [ 154.058311][T11118] bond1: entered promiscuous mode [ 154.063358][T11118] bond1: entered allmulticast mode [ 154.068833][T11118] 8021q: adding VLAN 0 to HW filter on device bond1 [ 154.070402][T11126] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 154.089618][T11118] bond1 (unregistering): Released all slaves [ 154.134637][ T9638] tipc: Disabling bearer [ 154.139911][ T9638] tipc: Left network mode [ 154.187875][ T9638] hsr_slave_0: left promiscuous mode [ 154.193875][ T9638] hsr_slave_1: left promiscuous mode [ 154.203928][ T9638] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 154.211423][ T9638] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 154.222565][T11148] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2689'. [ 154.234691][T11151] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2692'. [ 154.248532][ T9638] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 154.255944][ T9638] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 154.286637][ T9638] veth1_macvtap: left promiscuous mode [ 154.292139][ T9638] veth0_macvtap: left promiscuous mode [ 154.297772][ T9638] veth1_vlan: left promiscuous mode [ 154.303052][ T9638] veth0_vlan: left promiscuous mode [ 154.353519][T11173] FAULT_INJECTION: forcing a failure. [ 154.353519][T11173] name failslab, interval 1, probability 0, space 0, times 0 [ 154.366190][T11173] CPU: 1 UID: 0 PID: 11173 Comm: syz.2.2699 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 154.376949][T11173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 154.387002][T11173] Call Trace: [ 154.390281][T11173] [ 154.393215][T11173] dump_stack_lvl+0xf2/0x150 [ 154.397832][T11173] dump_stack+0x15/0x1a [ 154.402002][T11173] should_fail_ex+0x223/0x230 [ 154.406684][T11173] should_failslab+0x8f/0xb0 [ 154.411381][T11173] __kmalloc_noprof+0xab/0x3f0 [ 154.416148][T11173] ? tls_get_rec+0x74/0x2f0 [ 154.420665][T11173] tls_get_rec+0x74/0x2f0 [ 154.425043][T11173] ? avc_has_perm_noaudit+0x1cc/0x210 [ 154.430434][T11173] tls_sw_sendmsg+0x330/0x15f0 [ 154.435231][T11173] ? __pfx_tls_sw_sendmsg+0x10/0x10 [ 154.440446][T11173] inet6_sendmsg+0xc5/0xd0 [ 154.444887][T11173] __sock_sendmsg+0x8b/0x180 [ 154.449920][T11173] sock_write_iter+0x15e/0x1a0 [ 154.454758][T11173] do_iter_readv_writev+0x394/0x450 [ 154.460072][T11173] vfs_writev+0x2d4/0x880 [ 154.464391][T11173] ? proc_fail_nth_write+0x12a/0x150 [ 154.469665][T11173] do_writev+0xf4/0x220 [ 154.473801][T11173] __x64_sys_writev+0x45/0x50 [ 154.478482][T11173] x64_sys_call+0x1fab/0x2dc0 [ 154.483136][T11173] do_syscall_64+0xc9/0x1c0 [ 154.487624][T11173] ? clear_bhb_loop+0x55/0xb0 [ 154.492311][T11173] ? clear_bhb_loop+0x55/0xb0 [ 154.497012][T11173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.502907][T11173] RIP: 0033:0x7ff7ab0b5d29 [ 154.507400][T11173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.527075][T11173] RSP: 002b:00007ff7a9727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 154.535484][T11173] RAX: ffffffffffffffda RBX: 00007ff7ab2a5fa0 RCX: 00007ff7ab0b5d29 [ 154.543441][T11173] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000003 [ 154.551405][T11173] RBP: 00007ff7a9727090 R08: 0000000000000000 R09: 0000000000000000 [ 154.559363][T11173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.567321][T11173] R13: 0000000000000000 R14: 00007ff7ab2a5fa0 R15: 00007ffcc86e9c98 [ 154.575334][T11173] [ 154.584612][ T9638] infiniband syz!: set down [ 154.632053][ T9638] team0 (unregistering): Port device team_slave_1 removed [ 154.641487][ T9638] team0 (unregistering): Port device team_slave_0 removed [ 154.649217][ T3956] smc: removing ib device syz! [ 154.689467][T11134] lo speed is unknown, defaulting to 1000 [ 154.699752][T11192] tipc: Enabled bearer , priority 10 [ 154.712952][T11052] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.720074][T11052] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.729734][T11052] bridge_slave_0: entered allmulticast mode [ 154.737377][T11052] bridge_slave_0: entered promiscuous mode [ 154.762694][T11052] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.769757][T11052] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.779255][T11052] bridge_slave_1: entered allmulticast mode [ 154.787158][T11052] bridge_slave_1: entered promiscuous mode [ 154.839004][T11199] SELinux: policydb version 0 does not match my version range 15-33 [ 154.852535][T11199] SELinux: failed to load policy [ 154.863077][T11052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.889266][T11052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.944291][T11052] team0: Port device team_slave_0 added [ 154.952288][T11052] team0: Port device team_slave_1 added [ 154.999070][T11213] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 155.020526][T11052] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 155.027564][T11052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 155.053579][T11052] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 155.062345][ T9638] IPVS: stop unused estimator thread 0... [ 155.071406][T11052] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 155.078412][T11052] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 155.104316][T11052] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 155.138902][T11052] hsr_slave_0: entered promiscuous mode [ 155.145160][T11052] hsr_slave_1: entered promiscuous mode [ 155.153724][T11213] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 155.214452][T11213] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 155.284174][T11213] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 155.314501][T11249] IPv6: NLM_F_CREATE should be specified when creating new route [ 155.326217][T11249] IPv6: Can't replace route, no match found [ 155.334436][T11052] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 155.408365][T11052] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 155.418044][T11052] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 155.433843][T11052] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 155.447435][T11213] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.460882][T11052] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.467955][T11052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.475222][T11052] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.482308][T11052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.498917][T11213] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.519729][T11213] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.583388][T11052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.593852][T11213] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.600801][T11270] sd 0:0:1:0: device reset [ 155.616864][ T9638] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.633961][ T9638] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.699728][T11052] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.707517][T11281] bpf_get_probe_write_proto: 23 callbacks suppressed [ 155.707530][T11281] syz.0.2727[11281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.726978][T11281] syz.0.2727[11281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.742688][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.761126][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.764672][T11281] syz.0.2727[11281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.769400][T11288] syz.0.2727[11288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.798956][ T9638] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.817426][ T9638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.825937][T11288] syz.0.2727[11288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.826037][T11288] syz.0.2727[11288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.996792][T11052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.062492][T11326] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2738'. [ 156.204279][T11052] veth0_vlan: entered promiscuous mode [ 156.225730][T11052] veth1_vlan: entered promiscuous mode [ 156.256297][T11052] veth0_macvtap: entered promiscuous mode [ 156.278699][T11052] veth1_macvtap: entered promiscuous mode [ 156.303138][T11052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 156.313671][T11052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 156.354395][T11052] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 156.365600][T11052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 156.376092][T11052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 156.395029][T11052] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 156.403675][T11052] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.412522][T11052] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.421253][T11052] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.429965][T11052] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.439453][T11371] syz.0.2744[11371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.439533][T11371] syz.0.2744[11371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.451149][T11371] syz.0.2744[11371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.463255][T11371] syz.0.2744[11371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.553698][T11379] netlink: 40227 bytes leftover after parsing attributes in process `syz.5.2662'. [ 156.654966][T11392] netlink: 52 bytes leftover after parsing attributes in process `syz.5.2749'. [ 156.770254][T11407] netlink: 48 bytes leftover after parsing attributes in process `syz.5.2753'. [ 156.805852][ T29] kauditd_printk_skb: 365 callbacks suppressed [ 156.805864][ T29] audit: type=1326 audit(1734922271.025:9116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 156.854396][ T29] audit: type=1326 audit(1734922271.025:9117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 156.877951][ T29] audit: type=1326 audit(1734922271.055:9118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 156.901469][ T29] audit: type=1326 audit(1734922271.055:9119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 156.925056][ T29] audit: type=1326 audit(1734922271.055:9120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 156.948641][ T29] audit: type=1326 audit(1734922271.055:9121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 156.972223][ T29] audit: type=1326 audit(1734922271.055:9122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 156.995714][ T29] audit: type=1326 audit(1734922271.055:9123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 157.019177][ T29] audit: type=1326 audit(1734922271.055:9124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 157.042656][ T29] audit: type=1326 audit(1734922271.055:9125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11411 comm="syz.0.2755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 157.196795][T11437] netlink: 65055 bytes leftover after parsing attributes in process `syz.2.2759'. [ 157.247112][T11441] IPVS: set_ctl: invalid protocol: 98 172.20.20.187:65535 [ 157.277155][T11446] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 157.342697][T11455] netem: change failed [ 157.607759][T11482] SELinux: security policydb version 18 (MLS) not backwards compatible [ 157.618227][T11482] SELinux: failed to load policy [ 157.853439][T11521] SELinux: policydb version 0 does not match my version range 15-33 [ 157.865522][T11521] SELinux: failed to load policy [ 157.911519][T11527] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 157.920540][T11527] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 157.921161][T11525] loop3: detected capacity change from 0 to 2048 [ 157.954650][T11525] loop3: p3 < > p4 < > [ 157.958843][T11525] loop3: partition table partially beyond EOD, truncated [ 157.966010][T11525] loop3: p3 start 4284289 is beyond EOD, truncated [ 157.979697][ T3002] loop3: p3 < > p4 < > [ 157.983854][ T3002] loop3: partition table partially beyond EOD, truncated [ 157.992600][ T3002] loop3: p3 start 4284289 is beyond EOD, truncated [ 158.018112][ T3291] udevd[3291]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 158.040703][T11525] __nla_validate_parse: 1 callbacks suppressed [ 158.040715][T11525] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2791'. [ 158.043359][ T3291] udevd[3291]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 158.046932][T11525] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2791'. [ 158.047262][T11525] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2791'. [ 158.236924][T11550] loop3: detected capacity change from 0 to 512 [ 158.244107][T11550] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 158.268835][T11550] EXT4-fs (loop3): 1 truncate cleaned up [ 158.275747][T11550] EXT4-fs mount: 51 callbacks suppressed [ 158.275758][T11550] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 158.296471][T11550] EXT4-fs error (device loop3): mb_free_blocks:1948: group 0, inode 15: block 33:freeing already freed block (bit 32); block bitmap corrupt. [ 158.336789][ T3299] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 158.377021][T11568] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2803'. [ 158.399891][T11570] netem: change failed [ 158.632777][T11602] netem: change failed [ 158.769861][T11608] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 158.816534][T11608] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 159.047928][T11618] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2825'. [ 159.138482][T11626] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2829'. [ 159.370939][T11639] loop2: detected capacity change from 0 to 2048 [ 159.411886][T11639] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 159.473686][T11651] loop5: detected capacity change from 0 to 512 [ 159.494209][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 159.529218][T11651] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 159.542410][T11651] ext4 filesystem being mounted at /10/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 159.553916][T11651] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 159.573776][T11646] lo speed is unknown, defaulting to 1000 [ 159.677123][T11646] chnl_net:caif_netlink_parms(): no params data found [ 159.677345][T11662] loop2: detected capacity change from 0 to 512 [ 159.690488][T11662] EXT4-fs: Ignoring removed nobh option [ 159.759424][T11662] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 159.770273][T11662] EXT4-fs (loop2): orphan cleanup on readonly fs [ 159.780991][T11662] EXT4-fs error (device loop2): ext4_acquire_dquot:6938: comm syz.2.2838: Failed to acquire dquot type 1 [ 159.800346][T11692] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 159.816973][T11692] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 159.835219][T11646] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.842289][T11646] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.863292][T11646] bridge_slave_0: entered allmulticast mode [ 159.864900][T11662] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz.2.2838: bg 0: block 40: padding at end of block bitmap is not set [ 159.871784][T11646] bridge_slave_0: entered promiscuous mode [ 159.890505][T11646] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.897248][T11662] EXT4-fs error (device loop2) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 159.897613][T11646] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.909987][T11662] EXT4-fs (loop2): 1 truncate cleaned up [ 159.913434][T11646] bridge_slave_1: entered allmulticast mode [ 159.925771][T11662] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 159.925999][T11646] bridge_slave_1: entered promiscuous mode [ 159.944033][T11697] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2847'. [ 159.950053][T11695] SELinux: policydb version 0 does not match my version range 15-33 [ 159.961809][T11697] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 159.966162][T11695] SELinux: failed to load policy [ 159.978224][T11646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.988669][T11646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.027782][T11646] team0: Port device team_slave_0 added [ 160.041802][T11646] team0: Port device team_slave_1 added [ 160.058976][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 160.088542][T11646] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.095550][T11646] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.121459][T11646] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.132719][T11646] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.139699][T11646] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.165684][T11646] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.194888][T11717] futex_wake_op: syz.5.2857 tries to shift op by -1; fix this program [ 160.209648][T11646] hsr_slave_0: entered promiscuous mode [ 160.220896][T11646] hsr_slave_1: entered promiscuous mode [ 160.227439][T11646] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 160.235289][T11646] Cannot create hsr debugfs directory [ 160.252470][T11723] SELinux: policydb version 0 does not match my version range 15-33 [ 160.265514][T11723] SELinux: failed to load policy [ 160.280791][T11719] loop5: detected capacity change from 0 to 512 [ 160.377382][T11646] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.398757][T11734] lo speed is unknown, defaulting to 1000 [ 160.419746][T11742] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2865'. [ 160.451719][T11646] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.474030][T11744] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2869'. [ 160.536205][T11646] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.595143][T11756] netlink: 'syz.2.2873': attribute type 27 has an invalid length. [ 160.635773][T11646] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.680214][T11767] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 160.689230][T11767] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 160.719356][T11646] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 160.728834][T11646] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 160.739470][T11646] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 160.747904][T11774] netlink: 65055 bytes leftover after parsing attributes in process `syz.5.2880'. [ 160.757317][T11646] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 160.797091][T11646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.809104][T11646] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.818319][ T9638] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.825424][ T9638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.836093][ T3957] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.843152][ T3957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.905271][T11646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.023103][T11646] veth0_vlan: entered promiscuous mode [ 161.032775][T11646] veth1_vlan: entered promiscuous mode [ 161.050804][T11646] veth0_macvtap: entered promiscuous mode [ 161.058653][T11646] veth1_macvtap: entered promiscuous mode [ 161.071006][T11646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.081553][T11646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.091482][T11646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 161.101978][T11646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.112960][T11646] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 161.121423][T11646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.132046][T11646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.141917][T11646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 161.152465][T11646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 161.170546][T11646] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 161.182672][T11646] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.191516][T11646] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.200422][T11646] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.209270][T11646] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.271176][T11811] loop4: detected capacity change from 0 to 2048 [ 161.295954][T11810] lo speed is unknown, defaulting to 1000 [ 161.312497][T11811] Alternate GPT is invalid, using primary GPT. [ 161.318867][T11811] loop4: p2 p3 p7 [ 161.388175][ T3002] Alternate GPT is invalid, using primary GPT. [ 161.394544][ T3002] loop4: p2 p3 p7 [ 161.438281][ T3616] udevd[3616]: inotify_add_watch(7, /dev/loop4p7, 10) failed: No such file or directory [ 161.438353][ T3291] udevd[3291]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 161.460772][ T3377] udevd[3377]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 161.547826][T11841] netem: change failed [ 161.575949][T11843] loop5: detected capacity change from 0 to 732 [ 161.691716][T11852] netem: change failed [ 161.781801][T11870] netem: change failed [ 161.852579][ T29] kauditd_printk_skb: 416 callbacks suppressed [ 161.852592][ T29] audit: type=1326 audit(1734922276.065:9540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 161.885611][T11879] SELinux: security policydb version 18 (MLS) not backwards compatible [ 161.894535][T11879] SELinux: failed to load policy [ 161.894605][ T29] audit: type=1326 audit(1734922276.105:9541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 161.923105][ T29] audit: type=1326 audit(1734922276.105:9542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 161.946929][ T29] audit: type=1326 audit(1734922276.105:9543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 161.970395][ T29] audit: type=1326 audit(1734922276.105:9544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 161.993957][ T29] audit: type=1326 audit(1734922276.105:9545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 162.017477][ T29] audit: type=1326 audit(1734922276.105:9546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 162.041019][ T29] audit: type=1326 audit(1734922276.105:9547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 162.064526][ T29] audit: type=1326 audit(1734922276.105:9548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 162.088107][ T29] audit: type=1326 audit(1734922276.105:9549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11878 comm="syz.0.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feb28155d29 code=0x7ffc0000 [ 162.095575][T11883] loop5: detected capacity change from 0 to 2048 [ 162.237619][T11883] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 162.313595][T11898] lo speed is unknown, defaulting to 1000 [ 162.369843][T11052] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 162.399567][T11909] netem: change failed [ 162.455780][T11917] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 162.490771][T11917] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 162.562529][T11925] loop5: detected capacity change from 0 to 2048 [ 162.622874][T11925] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 162.680690][T11052] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 162.753085][T11944] netem: change failed [ 162.763828][T11945] loop4: detected capacity change from 0 to 2048 [ 162.787981][T11947] SELinux: security policydb version 18 (MLS) not backwards compatible [ 162.797321][T11947] SELinux: failed to load policy [ 162.798157][T11945] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 162.843366][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 162.912829][T11965] loop5: detected capacity change from 0 to 128 [ 163.095173][T11994] __nla_validate_parse: 5 callbacks suppressed [ 163.095188][T11994] netlink: 65055 bytes leftover after parsing attributes in process `syz.4.2956'. [ 163.170124][T12002] bpf_get_probe_write_proto: 17 callbacks suppressed [ 163.170203][T12002] syz.4.2961[12002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.186034][T12002] syz.4.2961[12002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.197727][T12002] syz.4.2961[12002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.225372][T12002] syz.4.2961[12002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.239516][T11999] lo speed is unknown, defaulting to 1000 [ 163.259663][T12006] loop2: detected capacity change from 0 to 512 [ 163.275415][T12002] syz.4.2961[12002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.275536][T12002] syz.4.2961[12002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.280967][T12006] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 163.364765][T12006] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -2 [ 163.415763][T12006] EXT4-fs (loop2): 1 truncate cleaned up [ 163.422253][T12006] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 163.563901][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 163.693055][T12066] loop3: detected capacity change from 0 to 2048 [ 163.850235][T12066] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 163.950052][T12085] syz.2.2976[12085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.950116][T12085] syz.2.2976[12085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.961883][T12085] syz.2.2976[12085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.996732][ T3299] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 164.079345][T12105] syz.2.2978[12105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.139105][T12119] loop5: detected capacity change from 0 to 2048 [ 164.199450][T12125] loop2: detected capacity change from 0 to 512 [ 164.210177][T12121] SELinux: Context system_u:object_r:dhcp_state_t:s0 is not valid (left unmapped). [ 164.215729][T12125] EXT4-fs: quotafile must be on filesystem root [ 164.234304][T12119] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 164.274643][T11052] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 164.537614][ T9654] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 164.562746][T12147] lo speed is unknown, defaulting to 1000 [ 164.576100][ T9654] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 164.637654][ T9654] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 164.696558][ T9654] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 164.707987][T12147] chnl_net:caif_netlink_parms(): no params data found [ 164.780334][T12147] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.787517][T12147] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.794810][T12147] bridge_slave_0: entered allmulticast mode [ 164.801326][T12147] bridge_slave_0: entered promiscuous mode [ 164.807954][T12147] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.815096][T12147] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.822219][T12147] bridge_slave_1: entered allmulticast mode [ 164.828753][T12147] bridge_slave_1: entered promiscuous mode [ 164.843027][T12176] netlink: 65055 bytes leftover after parsing attributes in process `syz.4.2994'. [ 164.862754][T12147] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.875516][T12147] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.940778][ T9654] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 164.951576][ T9654] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 164.961203][ T9654] bond0 (unregistering): Released all slaves [ 164.983205][T12183] loop4: detected capacity change from 0 to 2048 [ 164.984879][T12147] team0: Port device team_slave_0 added [ 164.999981][T12147] team0: Port device team_slave_1 added [ 165.007854][T12183] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 165.028646][ T9654] tipc: Disabling bearer [ 165.033618][ T9654] tipc: Disabling bearer [ 165.038948][ T9654] tipc: Left network mode [ 165.051769][T12147] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.058757][T12147] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.084747][T12147] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.096372][T12147] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.103312][T12147] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.129226][T12147] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.148103][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 165.169584][T12147] hsr_slave_0: entered promiscuous mode [ 165.196401][T12147] hsr_slave_1: entered promiscuous mode [ 165.217185][T12147] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.228760][T12147] Cannot create hsr debugfs directory [ 165.267233][ T9654] hsr_slave_0: left promiscuous mode [ 165.289197][ T9654] hsr_slave_1: left promiscuous mode [ 165.320738][ T9654] veth1_macvtap: left promiscuous mode [ 165.326258][ T9654] veth0_macvtap: left promiscuous mode [ 165.331785][ T9654] veth1_vlan: left promiscuous mode [ 165.337086][ T9654] veth0_vlan: left promiscuous mode [ 165.380532][T12222] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 165.390791][T12222] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 165.420141][T12225] SELinux: security policydb version 18 (MLS) not backwards compatible [ 165.434894][T12225] SELinux: failed to load policy [ 165.483494][ T9] lo speed is unknown, defaulting to 1000 [ 165.640268][T12254] loop3: detected capacity change from 0 to 2048 [ 165.666357][T12254] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 165.693664][ T3299] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 165.738528][T12271] loop3: detected capacity change from 0 to 1024 [ 165.763980][T12271] EXT4-fs: quotafile must be on filesystem root [ 165.795197][T12271] loop3: detected capacity change from 0 to 512 [ 165.822547][T12271] EXT4-fs (loop3): orphan cleanup on readonly fs [ 165.831780][ T9654] IPVS: stop unused estimator thread 0... [ 165.845211][T12271] EXT4-fs error (device loop3): ext4_acquire_dquot:6938: comm syz.3.3013: Failed to acquire dquot type 1 [ 165.857700][T12288] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 165.879975][T12271] EXT4-fs (loop3): 1 truncate cleaned up [ 165.886888][T12271] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 165.916599][T12271] netlink: 'syz.3.3013': attribute type 1 has an invalid length. [ 165.958303][T12147] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 165.977419][ T3299] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 166.018107][T12314] SELinux: security policydb version 18 (MLS) not backwards compatible [ 166.026575][T12147] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 166.033212][T12314] SELinux: failed to load policy [ 166.069192][T12147] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 166.095042][T12147] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 166.131522][T12147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.142833][T12147] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.155128][ T3957] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.162169][ T3957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.198167][T12147] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 166.208675][T12147] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.230729][ T3957] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.237958][ T3957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.291602][T12347] netlink: 65055 bytes leftover after parsing attributes in process `syz.4.3026'. [ 166.344063][T12147] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.430514][T12373] autofs4:pid:12373:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(2.128), cmd(0xc018937e) [ 166.443960][T12373] autofs4:pid:12373:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) [ 166.492914][T12147] veth0_vlan: entered promiscuous mode [ 166.502156][T12147] veth1_vlan: entered promiscuous mode [ 166.518720][T12147] veth0_macvtap: entered promiscuous mode [ 166.519962][T12386] loop3: detected capacity change from 0 to 512 [ 166.532894][T12147] veth1_macvtap: entered promiscuous mode [ 166.567303][T12147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 166.577850][T12147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.587693][T12147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 166.598200][T12147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.608094][T12147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 166.618587][T12147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.629892][T12147] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 166.640220][T12147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 166.650751][T12147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.660655][T12147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 166.671193][T12147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.681087][T12147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 166.691527][T12147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 166.701297][T12386] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 166.701359][T12386] ext4 filesystem being mounted at /600/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 166.727341][T12147] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 166.741819][T12147] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.750556][T12147] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.759272][T12147] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.768263][T12147] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.795466][T12386] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3033'. [ 166.850084][T12412] netem: change failed [ 166.879071][ T3299] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 167.030079][T12427] loop2: detected capacity change from 0 to 2048 [ 167.056697][T12427] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 167.093330][T12416] chnl_net:caif_netlink_parms(): no params data found [ 167.124713][T12147] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 167.157599][T12416] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.164715][T12416] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.184641][T12416] bridge_slave_0: entered allmulticast mode [ 167.191251][T12416] bridge_slave_0: entered promiscuous mode [ 167.198444][T12436] netlink: 65055 bytes leftover after parsing attributes in process `syz.2.3038'. [ 167.215299][ T29] kauditd_printk_skb: 406 callbacks suppressed [ 167.215312][ T29] audit: type=1326 audit(1734922281.425:9954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.245038][ T29] audit: type=1326 audit(1734922281.425:9955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.245530][T12416] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.275672][T12416] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.294694][T12416] bridge_slave_1: entered allmulticast mode [ 167.306475][ T29] audit: type=1326 audit(1734922281.435:9956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.315408][T12416] bridge_slave_1: entered promiscuous mode [ 167.329955][ T29] audit: type=1326 audit(1734922281.435:9957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.329978][ T29] audit: type=1326 audit(1734922281.435:9958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.329997][ T29] audit: type=1326 audit(1734922281.435:9959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.406854][ T29] audit: type=1326 audit(1734922281.435:9960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.430401][ T29] audit: type=1326 audit(1734922281.435:9961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.453877][ T29] audit: type=1326 audit(1734922281.435:9962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.477347][ T29] audit: type=1326 audit(1734922281.435:9963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12437 comm="syz.4.3039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea41b5d29 code=0x7ffc0000 [ 167.523933][T12416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.538503][T12416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.591007][T12416] team0: Port device team_slave_0 added [ 167.603971][T12416] team0: Port device team_slave_1 added [ 167.639238][T12416] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 167.646257][T12416] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 167.655236][T12466] loop2: detected capacity change from 0 to 1024 [ 167.672248][T12416] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 167.690766][T12416] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 167.697738][T12416] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 167.700623][T12464] loop5: detected capacity change from 0 to 512 [ 167.723640][T12416] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 167.761308][T12466] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 167.800885][T12466] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 167.817200][T12466] EXT4-fs (loop2): orphan cleanup on readonly fs [ 167.825192][T12466] EXT4-fs error (device loop2) in ext4_reserve_inode_write:5837: Corrupt filesystem [ 167.835441][T12416] hsr_slave_0: entered promiscuous mode [ 167.841608][T12416] hsr_slave_1: entered promiscuous mode [ 167.845230][T12466] EXT4-fs (loop2): Remounting filesystem read-only [ 167.854110][T12416] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 167.861760][T12416] Cannot create hsr debugfs directory [ 167.864025][T12466] EXT4-fs (loop2): 1 orphan inode deleted [ 167.892845][T12466] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 167.934462][T12466] SELinux: (dev loop2, type ext4) getxattr errno 5 [ 167.959649][T12488] netem: change failed [ 167.991842][T12416] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.014844][T12466] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 168.037530][T12416] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.066389][T12498] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3048'. [ 168.135787][T12416] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.146518][T12514] SELinux: security policydb version 18 (MLS) not backwards compatible [ 168.162705][T12514] SELinux: failed to load policy [ 168.206080][T12416] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.333064][T12416] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 168.353368][T12550] bpf_get_probe_write_proto: 14 callbacks suppressed [ 168.353392][T12550] syz.4.3058[12550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.376698][T12416] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 168.401912][T12550] syz.4.3058[12550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.401987][T12550] syz.4.3058[12550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.422927][T12550] syz.4.3058[12550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.435534][T12416] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 168.454528][T12550] syz.4.3058[12550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.454683][T12550] syz.4.3058[12550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.470781][T12416] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 168.604317][T12585] loop2: detected capacity change from 0 to 2048 [ 168.616017][T12416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.649401][T12416] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.658961][T12585] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 168.673482][ T9652] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.680533][ T9652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.689495][ T9652] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.696645][ T9652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.712312][T12416] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 168.722797][T12416] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.778350][T12147] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 168.820341][T12416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.880322][T12626] loop5: detected capacity change from 0 to 2048 [ 168.884885][T12636] loop4: detected capacity change from 0 to 512 [ 168.916248][T12636] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 168.938936][T12646] loop2: detected capacity change from 0 to 2048 [ 168.946735][T12626] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 168.947368][T12636] ext4 filesystem being mounted at /43/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 168.977776][T12636] 9pnet_fd: Insufficient options for proto=fd [ 168.985778][T12646] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 169.015855][T11052] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 169.037903][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 169.042636][T12147] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 169.086914][T12660] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 169.096171][T12662] syz.5.3075[12662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.096223][T12662] syz.5.3075[12662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.113733][T12416] veth0_vlan: entered promiscuous mode [ 169.139375][T12660] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 169.147340][T12662] syz.5.3075[12662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.150924][T12662] syz.5.3075[12662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.167191][T12416] veth1_vlan: entered promiscuous mode [ 169.232329][T12416] veth0_macvtap: entered promiscuous mode [ 169.239678][T12416] veth1_macvtap: entered promiscuous mode [ 169.255233][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 169.265936][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.276040][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 169.286501][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.296333][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 169.306962][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.316991][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 169.327475][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.335382][T12694] SELinux: security policydb version 18 (MLS) not backwards compatible [ 169.339522][T12416] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 169.346370][T12693] loop2: detected capacity change from 0 to 2048 [ 169.353936][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 169.359517][T12694] SELinux: failed to load policy [ 169.369544][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.369556][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 169.369568][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.369578][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 169.415213][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.425079][T12416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 169.425729][T12693] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 169.435485][T12416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.437315][T12416] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.500844][T12147] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 169.519829][T12416] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 169.522621][T12699] 9pnet: Unknown protocol version 9p2000.T [ 169.528649][T12416] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 169.528681][T12416] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 169.551950][T12416] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 169.573257][T12706] loop2: detected capacity change from 0 to 128 [ 169.600288][T12706] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x61ff7272 (sector = 1) [ 169.619222][T12708] xt_connbytes: Forcing CT accounting to be enabled [ 169.626772][T12708] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 169.801764][T12733] loop3: detected capacity change from 0 to 2048 [ 169.817631][T12726] netlink: 24 bytes leftover after parsing attributes in process `+}[@'. [ 169.861478][T12733] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 169.932722][T12743] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3094'. [ 169.961666][T12416] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 170.009636][ T40] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.057498][ T40] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.136778][T12739] chnl_net:caif_netlink_parms(): no params data found [ 170.172612][ T40] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.226033][ T40] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.250339][T12739] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.257556][T12739] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.271394][T12739] bridge_slave_0: entered allmulticast mode [ 170.280352][T12739] bridge_slave_0: entered promiscuous mode [ 170.297505][T12739] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.304589][T12739] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.314327][T12739] bridge_slave_1: entered allmulticast mode [ 170.324149][T12739] bridge_slave_1: entered promiscuous mode [ 170.332267][T12783] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 170.377643][T12781] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 170.620465][T12788] SELinux: security policydb version 18 (MLS) not backwards compatible [ 170.688795][ T40] bond0 (unregistering): Released all slaves [ 170.698992][T12788] SELinux: failed to load policy [ 170.780892][T12739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.792344][ T40] tipc: Disabling bearer [ 170.797449][ T40] tipc: Left network mode [ 170.798305][T12739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.814811][T12804] SELinux: security policydb version 18 (MLS) not backwards compatible [ 170.826029][ T40] IPVS: stopping backup sync thread 9694 ... [ 170.826523][T12804] SELinux: failed to load policy [ 170.912307][T12739] team0: Port device team_slave_0 added [ 170.920821][T12739] team0: Port device team_slave_1 added [ 170.948918][ T40] hsr_slave_0: left promiscuous mode [ 170.959805][ T40] hsr_slave_1: left promiscuous mode [ 170.967169][ T40] veth1_macvtap: left promiscuous mode [ 170.972661][ T40] veth0_macvtap: left promiscuous mode [ 170.978218][ T40] veth1_vlan: left promiscuous mode [ 170.983541][ T40] veth0_vlan: left promiscuous mode [ 170.993669][T12823] netlink: 'syz.4.3111': attribute type 7 has an invalid length. [ 171.001414][T12823] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3111'. [ 171.050812][T12826] loop4: detected capacity change from 0 to 256 [ 171.100333][T12818] netlink: 40227 bytes leftover after parsing attributes in process `syz.3.3109'. [ 171.145479][T12739] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.152435][T12739] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.178408][T12739] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.192826][T12739] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 171.199814][T12739] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.225704][T12739] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 171.289793][T12739] hsr_slave_0: entered promiscuous mode [ 171.303874][T12739] hsr_slave_1: entered promiscuous mode [ 171.311731][T12739] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 171.330411][T12739] Cannot create hsr debugfs directory [ 171.422204][T12864] SELinux: security policydb version 18 (MLS) not backwards compatible [ 171.431420][T12864] SELinux: failed to load policy [ 171.528157][ T40] IPVS: stop unused estimator thread 0... [ 171.671845][T12894] loop4: detected capacity change from 0 to 2048 [ 171.686365][T12896] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 171.723540][T12739] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 171.723655][T12894] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 171.743895][T12739] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 171.785827][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 171.799613][T12739] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 171.812262][T12916] SELinux: security policydb version 18 (MLS) not backwards compatible [ 171.830468][T12916] SELinux: failed to load policy [ 171.851966][T12739] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 171.918960][T12927] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 171.928136][T12927] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 171.942930][T12739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.961411][T12929] 9pnet_fd: Insufficient options for proto=fd [ 171.972928][T12739] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.991116][ T3957] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.998245][ T3957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.018755][ T3957] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.025823][ T3957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.122854][T12739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.229165][T12739] veth0_vlan: entered promiscuous mode [ 172.237970][T12739] veth1_vlan: entered promiscuous mode [ 172.253876][T12739] veth0_macvtap: entered promiscuous mode [ 172.261176][T12739] veth1_macvtap: entered promiscuous mode [ 172.270517][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.281035][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.290855][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.301394][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.311216][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.321781][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.331661][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.342112][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.352006][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.362463][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.373022][T12739] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.384497][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.395081][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.404965][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.415427][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.415438][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.415516][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.415531][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.415542][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.415551][T12739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.415562][T12739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.416500][T12739] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.418702][T12739] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.505628][T12739] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.505663][T12739] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.505711][T12739] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.514475][ T29] kauditd_printk_skb: 485 callbacks suppressed [ 172.514487][ T29] audit: type=1400 audit(1734922286.725:10445): avc: denied { create } for pid=12975 comm="syz.5.3138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 172.562193][ T29] audit: type=1400 audit(1734922286.725:10446): avc: denied { bind } for pid=12975 comm="syz.5.3138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 172.562212][ T29] audit: type=1400 audit(1734922286.725:10447): avc: denied { write } for pid=12975 comm="syz.5.3138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 172.641108][T12983] loop5: detected capacity change from 0 to 2048 [ 172.654585][ T29] audit: type=1400 audit(1734922286.855:10448): avc: denied { getopt } for pid=12984 comm="syz.0.3092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 172.668554][T12983] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 172.710873][T12977] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3137'. [ 172.711108][T12977] netlink: 136 bytes leftover after parsing attributes in process `syz.4.3137'. [ 172.713717][T12977] loop4: detected capacity change from 0 to 512 [ 172.736694][T12977] ext4: Unknown parameter 'obj_role' [ 172.755218][T12991] netlink: 104 bytes leftover after parsing attributes in process `syz.0.3141'. [ 172.767380][T11052] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 172.870298][ T29] audit: type=1400 audit(1734922287.085:10449): avc: denied { append } for pid=13003 comm="syz.5.3147" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 172.895323][T13004] random: crng reseeded on system resumption [ 172.915949][T13002] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3146'. [ 172.933372][ T29] audit: type=1400 audit(1734922287.145:10450): avc: denied { create } for pid=13001 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 173.001014][ T29] audit: type=1326 audit(1734922287.215:10451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13008 comm="syz.2.3148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f788e935d29 code=0x7ffc0000 [ 173.024693][ T29] audit: type=1326 audit(1734922287.215:10452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13008 comm="syz.2.3148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f788e935d29 code=0x7ffc0000 [ 173.069318][ T29] audit: type=1326 audit(1734922287.245:10453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13008 comm="syz.2.3148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f788e935d29 code=0x7ffc0000 [ 173.093036][ T29] audit: type=1326 audit(1734922287.245:10454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13008 comm="syz.2.3148" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f788e935d29 code=0x7ffc0000 [ 173.136298][T13018] 9pnet_fd: Insufficient options for proto=fd [ 173.143028][T13018] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3152'. [ 173.210460][T13027] loop5: detected capacity change from 0 to 1024 [ 173.223445][T13027] EXT4-fs: Ignoring removed nobh option [ 173.229070][T13027] EXT4-fs: Ignoring removed nomblk_io_submit option [ 173.237403][T13027] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 173.247206][T13027] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 173.295969][T11052] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 173.305491][T13030] 9pnet_fd: Insufficient options for proto=fd [ 173.349924][T13046] SELinux: security policydb version 18 (MLS) not backwards compatible [ 173.358258][T13046] SELinux: failed to load policy [ 173.406934][T13049] loop5: detected capacity change from 0 to 512 [ 173.426638][T13049] EXT4-fs (loop5): too many log groups per flexible block group [ 173.434380][T13049] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 173.441295][T13049] EXT4-fs (loop5): mount failed [ 173.605501][T13068] loop5: detected capacity change from 0 to 512 [ 173.612051][T13068] EXT4-fs: Ignoring removed nobh option [ 173.617722][T13068] journal_path: Lookup failure for './file0..' [ 173.623890][T13068] EXT4-fs: error: could not find journal device path [ 173.663077][T13072] bpf_get_probe_write_proto: 35 callbacks suppressed [ 173.663086][T13072] syz.5.3173[13072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.669967][T13072] syz.5.3173[13072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.681681][T13072] syz.5.3173[13072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.694070][T13072] syz.5.3173[13072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.705904][T13072] syz.5.3173[13072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.717542][T13072] syz.5.3173[13072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.738559][T13074] SELinux: security policydb version 18 (MLS) not backwards compatible [ 173.758948][T13074] SELinux: failed to load policy [ 173.886712][T13090] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3181'. [ 173.981330][T13102] SELinux: security policydb version 18 (MLS) not backwards compatible [ 173.995196][T13102] SELinux: failed to load policy [ 174.039029][T13114] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 174.053870][T13114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=274 sclass=netlink_route_socket pid=13114 comm=syz.2.3192 [ 174.116410][T13117] cgroup2: Unknown parameter 'dont_hash' [ 174.255523][T13123] 9pnet_fd: Insufficient options for proto=fd [ 174.432423][T13159] syz.2.3206[13159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.432501][T13159] syz.2.3206[13159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.444259][T13159] syz.2.3206[13159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.456865][T13159] syz.2.3206[13159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.552088][T13167] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 174.572324][T13167] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 174.677678][T13188] loop4: detected capacity change from 0 to 512 [ 174.706954][T13188] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 174.720005][T13188] ext4 filesystem being mounted at /69/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 174.735470][T13189] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 96 vs 65376 free clusters [ 174.755134][T13188] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 22 with error 28 [ 174.767472][T13188] EXT4-fs (loop4): This should not happen!! Data will be lost [ 174.767472][T13188] [ 174.777133][T13188] EXT4-fs (loop4): Total free blocks count 0 [ 174.783187][T13188] EXT4-fs (loop4): Free/Dirty block details [ 174.789197][T13188] EXT4-fs (loop4): free_blocks=65281 [ 174.794569][T13188] EXT4-fs (loop4): dirty_blocks=22 [ 174.799688][T13188] EXT4-fs (loop4): Block reservation details [ 174.805669][T13188] EXT4-fs (loop4): i_reserved_data_blocks=22 [ 174.844551][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 175.037437][T13230] netem: change failed [ 175.230648][T13239] vlan2: entered promiscuous mode [ 175.458673][T13249] __nla_validate_parse: 5 callbacks suppressed [ 175.458690][T13249] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3240'. [ 175.849669][T13288] loop4: detected capacity change from 0 to 512 [ 175.858088][T13288] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 175.870966][T13288] EXT4-fs (loop4): 1 truncate cleaned up [ 175.877095][T13288] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 175.890973][T13288] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 175.947117][T13297] xt_hashlimit: overflow, try lower: 18446744073709551615/7 [ 176.032353][T13309] loop4: detected capacity change from 0 to 2048 [ 176.047793][T13309] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 176.116903][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.170309][T13325] loop4: detected capacity change from 0 to 128 [ 176.185400][T13325] FAT-fs (loop4): Directory bread(block 162) failed [ 176.194892][T13325] FAT-fs (loop4): Directory bread(block 163) failed [ 176.201496][T13325] FAT-fs (loop4): Directory bread(block 164) failed [ 176.208376][T13325] FAT-fs (loop4): Directory bread(block 165) failed [ 176.217024][T13325] FAT-fs (loop4): Directory bread(block 166) failed [ 176.231550][T13325] FAT-fs (loop4): Directory bread(block 167) failed [ 176.239986][T13325] FAT-fs (loop4): Directory bread(block 168) failed [ 176.252283][T13325] FAT-fs (loop4): Directory bread(block 169) failed [ 176.270938][T13325] FAT-fs (loop4): Directory bread(block 162) failed [ 176.279887][T13325] FAT-fs (loop4): Directory bread(block 163) failed [ 176.294731][T13325] bio_check_eod: 20789 callbacks suppressed [ 176.294810][T13325] syz.4.3260: attempt to access beyond end of device [ 176.294810][T13325] loop4: rw=3, sector=226, nr_sectors = 6 limit=128 [ 176.317275][T13325] syz.4.3260: attempt to access beyond end of device [ 176.317275][T13325] loop4: rw=2051, sector=232, nr_sectors = 2 limit=128 [ 176.399796][T13340] netem: change failed [ 176.534786][T13350] loop4: detected capacity change from 0 to 2048 [ 176.562982][T13350] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 176.594745][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 176.733712][T13354] loop4: detected capacity change from 0 to 256 [ 176.750298][T13354] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 176.779324][T13358] netlink: 136 bytes leftover after parsing attributes in process `syz.0.3269'. [ 176.810710][T13363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=13363 comm=syz.0.3270 [ 177.467510][T13388] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3279'. [ 177.492010][T13388] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3279'. [ 177.590294][T13390] FAULT_INJECTION: forcing a failure. [ 177.590294][T13390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.603464][T13390] CPU: 1 UID: 0 PID: 13390 Comm: syz.3.3280 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 177.614224][T13390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 177.624273][T13390] Call Trace: [ 177.627653][T13390] [ 177.630583][T13390] dump_stack_lvl+0xf2/0x150 [ 177.635186][T13390] dump_stack+0x15/0x1a [ 177.639357][T13390] should_fail_ex+0x223/0x230 [ 177.641794][T13391] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3280'. [ 177.644022][T13390] should_fail+0xb/0x10 [ 177.657086][T13390] should_fail_usercopy+0x1a/0x20 [ 177.662165][T13390] _copy_from_user+0x1e/0xb0 [ 177.666758][T13390] input_event_from_user+0x126/0x1e0 [ 177.672123][T13390] evdev_write+0x29d/0x440 [ 177.676549][T13390] ? __pfx_evdev_write+0x10/0x10 [ 177.681513][T13390] vfs_write+0x281/0x920 [ 177.685765][T13390] ? __fget_files+0x17c/0x1c0 [ 177.690527][T13390] ksys_write+0xe8/0x1b0 [ 177.694779][T13390] __x64_sys_write+0x42/0x50 [ 177.698139][T13391] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3280'. [ 177.699360][T13390] x64_sys_call+0x287e/0x2dc0 [ 177.712941][T13390] do_syscall_64+0xc9/0x1c0 [ 177.717440][T13390] ? clear_bhb_loop+0x55/0xb0 [ 177.722225][T13390] ? clear_bhb_loop+0x55/0xb0 [ 177.726903][T13390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 177.732821][T13390] RIP: 0033:0x7f5c60e45d29 [ 177.737233][T13390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.756923][T13390] RSP: 002b:00007f5c5f4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 177.765444][T13390] RAX: ffffffffffffffda RBX: 00007f5c61035fa0 RCX: 00007f5c60e45d29 [ 177.773418][T13390] RDX: 00000000000012d8 RSI: 0000000020000040 RDI: 0000000000000007 [ 177.781392][T13390] RBP: 00007f5c5f4b1090 R08: 0000000000000000 R09: 0000000000000000 [ 177.789376][T13390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.797352][T13390] R13: 0000000000000000 R14: 00007f5c61035fa0 R15: 00007ffd7fbae3a8 [ 177.805327][T13390] [ 178.045645][ T29] kauditd_printk_skb: 461 callbacks suppressed [ 178.045658][ T29] audit: type=1400 audit(1734922292.265:10916): avc: denied { connect } for pid=13399 comm="syz.0.3285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 178.099788][T13407] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3284'. [ 178.107375][ T29] audit: type=1400 audit(1734922292.305:10917): avc: denied { bind } for pid=13401 comm="syz.3.3284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 178.179793][T13407] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3284'. [ 178.525589][ T29] audit: type=1326 audit(1734922292.745:10918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13410 comm="syz.3.3287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 178.580877][T13413] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3288'. [ 178.589877][T13413] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3288'. [ 178.596134][ T29] audit: type=1326 audit(1734922292.785:10919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13410 comm="syz.3.3287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=97 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 178.622278][ T29] audit: type=1326 audit(1734922292.785:10920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13410 comm="syz.3.3287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 178.645881][ T29] audit: type=1326 audit(1734922292.785:10921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13410 comm="syz.3.3287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 178.669429][ T29] audit: type=1326 audit(1734922292.785:10922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13410 comm="syz.3.3287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=424 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 178.693101][ T29] audit: type=1326 audit(1734922292.785:10923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13410 comm="syz.3.3287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 178.822815][T13421] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 178.845535][T13416] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 178.854350][ T29] audit: type=1400 audit(1734922292.835:10924): avc: denied { setopt } for pid=13412 comm="syz.2.3288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 178.874400][ T29] audit: type=1326 audit(1734922293.055:10925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13422 comm="syz.2.3292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f788e935d29 code=0x7ffc0000 [ 179.129067][T13435] netlink: 'syz.3.3298': attribute type 12 has an invalid length. [ 179.137022][T13435] netlink: 'syz.3.3298': attribute type 11 has an invalid length. [ 179.299731][T13444] bpf_get_probe_write_proto: 26 callbacks suppressed [ 179.299744][T13444] syz.0.3301[13444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.334484][T13444] syz.0.3301[13444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.357256][T13444] syz.0.3301[13444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.524613][T13460] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 179.573511][T13463] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 179.649079][T13469] cgroup2: Unknown parameter 'dont_hash' [ 179.677537][T13472] FAULT_INJECTION: forcing a failure. [ 179.677537][T13472] name failslab, interval 1, probability 0, space 0, times 0 [ 179.690188][T13472] CPU: 1 UID: 0 PID: 13472 Comm: syz.0.3312 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 179.701071][T13472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 179.711161][T13472] Call Trace: [ 179.714447][T13472] [ 179.717372][T13472] dump_stack_lvl+0xf2/0x150 [ 179.721994][T13472] dump_stack+0x15/0x1a [ 179.726168][T13472] should_fail_ex+0x223/0x230 [ 179.730853][T13472] should_failslab+0x8f/0xb0 [ 179.735450][T13472] kmem_cache_alloc_noprof+0x52/0x320 [ 179.740898][T13472] ? audit_log_start+0x34c/0x6b0 [ 179.745891][T13472] audit_log_start+0x34c/0x6b0 [ 179.750659][T13472] audit_seccomp+0x4b/0x130 [ 179.755227][T13472] __seccomp_filter+0x6fa/0x1180 [ 179.760217][T13472] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 179.765910][T13472] ? vfs_write+0x596/0x920 [ 179.770362][T13472] ? putname+0xcf/0xf0 [ 179.774506][T13472] __secure_computing+0x9f/0x1c0 [ 179.779451][T13472] syscall_trace_enter+0xd1/0x1f0 [ 179.784506][T13472] ? fpregs_assert_state_consistent+0x83/0xa0 [ 179.790581][T13472] do_syscall_64+0xaa/0x1c0 [ 179.795144][T13472] ? clear_bhb_loop+0x55/0xb0 [ 179.799822][T13472] ? clear_bhb_loop+0x55/0xb0 [ 179.804563][T13472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 179.810526][T13472] RIP: 0033:0x7f8b6d355d29 [ 179.814989][T13472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.834696][T13472] RSP: 002b:00007f8b6b9c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 179.843116][T13472] RAX: ffffffffffffffda RBX: 00007f8b6d545fa0 RCX: 00007f8b6d355d29 [ 179.851156][T13472] RDX: 0000000000000000 RSI: 000000002ee91dc2 RDI: 0000000000000004 [ 179.859183][T13472] RBP: 00007f8b6b9c7090 R08: 0000000000000000 R09: 0000000000000000 [ 179.867154][T13472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.875129][T13472] R13: 0000000000000000 R14: 00007f8b6d545fa0 R15: 00007ffca199ac78 [ 179.883200][T13472] [ 179.906563][T13477] syz.0.3314[13477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.906617][T13477] syz.0.3314[13477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.918190][T13477] syz.0.3314[13477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.986045][T13473] team0 (unregistering): Port device team_slave_0 removed [ 180.016911][T13473] team0 (unregistering): Port device team_slave_1 removed [ 180.170189][T13483] wireguard0: entered promiscuous mode [ 180.175812][T13483] wireguard0: entered allmulticast mode [ 180.192977][T13492] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 180.201655][T13492] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 180.243436][T13495] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 180.275729][T13495] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 180.368277][T13501] netem: change failed [ 180.385645][T13504] syz.5.3325[13504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.385706][T13504] syz.5.3325[13504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.397263][T13504] syz.5.3325[13504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.442282][T13508] xt_hashlimit: max too large, truncated to 1048576 [ 180.540227][T13516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=13516 comm=syz.5.3329 [ 180.568118][T13518] loop5: detected capacity change from 0 to 128 [ 180.574669][T13518] EXT4-fs: Ignoring removed nobh option [ 180.581929][T13518] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 180.594180][T13518] ext4 filesystem being mounted at /140/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 180.608309][T13518] Invalid ELF header magic: != ELF [ 180.616473][T13518] syz.5.3330[13518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.671024][T13522] __nla_validate_parse: 11 callbacks suppressed [ 180.671039][T13522] netlink: 256 bytes leftover after parsing attributes in process `syz.5.3330'. [ 180.712055][T11052] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 180.730322][T13526] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3331'. [ 180.739493][T13526] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3331'. [ 180.752438][T13526] loop5: detected capacity change from 0 to 512 [ 180.754072][T13528] bond1: entered promiscuous mode [ 180.759259][T13526] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 180.763751][T13528] bond1: entered allmulticast mode [ 180.779387][T13528] 8021q: adding VLAN 0 to HW filter on device bond1 [ 180.780837][T13526] EXT4-fs (loop5): 1 truncate cleaned up [ 180.792646][T13526] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 180.806531][T13528] bond1 (unregistering): Released all slaves [ 180.848754][T11052] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 180.941606][T13547] SELinux: security policydb version 18 (MLS) not backwards compatible [ 180.950337][T13547] SELinux: failed to load policy [ 180.988893][T13551] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 180.999321][T13551] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 181.021040][T13557] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 181.046155][T13557] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 181.183774][T13564] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3347'. [ 181.410567][T13584] SELinux: security policydb version 18 (MLS) not backwards compatible [ 181.419012][T13584] SELinux: failed to load policy [ 181.445096][T13588] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 181.476200][T13588] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 181.548138][T13592] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 181.556749][T13592] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 181.607808][T13595] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 181.616606][T13595] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 181.625437][T13595] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 181.634229][T13595] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 181.643346][T13595] vxlan0: entered promiscuous mode [ 181.648498][T13595] vxlan0: entered allmulticast mode [ 181.690618][T13603] pim6reg: entered allmulticast mode [ 181.723975][T13607] loop4: detected capacity change from 0 to 128 [ 181.733070][T13607] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 181.746304][T13607] ext4 filesystem being mounted at /117/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 181.784512][T11646] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 181.802569][T13615] SELinux: security policydb version 18 (MLS) not backwards compatible [ 181.810942][T13615] SELinux: failed to load policy [ 181.830938][T13617] FAULT_INJECTION: forcing a failure. [ 181.830938][T13617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.844003][T13617] CPU: 1 UID: 0 PID: 13617 Comm: syz.4.3367 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 181.854838][T13617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 181.864923][T13617] Call Trace: [ 181.868258][T13617] [ 181.871249][T13617] dump_stack_lvl+0xf2/0x150 [ 181.875828][T13617] dump_stack+0x15/0x1a [ 181.879977][T13617] should_fail_ex+0x223/0x230 [ 181.884674][T13617] should_fail+0xb/0x10 [ 181.888886][T13617] should_fail_usercopy+0x1a/0x20 [ 181.893891][T13617] _copy_from_user+0x1e/0xb0 [ 181.898482][T13617] copy_msghdr_from_user+0x54/0x2a0 [ 181.903832][T13617] ? __fget_files+0x17c/0x1c0 [ 181.908523][T13617] __sys_sendmsg+0x13e/0x230 [ 181.913197][T13617] __x64_sys_sendmsg+0x46/0x50 [ 181.917940][T13617] x64_sys_call+0x2734/0x2dc0 [ 181.922605][T13617] do_syscall_64+0xc9/0x1c0 [ 181.927130][T13617] ? clear_bhb_loop+0x55/0xb0 [ 181.931926][T13617] ? clear_bhb_loop+0x55/0xb0 [ 181.936583][T13617] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 181.942485][T13617] RIP: 0033:0x7f7ea41b5d29 [ 181.946880][T13617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 181.966488][T13617] RSP: 002b:00007f7ea2827038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 181.974955][T13617] RAX: ffffffffffffffda RBX: 00007f7ea43a5fa0 RCX: 00007f7ea41b5d29 [ 181.982908][T13617] RDX: 0000000024040810 RSI: 0000000020000240 RDI: 0000000000000003 [ 181.990864][T13617] RBP: 00007f7ea2827090 R08: 0000000000000000 R09: 0000000000000000 [ 181.998865][T13617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.006891][T13617] R13: 0000000000000000 R14: 00007f7ea43a5fa0 R15: 00007ffe51f0acb8 [ 182.014920][T13617] [ 182.041490][T13619] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 182.050024][T13619] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 182.287633][T13625] random: crng reseeded on system resumption [ 182.857066][T13634] netem: change failed [ 182.934049][T13638] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3376'. [ 183.206053][T13660] veth0_to_team: entered promiscuous mode [ 183.211853][T13660] veth0_to_team: entered allmulticast mode [ 183.569466][T13671] loop4: detected capacity change from 0 to 2048 [ 183.898182][T13702] loop4: detected capacity change from 0 to 2048 [ 183.907742][T13704] netlink: 136 bytes leftover after parsing attributes in process `syz.0.3403'. [ 183.930441][ T29] kauditd_printk_skb: 515 callbacks suppressed [ 183.930449][ T29] audit: type=1400 audit(1734922298.145:11439): avc: denied { watch watch_reads } for pid=13707 comm="syz.0.3404" path="/59/file0" dev="tmpfs" ino=326 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 184.031164][T13720] loop4: detected capacity change from 0 to 1024 [ 184.114190][T13732] netlink: 136 bytes leftover after parsing attributes in process `syz.3.3414'. [ 184.136928][ T29] audit: type=1326 audit(1734922298.355:11440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.162361][ T29] audit: type=1326 audit(1734922298.355:11441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.185998][ T29] audit: type=1326 audit(1734922298.355:11442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.209568][ T29] audit: type=1326 audit(1734922298.355:11443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.233239][ T29] audit: type=1326 audit(1734922298.355:11444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.256925][ T29] audit: type=1326 audit(1734922298.355:11445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.280585][ T29] audit: type=1326 audit(1734922298.355:11446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.283280][T13734] Cannot find set identified by id 0 to match [ 184.304281][ T29] audit: type=1326 audit(1734922298.425:11447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.333962][ T29] audit: type=1326 audit(1734922298.425:11448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13733 comm="syz.3.3415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c60e45d29 code=0x7ffc0000 [ 184.377273][T13734] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3415'. [ 184.387680][T13734] netlink: 32 bytes leftover after parsing attributes in process `syz.3.3415'. [ 184.404846][T13742] netlink: 692 bytes leftover after parsing attributes in process `syz.2.3418'. [ 184.447722][T13748] SELinux: security policydb version 18 (MLS) not backwards compatible [ 184.456154][T13748] SELinux: failed to load policy [ 184.483511][T13751] bpf_get_probe_write_proto: 2 callbacks suppressed [ 184.483584][T13751] syz.5.3422[13751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.495970][T13751] syz.5.3422[13751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.507753][T13751] syz.5.3422[13751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.569694][T13756] SELinux: security policydb version 18 (MLS) not backwards compatible [ 184.590912][T13756] SELinux: failed to load policy [ 184.746870][T13785] netem: change failed [ 184.866441][T13802] Process accounting resumed [ 184.900818][T13809] syz.0.3447[13809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.900863][T13809] syz.0.3447[13809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.919262][T13809] syz.0.3447[13809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.931613][T13806] netem: change failed [ 185.033434][T13819] xt_hashlimit: max too large, truncated to 1048576 [ 185.176608][T13827] netlink: 'syz.0.3455': attribute type 27 has an invalid length. [ 185.214151][T13827] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.221362][T13827] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.262163][T13827] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 185.273611][T13827] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 185.306057][T13827] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.315111][T13827] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.323977][T13827] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.332962][T13827] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.349576][T13827] netdevsim netdevsim0 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 185.358574][T13827] netdevsim netdevsim0 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 185.367463][T13827] netdevsim netdevsim0 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 185.376525][T13827] netdevsim netdevsim0 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 185.391159][T13827] vxlan0: left promiscuous mode [ 185.396099][T13827] vxlan0: left allmulticast mode [ 185.425421][T13842] netem: change failed [ 185.453166][T13836] SELinux: Context Ü is not valid (left unmapped). [ 185.876820][T13854] loop5: detected capacity change from 0 to 2048 [ 185.917537][T13858] SELinux: security policydb version 18 (MLS) not backwards compatible [ 185.925883][T13858] SELinux: failed to load policy [ 186.128023][T13864] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 186.137281][T13864] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 186.483598][ T3380] IPVS: starting estimator thread 0... [ 186.525106][T13889] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 186.576544][T13890] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 186.584402][T13887] IPVS: using max 2928 ests per chain, 146400 per kthread [ 186.705211][T13910] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 186.714471][T13910] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 186.723921][T13904] __nla_validate_parse: 2 callbacks suppressed [ 186.723934][T13904] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3488'. [ 186.772118][T13915] netlink: 156 bytes leftover after parsing attributes in process `syz.2.3493'. [ 186.810758][T13921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13921 comm=syz.2.3496 [ 186.826788][T13923] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 186.856444][T13923] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 187.046601][T13947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13947 comm=syz.5.3508 [ 187.121032][T13956] syz.4.3512[13956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.121164][T13956] syz.4.3512[13956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.140666][T13956] syz.4.3512[13956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.190273][T13959] can0: slcan on ttyS3. [ 187.209460][T13962] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 187.233179][T13964] loop5: detected capacity change from 0 to 512 [ 187.240995][T13962] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 187.252802][T13968] SELinux: security policydb version 18 (MLS) not backwards compatible [ 187.262666][T13964] EXT4-fs error (device loop5): ext4_xattr_ibody_find:2240: inode #15: comm syz.5.3516: corrupted in-inode xattr: invalid ea_ino [ 187.294460][T13959] can0 (unregistered): slcan off ttyS3. [ 187.310641][T13968] SELinux: failed to load policy [ 187.318728][T13964] EXT4-fs error (device loop5): ext4_orphan_get:1394: comm syz.5.3516: couldn't read orphan inode 15 (err -117) [ 187.394834][T13992] loop4: detected capacity change from 0 to 2048 [ 187.547797][T14023] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 187.560739][T14023] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 187.698211][T14054] SELinux: security policydb version 18 (MLS) not backwards compatible [ 187.707564][T14054] SELinux: failed to load policy [ 187.855698][T14080] loop5: detected capacity change from 0 to 2048 [ 187.911127][T14085] netem: change failed [ 188.132998][T14108] netlink: 136 bytes leftover after parsing attributes in process `syz.0.3552'. [ 188.329127][T14120] loop4: detected capacity change from 0 to 2048 [ 188.345494][T14120] EXT4-fs mount: 14 callbacks suppressed [ 188.345507][T14120] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 188.371367][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 188.527167][T14140] netlink: 136 bytes leftover after parsing attributes in process `syz.3.3565'. [ 188.569372][T14146] syz.3.3568[14146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.752934][T14173] netem: change failed [ 188.807804][T14182] SELinux: security policydb version 18 (MLS) not backwards compatible [ 188.817031][T14182] SELinux: failed to load policy [ 188.995296][T14203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14203 comm=syz.3.3595 [ 189.009088][ T29] kauditd_printk_skb: 576 callbacks suppressed [ 189.009109][ T29] audit: type=1326 audit(1734922303.225:12025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.038973][ T29] audit: type=1326 audit(1734922303.225:12026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.062637][ T29] audit: type=1326 audit(1734922303.225:12027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.089061][ T29] audit: type=1326 audit(1734922303.225:12028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.112715][ T29] audit: type=1326 audit(1734922303.225:12029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.136386][ T29] audit: type=1326 audit(1734922303.225:12030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.159997][ T29] audit: type=1326 audit(1734922303.225:12031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.183555][ T29] audit: type=1326 audit(1734922303.225:12032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.207126][ T29] audit: type=1326 audit(1734922303.225:12033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.230703][ T29] audit: type=1326 audit(1734922303.225:12034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14204 comm="syz.0.3596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8b6d355d29 code=0x7ffc0000 [ 189.320566][T14226] netem: change failed [ 189.381291][T14240] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 189.426427][T14240] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 189.748736][T14255] cgroup2: Unknown parameter 'dont_hash' [ 189.775098][T14257] loop5: detected capacity change from 0 to 1024 [ 189.785142][T14257] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 189.807200][T14257] EXT4-fs (loop5): revision level too high, forcing read-only mode [ 189.829016][T14257] EXT4-fs (loop5): too many log groups per flexible block group [ 189.836711][T14257] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 189.851531][T14257] EXT4-fs (loop5): mount failed [ 189.974473][T14268] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3623'. [ 189.983525][T14268] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 189.991078][T14268] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 189.998561][T14268] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 190.006039][T14268] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 190.211767][T14281] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3629'. [ 190.220664][T14281] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3629'. [ 190.229536][T14281] netlink: 'syz.2.3629': attribute type 12 has an invalid length. [ 190.237399][T14281] netlink: 'syz.2.3629': attribute type 11 has an invalid length. [ 190.247663][T14281] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3629'. [ 190.256628][T14281] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3629'. [ 190.265582][T14281] netlink: 2 bytes leftover after parsing attributes in process `syz.2.3629'. [ 190.414035][T14295] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 190.451975][T14299] SELinux: security policydb version 18 (MLS) not backwards compatible [ 190.460399][T14299] SELinux: failed to load policy [ 190.468332][T14295] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 190.633774][T14315] SELinux: security policydb version 18 (MLS) not backwards compatible [ 190.642285][T14315] SELinux: failed to load policy [ 190.892371][T14335] loop4: detected capacity change from 0 to 2048 [ 190.935745][T14335] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 190.957274][T11646] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 190.978411][T14341] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 191.006431][T14341] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 191.144062][T14352] pim6reg1: entered promiscuous mode [ 191.149440][T14352] pim6reg1: entered allmulticast mode [ 191.288952][T14364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14364 comm=syz.0.3661 [ 191.467486][T14378] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 191.556049][T14386] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 191.863590][T14411] netem: change failed [ 191.929845][T14419] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 191.955986][T14419] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 191.991105][T14425] __nla_validate_parse: 1 callbacks suppressed [ 191.991130][T14425] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3685'. [ 192.006463][T14425] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3685'. [ 192.015324][T14425] netlink: 2 bytes leftover after parsing attributes in process `syz.3.3685'. [ 192.121675][T14437] loop5: detected capacity change from 0 to 8192 [ 192.173650][T14440] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 192.255754][T14449] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3694'. [ 192.364596][T14454] netlink: 136 bytes leftover after parsing attributes in process `syz.5.3696'. [ 192.406545][T14456] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 192.437722][T14456] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 192.723474][T14499] relay: one or more items not logged [item size (56) > sub-buffer size (10)] [ 192.749652][T14502] SELinux: security policydb version 18 (MLS) not backwards compatible [ 192.758222][T14502] SELinux: failed to load policy [ 192.784608][T14499] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 192.929791][T14511] netem: change failed [ 193.057933][T14524] netlink: 'syz.4.3726': attribute type 15 has an invalid length. [ 193.118001][T14526] SELinux: security policydb version 18 (MLS) not backwards compatible [ 193.127557][T14526] SELinux: failed to load policy [ 193.480960][T14538] xt_hashlimit: size too large, truncated to 1048576 [ 193.574760][T14539] 9pnet_fd: Insufficient options for proto=fd [ 193.698426][T14545] netlink: 136 bytes leftover after parsing attributes in process `syz.0.3736'. [ 193.782700][T14551] SELinux: security policydb version 18 (MLS) not backwards compatible [ 193.819118][T14551] SELinux: failed to load policy [ 193.954984][ C1] ================================================================== [ 193.963094][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 193.969803][ C1] [ 193.972119][ C1] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 0: [ 193.980192][ C1] can_receive+0x4e/0x1f0 [ 193.984544][ C1] can_rcv+0xe7/0x180 [ 193.988543][ C1] __netif_receive_skb+0x123/0x280 [ 193.993662][ C1] process_backlog+0x22e/0x440 [ 193.998433][ C1] __napi_poll+0x63/0x3c0 [ 194.002767][ C1] net_rx_action+0x3a1/0x7f0 [ 194.007363][ C1] handle_softirqs+0xbf/0x280 [ 194.012056][ C1] do_softirq+0x5e/0x90 [ 194.016226][ C1] __local_bh_enable_ip+0x6e/0x70 [ 194.021265][ C1] netif_rx+0x83/0x240 [ 194.025333][ C1] can_send+0x586/0x6d0 [ 194.029504][ C1] isotp_sendmsg+0x9ab/0xc00 [ 194.034102][ C1] __sock_sendmsg+0x140/0x180 [ 194.038786][ C1] __sys_sendto+0x1a8/0x230 [ 194.043291][ C1] __x64_sys_sendto+0x78/0x90 [ 194.047978][ C1] x64_sys_call+0x29fa/0x2dc0 [ 194.052662][ C1] do_syscall_64+0xc9/0x1c0 [ 194.057164][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.063075][ C1] [ 194.065395][ C1] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 1: [ 194.073462][ C1] can_receive+0x4e/0x1f0 [ 194.077806][ C1] can_rcv+0xe7/0x180 [ 194.081807][ C1] __netif_receive_skb+0x123/0x280 [ 194.086928][ C1] process_backlog+0x22e/0x440 [ 194.091701][ C1] __napi_poll+0x63/0x3c0 [ 194.096031][ C1] net_rx_action+0x3a1/0x7f0 [ 194.100629][ C1] handle_softirqs+0xbf/0x280 [ 194.105317][ C1] run_ksoftirqd+0x1c/0x30 [ 194.109735][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 194.114682][ C1] kthread+0x1d1/0x210 [ 194.118751][ C1] ret_from_fork+0x4b/0x60 [ 194.123163][ C1] ret_from_fork_asm+0x1a/0x30 [ 194.127926][ C1] [ 194.130241][ C1] value changed: 0x0000000000017812 -> 0x0000000000017813 [ 194.137342][ C1] [ 194.139660][ C1] Reported by Kernel Concurrency Sanitizer on: [ 194.145802][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 194.156400][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 194.166453][ C1] ================================================================== [ 194.175093][ C1] ================================================================== [ 194.183182][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 194.189891][ C1] [ 194.192206][ C1] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 0: [ 194.200255][ C1] can_receive+0x1ca/0x1f0 [ 194.204674][ C1] can_rcv+0xe7/0x180 [ 194.208663][ C1] __netif_receive_skb+0x123/0x280 [ 194.213766][ C1] process_backlog+0x22e/0x440 [ 194.218522][ C1] __napi_poll+0x63/0x3c0 [ 194.222839][ C1] net_rx_action+0x3a1/0x7f0 [ 194.227423][ C1] handle_softirqs+0xbf/0x280 [ 194.232100][ C1] do_softirq+0x5e/0x90 [ 194.236252][ C1] __local_bh_enable_ip+0x6e/0x70 [ 194.241272][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 194.246204][ C1] nsim_dev_trap_report_work+0x522/0x620 [ 194.251837][ C1] process_scheduled_works+0x483/0x9a0 [ 194.257290][ C1] worker_thread+0x51d/0x6f0 [ 194.261876][ C1] kthread+0x1d1/0x210 [ 194.265933][ C1] ret_from_fork+0x4b/0x60 [ 194.270334][ C1] ret_from_fork_asm+0x1a/0x30 [ 194.275087][ C1] [ 194.277394][ C1] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 1: [ 194.285447][ C1] can_receive+0x1ca/0x1f0 [ 194.289859][ C1] can_rcv+0xe7/0x180 [ 194.293852][ C1] __netif_receive_skb+0x123/0x280 [ 194.298955][ C1] process_backlog+0x22e/0x440 [ 194.303709][ C1] __napi_poll+0x63/0x3c0 [ 194.308026][ C1] net_rx_action+0x3a1/0x7f0 [ 194.312609][ C1] handle_softirqs+0xbf/0x280 [ 194.317285][ C1] run_ksoftirqd+0x1c/0x30 [ 194.321688][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 194.326622][ C1] kthread+0x1d1/0x210 [ 194.330675][ C1] ret_from_fork+0x4b/0x60 [ 194.335078][ C1] ret_from_fork_asm+0x1a/0x30 [ 194.339831][ C1] [ 194.342137][ C1] value changed: 0x000000000000faef -> 0x000000000000faf1 [ 194.349228][ C1] [ 194.351537][ C1] Reported by Kernel Concurrency Sanitizer on: [ 194.357669][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 194.368244][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 194.378287][ C1] ================================================================== [ 194.390700][ C1] ================================================================== [ 194.398790][ C1] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 194.406022][ C1] [ 194.408343][ C1] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 0: [ 194.416403][ C1] can_rcv_filter+0x237/0x4c0 [ 194.421079][ C1] can_receive+0x182/0x1f0 [ 194.425494][ C1] can_rcv+0xe7/0x180 [ 194.429472][ C1] __netif_receive_skb+0x123/0x280 [ 194.434578][ C1] process_backlog+0x22e/0x440 [ 194.439343][ C1] __napi_poll+0x63/0x3c0 [ 194.443666][ C1] net_rx_action+0x3a1/0x7f0 [ 194.448248][ C1] handle_softirqs+0xbf/0x280 [ 194.452920][ C1] run_ksoftirqd+0x1c/0x30 [ 194.457323][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 194.462257][ C1] kthread+0x1d1/0x210 [ 194.466311][ C1] ret_from_fork+0x4b/0x60 [ 194.470714][ C1] ret_from_fork_asm+0x1a/0x30 [ 194.475467][ C1] [ 194.477774][ C1] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 1: [ 194.485826][ C1] can_rcv_filter+0x237/0x4c0 [ 194.490499][ C1] can_receive+0x182/0x1f0 [ 194.494915][ C1] can_rcv+0xe7/0x180 [ 194.498906][ C1] __netif_receive_skb+0x123/0x280 [ 194.504011][ C1] process_backlog+0x22e/0x440 [ 194.508766][ C1] __napi_poll+0x63/0x3c0 [ 194.513088][ C1] net_rx_action+0x3a1/0x7f0 [ 194.517672][ C1] handle_softirqs+0xbf/0x280 [ 194.522344][ C1] run_ksoftirqd+0x1c/0x30 [ 194.526750][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 194.531686][ C1] kthread+0x1d1/0x210 [ 194.535744][ C1] ret_from_fork+0x4b/0x60 [ 194.540148][ C1] ret_from_fork_asm+0x1a/0x30 [ 194.544907][ C1] [ 194.547221][ C1] value changed: 0x000000000001d629 -> 0x000000000001d62a [ 194.554309][ C1] [ 194.556619][ C1] Reported by Kernel Concurrency Sanitizer on: [ 194.562748][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 194.573336][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 194.583378][ C1] ================================================================== [ 194.597754][ C1] ================================================================== [ 194.605847][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 194.612549][ C1] [ 194.614869][ C1] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 0: [ 194.622931][ C1] can_receive+0x62/0x1f0 [ 194.627274][ C1] can_rcv+0xe7/0x180 [ 194.631269][ C1] __netif_receive_skb+0x123/0x280 [ 194.636399][ C1] process_backlog+0x22e/0x440 [ 194.641172][ C1] __napi_poll+0x63/0x3c0 [ 194.645511][ C1] net_rx_action+0x3a1/0x7f0 [ 194.650105][ C1] handle_softirqs+0xbf/0x280 [ 194.654799][ C1] do_softirq+0x5e/0x90 [ 194.658973][ C1] __local_bh_enable_ip+0x6e/0x70 [ 194.664019][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 194.668968][ C1] nsim_dev_trap_report_work+0x522/0x620 [ 194.674615][ C1] process_scheduled_works+0x483/0x9a0 [ 194.680084][ C1] worker_thread+0x51d/0x6f0 [ 194.684689][ C1] kthread+0x1d1/0x210 [ 194.688759][ C1] ret_from_fork+0x4b/0x60 [ 194.693182][ C1] ret_from_fork_asm+0x1a/0x30 [ 194.697952][ C1] [ 194.700267][ C1] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 1: [ 194.708329][ C1] can_receive+0x62/0x1f0 [ 194.712670][ C1] can_rcv+0xe7/0x180 [ 194.716664][ C1] __netif_receive_skb+0x123/0x280 [ 194.721786][ C1] process_backlog+0x22e/0x440 [ 194.726556][ C1] __napi_poll+0x63/0x3c0 [ 194.730889][ C1] net_rx_action+0x3a1/0x7f0 [ 194.735487][ C1] handle_softirqs+0xbf/0x280 [ 194.740177][ C1] run_ksoftirqd+0x1c/0x30 [ 194.744596][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 194.749549][ C1] kthread+0x1d1/0x210 [ 194.753623][ C1] ret_from_fork+0x4b/0x60 [ 194.758044][ C1] ret_from_fork_asm+0x1a/0x30 [ 194.762816][ C1] [ 194.765132][ C1] value changed: 0x00000000000003a5 -> 0x00000000000003a6 [ 194.772233][ C1] [ 194.774548][ C1] Reported by Kernel Concurrency Sanitizer on: [ 194.780692][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 194.791283][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 194.801338][ C1] ================================================================== [ 194.815518][ C0] ================================================================== [ 194.823605][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 194.830819][ C0] [ 194.833132][ C0] read-write to 0xffff8881048b4020 of 4 bytes by interrupt on cpu 1: [ 194.841202][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 194.845890][ C0] can_rcv_filter+0x225/0x4c0 [ 194.850582][ C0] can_receive+0x182/0x1f0 [ 194.855013][ C0] can_rcv+0xe7/0x180 [ 194.859012][ C0] __netif_receive_skb+0x123/0x280 [ 194.864130][ C0] process_backlog+0x22e/0x440 [ 194.868903][ C0] __napi_poll+0x63/0x3c0 [ 194.873233][ C0] net_rx_action+0x3a1/0x7f0 [ 194.877826][ C0] handle_softirqs+0xbf/0x280 [ 194.882517][ C0] run_ksoftirqd+0x1c/0x30 [ 194.886937][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 194.891889][ C0] kthread+0x1d1/0x210 [ 194.895956][ C0] ret_from_fork+0x4b/0x60 [ 194.900375][ C0] ret_from_fork_asm+0x1a/0x30 [ 194.905142][ C0] [ 194.907456][ C0] read-write to 0xffff8881048b4020 of 4 bytes by interrupt on cpu 0: [ 194.915519][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 194.920201][ C0] can_rcv_filter+0x225/0x4c0 [ 194.924888][ C0] can_receive+0x182/0x1f0 [ 194.929321][ C0] can_rcv+0xe7/0x180 [ 194.933312][ C0] __netif_receive_skb+0x123/0x280 [ 194.938430][ C0] process_backlog+0x22e/0x440 [ 194.943198][ C0] __napi_poll+0x63/0x3c0 [ 194.947530][ C0] net_rx_action+0x3a1/0x7f0 [ 194.952126][ C0] handle_softirqs+0xbf/0x280 [ 194.956812][ C0] do_softirq+0x5e/0x90 [ 194.960981][ C0] __local_bh_enable_ip+0x6e/0x70 [ 194.966025][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 194.970967][ C0] release_sock+0x117/0x150 [ 194.975484][ C0] sockopt_release_sock+0x42/0x50 [ 194.980510][ C0] do_ip_getsockopt+0xcb4/0x11a0 [ 194.985459][ C0] ip_getsockopt+0x5c/0x170 [ 194.989973][ C0] tcp_getsockopt+0xaa/0xe0 [ 194.994494][ C0] sock_common_getsockopt+0x5b/0x70 [ 194.999700][ C0] do_sock_getsockopt+0x1ca/0x260 [ 195.004734][ C0] __x64_sys_getsockopt+0x18c/0x200 [ 195.009940][ C0] x64_sys_call+0x1288/0x2dc0 [ 195.014627][ C0] do_syscall_64+0xc9/0x1c0 [ 195.019133][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 195.025042][ C0] [ 195.027360][ C0] value changed: 0x00022ff8 -> 0x00022ffa [ 195.033070][ C0] [ 195.035387][ C0] Reported by Kernel Concurrency Sanitizer on: [ 195.041529][ C0] CPU: 0 UID: 0 PID: 12147 Comm: syz-executor Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 195.052466][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 195.062522][ C0] ================================================================== [ 195.083035][ C1] ================================================================== [ 195.091133][ C1] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 195.098360][ C1] [ 195.100679][ C1] read-write to 0xffff8881012bbce8 of 8 bytes by interrupt on cpu 0: [ 195.108749][ C1] can_rcv_filter+0x3a9/0x4c0 [ 195.113441][ C1] can_receive+0x182/0x1f0 [ 195.117869][ C1] can_rcv+0xe7/0x180 [ 195.121865][ C1] __netif_receive_skb+0x123/0x280 [ 195.126981][ C1] process_backlog+0x22e/0x440 [ 195.131759][ C1] __napi_poll+0x63/0x3c0 [ 195.136094][ C1] net_rx_action+0x3a1/0x7f0 [ 195.140692][ C1] handle_softirqs+0xbf/0x280 [ 195.145385][ C1] do_softirq+0x5e/0x90 [ 195.149556][ C1] __local_bh_enable_ip+0x6e/0x70 [ 195.154596][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 195.159534][ C1] lock_sock_nested+0x10f/0x140 [ 195.164391][ C1] tipc_release+0x4d/0xa70 [ 195.168812][ C1] sock_close+0x68/0x150 [ 195.173064][ C1] __fput+0x17a/0x6d0 [ 195.177047][ C1] ____fput+0x1c/0x30 [ 195.181029][ C1] task_work_run+0x13a/0x1a0 [ 195.185619][ C1] syscall_exit_to_user_mode+0xa8/0x120 [ 195.191173][ C1] do_syscall_64+0xd6/0x1c0 [ 195.195690][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 195.201606][ C1] [ 195.203922][ C1] read-write to 0xffff8881012bbce8 of 8 bytes by interrupt on cpu 1: [ 195.211979][ C1] can_rcv_filter+0x3a9/0x4c0 [ 195.216671][ C1] can_receive+0x182/0x1f0 [ 195.221109][ C1] can_rcv+0xe7/0x180 [ 195.225101][ C1] __netif_receive_skb+0x123/0x280 [ 195.230220][ C1] process_backlog+0x22e/0x440 [ 195.234995][ C1] __napi_poll+0x63/0x3c0 [ 195.239328][ C1] net_rx_action+0x3a1/0x7f0 [ 195.243931][ C1] handle_softirqs+0xbf/0x280 [ 195.248617][ C1] run_ksoftirqd+0x1c/0x30 [ 195.253032][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 195.257989][ C1] kthread+0x1d1/0x210 [ 195.262069][ C1] ret_from_fork+0x4b/0x60 [ 195.266492][ C1] ret_from_fork_asm+0x1a/0x30 [ 195.271259][ C1] [ 195.273575][ C1] value changed: 0x000000000002992a -> 0x000000000002992c [ 195.280675][ C1] [ 195.282990][ C1] Reported by Kernel Concurrency Sanitizer on: [ 195.289133][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 195.299727][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 195.309789][ C1] ================================================================== [ 195.355817][ C1] ================================================================== [ 195.363914][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 195.370614][ C1] [ 195.372928][ C1] read-write to 0xffff888104eabe18 of 8 bytes by interrupt on cpu 0: [ 195.380991][ C1] can_receive+0x1b6/0x1f0 [ 195.385419][ C1] can_rcv+0xe7/0x180 [ 195.389413][ C1] __netif_receive_skb+0x123/0x280 [ 195.394531][ C1] process_backlog+0x22e/0x440 [ 195.399301][ C1] __napi_poll+0x63/0x3c0 [ 195.403654][ C1] net_rx_action+0x3a1/0x7f0 [ 195.408253][ C1] handle_softirqs+0xbf/0x280 [ 195.412945][ C1] do_softirq+0x5e/0x90 [ 195.417115][ C1] __local_bh_enable_ip+0x6e/0x70 [ 195.422157][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 195.427103][ C1] htable_selective_cleanup+0x179/0x1d0 [ 195.432667][ C1] htable_gc+0x1a/0x60 [ 195.436751][ C1] process_scheduled_works+0x483/0x9a0 [ 195.442226][ C1] worker_thread+0x51d/0x6f0 [ 195.446831][ C1] kthread+0x1d1/0x210 [ 195.450898][ C1] ret_from_fork+0x4b/0x60 [ 195.455314][ C1] ret_from_fork_asm+0x1a/0x30 [ 195.460080][ C1] [ 195.462398][ C1] read-write to 0xffff888104eabe18 of 8 bytes by interrupt on cpu 1: [ 195.470458][ C1] can_receive+0x1b6/0x1f0 [ 195.474890][ C1] can_rcv+0xe7/0x180 [ 195.478884][ C1] __netif_receive_skb+0x123/0x280 [ 195.484000][ C1] process_backlog+0x22e/0x440 [ 195.488772][ C1] __napi_poll+0x63/0x3c0 [ 195.493105][ C1] net_rx_action+0x3a1/0x7f0 [ 195.497703][ C1] handle_softirqs+0xbf/0x280 [ 195.502394][ C1] run_ksoftirqd+0x1c/0x30 [ 195.506815][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 195.511767][ C1] kthread+0x1d1/0x210 [ 195.515838][ C1] ret_from_fork+0x4b/0x60 [ 195.520255][ C1] ret_from_fork_asm+0x1a/0x30 [ 195.525021][ C1] [ 195.527334][ C1] value changed: 0x0000000000030932 -> 0x0000000000030934 [ 195.534438][ C1] [ 195.536753][ C1] Reported by Kernel Concurrency Sanitizer on: [ 195.542897][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 195.553491][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 195.563548][ C1] ================================================================== [ 196.970251][ C1] ================================================================== [ 196.978361][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 196.985064][ C1] [ 196.987376][ C1] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 0: [ 196.995790][ C1] can_receive+0x4e/0x1f0 [ 197.000135][ C1] can_rcv+0xe7/0x180 [ 197.004132][ C1] __netif_receive_skb+0x123/0x280 [ 197.009252][ C1] process_backlog+0x22e/0x440 [ 197.014025][ C1] __napi_poll+0x63/0x3c0 [ 197.018356][ C1] net_rx_action+0x3a1/0x7f0 [ 197.022955][ C1] handle_softirqs+0xbf/0x280 [ 197.027651][ C1] do_softirq+0x5e/0x90 [ 197.031817][ C1] __local_bh_enable_ip+0x6e/0x70 [ 197.036864][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 197.041807][ C1] htable_selective_cleanup+0x179/0x1d0 [ 197.047370][ C1] htable_gc+0x1a/0x60 [ 197.051448][ C1] process_scheduled_works+0x483/0x9a0 [ 197.056921][ C1] worker_thread+0x51d/0x6f0 [ 197.061524][ C1] kthread+0x1d1/0x210 [ 197.065593][ C1] ret_from_fork+0x4b/0x60 [ 197.070017][ C1] ret_from_fork_asm+0x1a/0x30 [ 197.074786][ C1] [ 197.077101][ C1] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 1: [ 197.085161][ C1] can_receive+0x4e/0x1f0 [ 197.089505][ C1] can_rcv+0xe7/0x180 [ 197.093497][ C1] __netif_receive_skb+0x123/0x280 [ 197.098612][ C1] process_backlog+0x22e/0x440 [ 197.103382][ C1] __napi_poll+0x63/0x3c0 [ 197.107716][ C1] net_rx_action+0x3a1/0x7f0 [ 197.112318][ C1] handle_softirqs+0xbf/0x280 [ 197.117007][ C1] run_ksoftirqd+0x1c/0x30 [ 197.121429][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 197.126374][ C1] kthread+0x1d1/0x210 [ 197.130440][ C1] ret_from_fork+0x4b/0x60 [ 197.134857][ C1] ret_from_fork_asm+0x1a/0x30 [ 197.139626][ C1] [ 197.141941][ C1] value changed: 0x000000000006ae39 -> 0x000000000006ae3a [ 197.149047][ C1] [ 197.151361][ C1] Reported by Kernel Concurrency Sanitizer on: [ 197.157498][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 197.168093][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 197.178151][ C1] ================================================================== [ 197.189394][ C0] ================================================================== [ 197.197478][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 197.204182][ C0] [ 197.206498][ C0] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 1: [ 197.214566][ C0] can_receive+0x1ca/0x1f0 [ 197.218998][ C0] can_rcv+0xe7/0x180 [ 197.222993][ C0] __netif_receive_skb+0x123/0x280 [ 197.228109][ C0] process_backlog+0x22e/0x440 [ 197.232886][ C0] __napi_poll+0x63/0x3c0 [ 197.237222][ C0] net_rx_action+0x3a1/0x7f0 [ 197.241820][ C0] handle_softirqs+0xbf/0x280 [ 197.246516][ C0] run_ksoftirqd+0x1c/0x30 [ 197.250935][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 197.255889][ C0] kthread+0x1d1/0x210 [ 197.259957][ C0] ret_from_fork+0x4b/0x60 [ 197.264377][ C0] ret_from_fork_asm+0x1a/0x30 [ 197.269147][ C0] [ 197.271465][ C0] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 0: [ 197.279525][ C0] can_receive+0x1ca/0x1f0 [ 197.283952][ C0] can_rcv+0xe7/0x180 [ 197.287947][ C0] __netif_receive_skb+0x123/0x280 [ 197.293061][ C0] process_backlog+0x22e/0x440 [ 197.297836][ C0] __napi_poll+0x63/0x3c0 [ 197.302173][ C0] net_rx_action+0x3a1/0x7f0 [ 197.306772][ C0] handle_softirqs+0xbf/0x280 [ 197.311468][ C0] run_ksoftirqd+0x1c/0x30 [ 197.315889][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 197.320849][ C0] kthread+0x1d1/0x210 [ 197.324919][ C0] ret_from_fork+0x4b/0x60 [ 197.329336][ C0] ret_from_fork_asm+0x1a/0x30 [ 197.334101][ C0] [ 197.336417][ C0] value changed: 0x000000000001736e -> 0x0000000000017370 [ 197.343522][ C0] [ 197.345844][ C0] Reported by Kernel Concurrency Sanitizer on: [ 197.351984][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 197.362581][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 197.372636][ C0] ================================================================== [ 197.427930][ C0] ================================================================== [ 197.436030][ C0] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 197.443260][ C0] [ 197.445577][ C0] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 1: [ 197.453636][ C0] can_rcv_filter+0x237/0x4c0 [ 197.458323][ C0] can_receive+0x182/0x1f0 [ 197.462751][ C0] can_rcv+0xe7/0x180 [ 197.466746][ C0] __netif_receive_skb+0x123/0x280 [ 197.471864][ C0] process_backlog+0x22e/0x440 [ 197.476634][ C0] __napi_poll+0x63/0x3c0 [ 197.480968][ C0] net_rx_action+0x3a1/0x7f0 [ 197.485571][ C0] handle_softirqs+0xbf/0x280 [ 197.490262][ C0] run_ksoftirqd+0x1c/0x30 [ 197.494676][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 197.499637][ C0] kthread+0x1d1/0x210 [ 197.503708][ C0] ret_from_fork+0x4b/0x60 [ 197.508124][ C0] ret_from_fork_asm+0x1a/0x30 [ 197.512895][ C0] [ 197.515213][ C0] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 0: [ 197.523283][ C0] can_rcv_filter+0x237/0x4c0 [ 197.527979][ C0] can_receive+0x182/0x1f0 [ 197.532406][ C0] can_rcv+0xe7/0x180 [ 197.536401][ C0] __netif_receive_skb+0x123/0x280 [ 197.541519][ C0] process_backlog+0x22e/0x440 [ 197.546293][ C0] __napi_poll+0x63/0x3c0 [ 197.550632][ C0] net_rx_action+0x3a1/0x7f0 [ 197.555226][ C0] handle_softirqs+0xbf/0x280 [ 197.559915][ C0] do_softirq+0x5e/0x90 [ 197.564081][ C0] __local_bh_enable_ip+0x6e/0x70 [ 197.569123][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 197.574066][ C0] htable_selective_cleanup+0x179/0x1d0 [ 197.579628][ C0] htable_gc+0x1a/0x60 [ 197.583702][ C0] process_scheduled_works+0x483/0x9a0 [ 197.589174][ C0] worker_thread+0x51d/0x6f0 [ 197.593774][ C0] kthread+0x1d1/0x210 [ 197.597846][ C0] ret_from_fork+0x4b/0x60 [ 197.602263][ C0] ret_from_fork_asm+0x1a/0x30 [ 197.607025][ C0] [ 197.609340][ C0] value changed: 0x000000000007b383 -> 0x000000000007b384 [ 197.616446][ C0] [ 197.618763][ C0] Reported by Kernel Concurrency Sanitizer on: [ 197.624904][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 197.635408][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 197.645470][ C0] Workqueue: events_power_efficient htable_gc [ 197.651551][ C0] ================================================================== [ 197.664054][ C0] ================================================================== [ 197.672143][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 197.678840][ C0] [ 197.681151][ C0] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 1: [ 197.689213][ C0] can_receive+0x62/0x1f0 [ 197.693559][ C0] can_rcv+0xe7/0x180 [ 197.697552][ C0] __netif_receive_skb+0x123/0x280 [ 197.702676][ C0] process_backlog+0x22e/0x440 [ 197.707451][ C0] __napi_poll+0x63/0x3c0 [ 197.711785][ C0] net_rx_action+0x3a1/0x7f0 [ 197.716383][ C0] handle_softirqs+0xbf/0x280 [ 197.721071][ C0] run_ksoftirqd+0x1c/0x30 [ 197.725485][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 197.730436][ C0] kthread+0x1d1/0x210 [ 197.734508][ C0] ret_from_fork+0x4b/0x60 [ 197.738940][ C0] ret_from_fork_asm+0x1a/0x30 [ 197.743707][ C0] [ 197.746023][ C0] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 0: [ 197.754088][ C0] can_receive+0x62/0x1f0 [ 197.758430][ C0] can_rcv+0xe7/0x180 [ 197.762422][ C0] __netif_receive_skb+0x123/0x280 [ 197.767540][ C0] process_backlog+0x22e/0x440 [ 197.772319][ C0] __napi_poll+0x63/0x3c0 [ 197.776651][ C0] net_rx_action+0x3a1/0x7f0 [ 197.781247][ C0] handle_softirqs+0xbf/0x280 [ 197.785936][ C0] do_softirq+0x5e/0x90 [ 197.790106][ C0] __local_bh_enable_ip+0x6e/0x70 [ 197.795147][ C0] update_defense_level+0x575/0x5b0 [ 197.800356][ C0] defense_work_handler+0x1f/0x80 [ 197.805386][ C0] process_scheduled_works+0x483/0x9a0 [ 197.810860][ C0] worker_thread+0x51d/0x6f0 [ 197.815463][ C0] kthread+0x1d1/0x210 [ 197.819532][ C0] ret_from_fork+0x4b/0x60 [ 197.823959][ C0] ret_from_fork_asm+0x1a/0x30 [ 197.828731][ C0] [ 197.831045][ C0] value changed: 0x0000000000003381 -> 0x0000000000003382 [ 197.838143][ C0] [ 197.840465][ C0] Reported by Kernel Concurrency Sanitizer on: [ 197.846605][ C0] CPU: 0 UID: 0 PID: 1098 Comm: kworker/0:2 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 197.857365][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 197.867418][ C0] Workqueue: events_long defense_work_handler [ 197.873494][ C0] ================================================================== [ 197.891013][ C0] ================================================================== [ 197.899094][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 197.906302][ C0] [ 197.908618][ C0] read-write to 0xffff8881048b4020 of 4 bytes by interrupt on cpu 1: [ 197.916679][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 197.921364][ C0] can_rcv_filter+0x225/0x4c0 [ 197.926053][ C0] can_receive+0x182/0x1f0 [ 197.930479][ C0] can_rcv+0xe7/0x180 [ 197.934472][ C0] __netif_receive_skb+0x123/0x280 [ 197.939590][ C0] process_backlog+0x22e/0x440 [ 197.944357][ C0] __napi_poll+0x63/0x3c0 [ 197.948688][ C0] net_rx_action+0x3a1/0x7f0 [ 197.953281][ C0] handle_softirqs+0xbf/0x280 [ 197.957968][ C0] run_ksoftirqd+0x1c/0x30 [ 197.962379][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 197.967332][ C0] kthread+0x1d1/0x210 [ 197.971397][ C0] ret_from_fork+0x4b/0x60 [ 197.975812][ C0] ret_from_fork_asm+0x1a/0x30 [ 197.980583][ C0] [ 197.982899][ C0] read-write to 0xffff8881048b4020 of 4 bytes by interrupt on cpu 0: [ 197.990962][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 197.995645][ C0] can_rcv_filter+0x225/0x4c0 [ 198.000338][ C0] can_receive+0x182/0x1f0 [ 198.004764][ C0] can_rcv+0xe7/0x180 [ 198.008762][ C0] __netif_receive_skb+0x123/0x280 [ 198.013891][ C0] process_backlog+0x22e/0x440 [ 198.018670][ C0] __napi_poll+0x63/0x3c0 [ 198.023005][ C0] net_rx_action+0x3a1/0x7f0 [ 198.027604][ C0] handle_softirqs+0xbf/0x280 [ 198.032295][ C0] do_softirq+0x5e/0x90 [ 198.036458][ C0] __local_bh_enable_ip+0x6e/0x70 [ 198.041500][ C0] update_defense_level+0x575/0x5b0 [ 198.046714][ C0] defense_work_handler+0x1f/0x80 [ 198.051747][ C0] process_scheduled_works+0x483/0x9a0 [ 198.057213][ C0] worker_thread+0x51d/0x6f0 [ 198.061810][ C0] kthread+0x1d1/0x210 [ 198.065879][ C0] ret_from_fork+0x4b/0x60 [ 198.070296][ C0] ret_from_fork_asm+0x1a/0x30 [ 198.075067][ C0] [ 198.077385][ C0] value changed: 0x000816b1 -> 0x000816b3 [ 198.083096][ C0] [ 198.085414][ C0] Reported by Kernel Concurrency Sanitizer on: [ 198.091554][ C0] CPU: 0 UID: 0 PID: 3553 Comm: kworker/0:5 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 198.102319][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 198.112372][ C0] Workqueue: events_long defense_work_handler [ 198.118448][ C0] ================================================================== [ 198.384683][ C1] ================================================================== [ 198.392788][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 198.399492][ C1] [ 198.401809][ C1] read-write to 0xffff888104eabe18 of 8 bytes by interrupt on cpu 0: [ 198.409875][ C1] can_receive+0x1b6/0x1f0 [ 198.414303][ C1] can_rcv+0xe7/0x180 [ 198.418297][ C1] __netif_receive_skb+0x123/0x280 [ 198.423415][ C1] process_backlog+0x22e/0x440 [ 198.428190][ C1] __napi_poll+0x63/0x3c0 [ 198.432522][ C1] net_rx_action+0x3a1/0x7f0 [ 198.437123][ C1] handle_softirqs+0xbf/0x280 [ 198.441817][ C1] do_softirq+0x5e/0x90 [ 198.445985][ C1] __local_bh_enable_ip+0x6e/0x70 [ 198.451022][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 198.455968][ C1] htable_selective_cleanup+0x179/0x1d0 [ 198.461528][ C1] htable_gc+0x1a/0x60 [ 198.465611][ C1] process_scheduled_works+0x483/0x9a0 [ 198.471083][ C1] worker_thread+0x51d/0x6f0 [ 198.475678][ C1] kthread+0x1d1/0x210 [ 198.479755][ C1] ret_from_fork+0x4b/0x60 [ 198.484171][ C1] ret_from_fork_asm+0x1a/0x30 [ 198.488937][ C1] [ 198.491253][ C1] read-write to 0xffff888104eabe18 of 8 bytes by interrupt on cpu 1: [ 198.499311][ C1] can_receive+0x1b6/0x1f0 [ 198.503748][ C1] can_rcv+0xe7/0x180 [ 198.507745][ C1] __netif_receive_skb+0x123/0x280 [ 198.512859][ C1] process_backlog+0x22e/0x440 [ 198.517629][ C1] __napi_poll+0x63/0x3c0 [ 198.521962][ C1] net_rx_action+0x3a1/0x7f0 [ 198.526556][ C1] handle_softirqs+0xbf/0x280 [ 198.531249][ C1] run_ksoftirqd+0x1c/0x30 [ 198.535666][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 198.540614][ C1] kthread+0x1d1/0x210 [ 198.544685][ C1] ret_from_fork+0x4b/0x60 [ 198.549102][ C1] ret_from_fork_asm+0x1a/0x30 [ 198.553866][ C1] [ 198.556183][ C1] value changed: 0x0000000000092f72 -> 0x0000000000092f74 [ 198.563284][ C1] [ 198.565603][ C1] Reported by Kernel Concurrency Sanitizer on: [ 198.571746][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 198.582337][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 198.592394][ C1] ================================================================== [ 199.982655][ C1] ================================================================== [ 199.990769][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 199.997478][ C1] [ 199.999805][ C1] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 0: [ 200.007874][ C1] can_receive+0x4e/0x1f0 [ 200.012221][ C1] can_rcv+0xe7/0x180 [ 200.016220][ C1] __netif_receive_skb+0x123/0x280 [ 200.021341][ C1] process_backlog+0x22e/0x440 [ 200.026121][ C1] __napi_poll+0x63/0x3c0 [ 200.030458][ C1] net_rx_action+0x3a1/0x7f0 [ 200.035054][ C1] handle_softirqs+0xbf/0x280 [ 200.039744][ C1] run_ksoftirqd+0x1c/0x30 [ 200.044165][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 200.049118][ C1] kthread+0x1d1/0x210 [ 200.053189][ C1] ret_from_fork+0x4b/0x60 [ 200.057609][ C1] ret_from_fork_asm+0x1a/0x30 [ 200.062387][ C1] [ 200.064701][ C1] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 1: [ 200.072759][ C1] can_receive+0x4e/0x1f0 [ 200.077103][ C1] can_rcv+0xe7/0x180 [ 200.081093][ C1] __netif_receive_skb+0x123/0x280 [ 200.086215][ C1] process_backlog+0x22e/0x440 [ 200.090983][ C1] __napi_poll+0x63/0x3c0 [ 200.095320][ C1] net_rx_action+0x3a1/0x7f0 [ 200.099918][ C1] handle_softirqs+0xbf/0x280 [ 200.104610][ C1] run_ksoftirqd+0x1c/0x30 [ 200.109023][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 200.113973][ C1] kthread+0x1d1/0x210 [ 200.118039][ C1] ret_from_fork+0x4b/0x60 [ 200.122457][ C1] ret_from_fork_asm+0x1a/0x30 [ 200.127225][ C1] [ 200.129544][ C1] value changed: 0x00000000000ccd16 -> 0x00000000000ccd17 [ 200.136646][ C1] [ 200.138964][ C1] Reported by Kernel Concurrency Sanitizer on: [ 200.145104][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 200.155693][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 200.165748][ C1] ================================================================== [ 200.199927][ C0] ================================================================== [ 200.208022][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 200.214727][ C0] [ 200.217042][ C0] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 1: [ 200.225107][ C0] can_receive+0x1ca/0x1f0 [ 200.229537][ C0] can_rcv+0xe7/0x180 [ 200.233529][ C0] __netif_receive_skb+0x123/0x280 [ 200.238645][ C0] process_backlog+0x22e/0x440 [ 200.243440][ C0] __napi_poll+0x63/0x3c0 [ 200.247778][ C0] net_rx_action+0x3a1/0x7f0 [ 200.252378][ C0] handle_softirqs+0xbf/0x280 [ 200.257073][ C0] run_ksoftirqd+0x1c/0x30 [ 200.261493][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 200.266444][ C0] kthread+0x1d1/0x210 [ 200.270511][ C0] ret_from_fork+0x4b/0x60 [ 200.274932][ C0] ret_from_fork_asm+0x1a/0x30 [ 200.279702][ C0] [ 200.282016][ C0] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 0: [ 200.290080][ C0] can_receive+0x1ca/0x1f0 [ 200.294510][ C0] can_rcv+0xe7/0x180 [ 200.298501][ C0] __netif_receive_skb+0x123/0x280 [ 200.303616][ C0] process_backlog+0x22e/0x440 [ 200.308389][ C0] __napi_poll+0x63/0x3c0 [ 200.312722][ C0] net_rx_action+0x3a1/0x7f0 [ 200.317322][ C0] handle_softirqs+0xbf/0x280 [ 200.322012][ C0] do_softirq+0x5e/0x90 [ 200.326175][ C0] __local_bh_enable_ip+0x6e/0x70 [ 200.331208][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 200.336155][ C0] htable_selective_cleanup+0x179/0x1d0 [ 200.341717][ C0] htable_gc+0x1a/0x60 [ 200.345794][ C0] process_scheduled_works+0x483/0x9a0 [ 200.351258][ C0] worker_thread+0x51d/0x6f0 [ 200.355859][ C0] kthread+0x1d1/0x210 [ 200.359924][ C0] ret_from_fork+0x4b/0x60 [ 200.364347][ C0] ret_from_fork_asm+0x1a/0x30 [ 200.369115][ C0] [ 200.371431][ C0] value changed: 0x0000000000019ce4 -> 0x0000000000019ce6 [ 200.378530][ C0] [ 200.380846][ C0] Reported by Kernel Concurrency Sanitizer on: [ 200.386987][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 200.397488][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 200.407548][ C0] Workqueue: events_power_efficient htable_gc [ 200.413636][ C0] ================================================================== [ 200.441179][ C0] ================================================================== [ 200.449265][ C0] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 200.456489][ C0] [ 200.458807][ C0] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 1: [ 200.466865][ C0] can_rcv_filter+0x237/0x4c0 [ 200.471552][ C0] can_receive+0x182/0x1f0 [ 200.475985][ C0] can_rcv+0xe7/0x180 [ 200.479978][ C0] __netif_receive_skb+0x123/0x280 [ 200.485096][ C0] process_backlog+0x22e/0x440 [ 200.489867][ C0] __napi_poll+0x63/0x3c0 [ 200.494200][ C0] net_rx_action+0x3a1/0x7f0 [ 200.498793][ C0] handle_softirqs+0xbf/0x280 [ 200.503483][ C0] run_ksoftirqd+0x1c/0x30 [ 200.507902][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 200.512857][ C0] kthread+0x1d1/0x210 [ 200.516926][ C0] ret_from_fork+0x4b/0x60 [ 200.521344][ C0] ret_from_fork_asm+0x1a/0x30 [ 200.526112][ C0] [ 200.528432][ C0] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 0: [ 200.536492][ C0] can_rcv_filter+0x237/0x4c0 [ 200.541184][ C0] can_receive+0x182/0x1f0 [ 200.545607][ C0] can_rcv+0xe7/0x180 [ 200.549604][ C0] __netif_receive_skb+0x123/0x280 [ 200.554717][ C0] process_backlog+0x22e/0x440 [ 200.559488][ C0] __napi_poll+0x63/0x3c0 [ 200.563821][ C0] net_rx_action+0x3a1/0x7f0 [ 200.568414][ C0] handle_softirqs+0xbf/0x280 [ 200.573100][ C0] do_softirq+0x5e/0x90 [ 200.577267][ C0] __local_bh_enable_ip+0x6e/0x70 [ 200.582305][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 200.587256][ C0] htable_selective_cleanup+0x179/0x1d0 [ 200.592817][ C0] htable_gc+0x1a/0x60 [ 200.596900][ C0] process_scheduled_works+0x483/0x9a0 [ 200.602368][ C0] worker_thread+0x51d/0x6f0 [ 200.606970][ C0] kthread+0x1d1/0x210 [ 200.611037][ C0] ret_from_fork+0x4b/0x60 [ 200.615452][ C0] ret_from_fork_asm+0x1a/0x30 [ 200.620218][ C0] [ 200.622533][ C0] value changed: 0x00000000000dce12 -> 0x00000000000dce14 [ 200.629637][ C0] [ 200.631958][ C0] Reported by Kernel Concurrency Sanitizer on: [ 200.638104][ C0] CPU: 0 UID: 0 PID: 1098 Comm: kworker/0:2 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 200.648867][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 200.658926][ C0] Workqueue: events_power_efficient htable_gc [ 200.665011][ C0] ================================================================== [ 200.678066][ C1] ================================================================== [ 200.686154][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 200.692860][ C1] [ 200.695176][ C1] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 0: [ 200.703240][ C1] can_receive+0x62/0x1f0 [ 200.707581][ C1] can_rcv+0xe7/0x180 [ 200.711573][ C1] __netif_receive_skb+0x123/0x280 [ 200.716687][ C1] process_backlog+0x22e/0x440 [ 200.721457][ C1] __napi_poll+0x63/0x3c0 [ 200.725790][ C1] net_rx_action+0x3a1/0x7f0 [ 200.730388][ C1] handle_softirqs+0xbf/0x280 [ 200.735077][ C1] run_ksoftirqd+0x1c/0x30 [ 200.739494][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 200.744446][ C1] kthread+0x1d1/0x210 [ 200.748513][ C1] ret_from_fork+0x4b/0x60 [ 200.752927][ C1] ret_from_fork_asm+0x1a/0x30 [ 200.757704][ C1] [ 200.760027][ C1] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 1: [ 200.768093][ C1] can_receive+0x62/0x1f0 [ 200.772445][ C1] can_rcv+0xe7/0x180 [ 200.776448][ C1] __netif_receive_skb+0x123/0x280 [ 200.781568][ C1] process_backlog+0x22e/0x440 [ 200.786340][ C1] __napi_poll+0x63/0x3c0 [ 200.790679][ C1] net_rx_action+0x3a1/0x7f0 [ 200.795274][ C1] handle_softirqs+0xbf/0x280 [ 200.799967][ C1] run_ksoftirqd+0x1c/0x30 [ 200.804384][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 200.809334][ C1] kthread+0x1d1/0x210 [ 200.813396][ C1] ret_from_fork+0x4b/0x60 [ 200.817814][ C1] ret_from_fork_asm+0x1a/0x30 [ 200.822580][ C1] [ 200.824895][ C1] value changed: 0x00000000000024fd -> 0x00000000000024ff [ 200.831995][ C1] [ 200.834312][ C1] Reported by Kernel Concurrency Sanitizer on: [ 200.840453][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 200.851044][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 200.861102][ C1] ================================================================== [ 200.917508][ C0] ================================================================== [ 200.925598][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 200.932813][ C0] [ 200.935129][ C0] read-write to 0xffff8881048b4020 of 4 bytes by interrupt on cpu 1: [ 200.943199][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 200.947887][ C0] can_rcv_filter+0x225/0x4c0 [ 200.952579][ C0] can_receive+0x182/0x1f0 [ 200.957001][ C0] can_rcv+0xe7/0x180 [ 200.960992][ C0] __netif_receive_skb+0x123/0x280 [ 200.966104][ C0] process_backlog+0x22e/0x440 [ 200.970875][ C0] __napi_poll+0x63/0x3c0 [ 200.975206][ C0] net_rx_action+0x3a1/0x7f0 [ 200.979801][ C0] handle_softirqs+0xbf/0x280 [ 200.984489][ C0] do_softirq+0x5e/0x90 [ 200.988665][ C0] __local_bh_enable_ip+0x6e/0x70 [ 200.993699][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 200.998647][ C0] wg_index_hashtable_insert+0xaa/0x2a0 [ 201.004196][ C0] wg_noise_handshake_create_initiation+0x52d/0x5f0 [ 201.010800][ C0] wg_packet_handshake_send_worker+0xb3/0x150 [ 201.016889][ C0] process_scheduled_works+0x483/0x9a0 [ 201.022363][ C0] worker_thread+0x51d/0x6f0 [ 201.026969][ C0] kthread+0x1d1/0x210 [ 201.031037][ C0] ret_from_fork+0x4b/0x60 [ 201.035456][ C0] ret_from_fork_asm+0x1a/0x30 [ 201.040220][ C0] [ 201.042537][ C0] read-write to 0xffff8881048b4020 of 4 bytes by interrupt on cpu 0: [ 201.050599][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 201.055290][ C0] can_rcv_filter+0x225/0x4c0 [ 201.059986][ C0] can_receive+0x182/0x1f0 [ 201.064412][ C0] can_rcv+0xe7/0x180 [ 201.068401][ C0] __netif_receive_skb+0x123/0x280 [ 201.073517][ C0] process_backlog+0x22e/0x440 [ 201.078294][ C0] __napi_poll+0x63/0x3c0 [ 201.082624][ C0] net_rx_action+0x3a1/0x7f0 [ 201.087221][ C0] handle_softirqs+0xbf/0x280 [ 201.091914][ C0] do_softirq+0x5e/0x90 [ 201.096081][ C0] __local_bh_enable_ip+0x6e/0x70 [ 201.101118][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 201.106064][ C0] htable_selective_cleanup+0x179/0x1d0 [ 201.111623][ C0] htable_gc+0x1a/0x60 [ 201.115706][ C0] process_scheduled_works+0x483/0x9a0 [ 201.121170][ C0] worker_thread+0x51d/0x6f0 [ 201.125770][ C0] kthread+0x1d1/0x210 [ 201.129838][ C0] ret_from_fork+0x4b/0x60 [ 201.134252][ C0] ret_from_fork_asm+0x1a/0x30 [ 201.139021][ C0] [ 201.141338][ C0] value changed: 0x000e4167 -> 0x000e4168 [ 201.147049][ C0] [ 201.149365][ C0] Reported by Kernel Concurrency Sanitizer on: [ 201.155515][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 201.166025][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 201.176080][ C0] Workqueue: events_power_efficient htable_gc [ 201.182168][ C0] ================================================================== [ 201.394984][ C0] ================================================================== [ 201.403085][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 201.409793][ C0] [ 201.412110][ C0] read-write to 0xffff888104eabe18 of 8 bytes by interrupt on cpu 1: [ 201.420171][ C0] can_receive+0x1b6/0x1f0 [ 201.424598][ C0] can_rcv+0xe7/0x180 [ 201.428594][ C0] __netif_receive_skb+0x123/0x280 [ 201.433711][ C0] process_backlog+0x22e/0x440 [ 201.438486][ C0] __napi_poll+0x63/0x3c0 [ 201.442820][ C0] net_rx_action+0x3a1/0x7f0 [ 201.447421][ C0] handle_softirqs+0xbf/0x280 [ 201.452110][ C0] run_ksoftirqd+0x1c/0x30 [ 201.456530][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 201.461482][ C0] kthread+0x1d1/0x210 [ 201.465549][ C0] ret_from_fork+0x4b/0x60 [ 201.469954][ C0] ret_from_fork_asm+0x1a/0x30 [ 201.474713][ C0] [ 201.477028][ C0] read-write to 0xffff888104eabe18 of 8 bytes by interrupt on cpu 0: [ 201.485078][ C0] can_receive+0x1b6/0x1f0 [ 201.489491][ C0] can_rcv+0xe7/0x180 [ 201.493469][ C0] __netif_receive_skb+0x123/0x280 [ 201.498575][ C0] process_backlog+0x22e/0x440 [ 201.503329][ C0] __napi_poll+0x63/0x3c0 [ 201.507648][ C0] net_rx_action+0x3a1/0x7f0 [ 201.512231][ C0] handle_softirqs+0xbf/0x280 [ 201.516911][ C0] do_softirq+0x5e/0x90 [ 201.521063][ C0] __local_bh_enable_ip+0x6e/0x70 [ 201.526086][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 201.531018][ C0] htable_selective_cleanup+0x179/0x1d0 [ 201.536563][ C0] htable_gc+0x1a/0x60 [ 201.540629][ C0] process_scheduled_works+0x483/0x9a0 [ 201.546081][ C0] worker_thread+0x51d/0x6f0 [ 201.550665][ C0] kthread+0x1d1/0x210 [ 201.554725][ C0] ret_from_fork+0x4b/0x60 [ 201.559139][ C0] ret_from_fork_asm+0x1a/0x30 [ 201.563891][ C0] [ 201.566198][ C0] value changed: 0x00000000000f4c5b -> 0x00000000000f4c5c [ 201.573286][ C0] [ 201.575590][ C0] Reported by Kernel Concurrency Sanitizer on: [ 201.581721][ C0] CPU: 0 UID: 0 PID: 1098 Comm: kworker/0:2 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 201.592470][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 201.602514][ C0] Workqueue: events_power_efficient htable_gc [ 201.608580][ C0] ================================================================== [ 202.989344][ C0] ================================================================== [ 202.997450][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 203.004153][ C0] [ 203.006480][ C0] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 1: [ 203.014549][ C0] can_receive+0x4e/0x1f0 [ 203.018893][ C0] can_rcv+0xe7/0x180 [ 203.022891][ C0] __netif_receive_skb+0x123/0x280 [ 203.028008][ C0] process_backlog+0x22e/0x440 [ 203.032777][ C0] __napi_poll+0x63/0x3c0 [ 203.037110][ C0] net_rx_action+0x3a1/0x7f0 [ 203.041705][ C0] handle_softirqs+0xbf/0x280 [ 203.046397][ C0] run_ksoftirqd+0x1c/0x30 [ 203.050816][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 203.055766][ C0] kthread+0x1d1/0x210 [ 203.059835][ C0] ret_from_fork+0x4b/0x60 [ 203.064255][ C0] ret_from_fork_asm+0x1a/0x30 [ 203.069026][ C0] [ 203.071343][ C0] read-write to 0xffff888104eabe08 of 8 bytes by interrupt on cpu 0: [ 203.079412][ C0] can_receive+0x4e/0x1f0 [ 203.083753][ C0] can_rcv+0xe7/0x180 [ 203.087747][ C0] __netif_receive_skb+0x123/0x280 [ 203.092867][ C0] process_backlog+0x22e/0x440 [ 203.097636][ C0] __napi_poll+0x63/0x3c0 [ 203.101972][ C0] net_rx_action+0x3a1/0x7f0 [ 203.106571][ C0] handle_softirqs+0xbf/0x280 [ 203.111264][ C0] do_softirq+0x5e/0x90 [ 203.115431][ C0] __local_bh_enable_ip+0x6e/0x70 [ 203.120466][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 203.125409][ C0] htable_selective_cleanup+0x179/0x1d0 [ 203.130975][ C0] htable_gc+0x1a/0x60 [ 203.135058][ C0] process_scheduled_works+0x483/0x9a0 [ 203.140529][ C0] worker_thread+0x51d/0x6f0 [ 203.145126][ C0] kthread+0x1d1/0x210 [ 203.149193][ C0] ret_from_fork+0x4b/0x60 [ 203.153611][ C0] ret_from_fork_asm+0x1a/0x30 [ 203.158385][ C0] [ 203.160706][ C0] value changed: 0x000000000012bf6b -> 0x000000000012bf6d [ 203.167804][ C0] [ 203.170121][ C0] Reported by Kernel Concurrency Sanitizer on: [ 203.176264][ C0] CPU: 0 UID: 0 PID: 1098 Comm: kworker/0:2 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 203.187025][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 203.197079][ C0] Workqueue: events_power_efficient htable_gc [ 203.203164][ C0] ================================================================== [ 203.214764][ C0] ================================================================== [ 203.222853][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 203.229558][ C0] [ 203.231877][ C0] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 1: [ 203.239939][ C0] can_receive+0x1ca/0x1f0 [ 203.244368][ C0] can_rcv+0xe7/0x180 [ 203.248363][ C0] __netif_receive_skb+0x123/0x280 [ 203.253481][ C0] process_backlog+0x22e/0x440 [ 203.258251][ C0] __napi_poll+0x63/0x3c0 [ 203.262585][ C0] net_rx_action+0x3a1/0x7f0 [ 203.267182][ C0] handle_softirqs+0xbf/0x280 [ 203.271873][ C0] run_ksoftirqd+0x1c/0x30 [ 203.276292][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 203.281240][ C0] kthread+0x1d1/0x210 [ 203.285309][ C0] ret_from_fork+0x4b/0x60 [ 203.289727][ C0] ret_from_fork_asm+0x1a/0x30 [ 203.294490][ C0] [ 203.296806][ C0] read-write to 0xffff888104eabe78 of 8 bytes by interrupt on cpu 0: [ 203.304872][ C0] can_receive+0x1ca/0x1f0 [ 203.309301][ C0] can_rcv+0xe7/0x180 [ 203.313297][ C0] __netif_receive_skb+0x123/0x280 [ 203.318416][ C0] process_backlog+0x22e/0x440 [ 203.323183][ C0] __napi_poll+0x63/0x3c0 [ 203.327511][ C0] net_rx_action+0x3a1/0x7f0 [ 203.332105][ C0] handle_softirqs+0xbf/0x280 [ 203.336799][ C0] do_softirq+0x5e/0x90 [ 203.340965][ C0] __local_bh_enable_ip+0x6e/0x70 [ 203.346001][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 203.350943][ C0] htable_selective_cleanup+0x179/0x1d0 [ 203.356505][ C0] htable_gc+0x1a/0x60 [ 203.360583][ C0] process_scheduled_works+0x483/0x9a0 [ 203.366053][ C0] worker_thread+0x51d/0x6f0 [ 203.370663][ C0] kthread+0x1d1/0x210 [ 203.374729][ C0] ret_from_fork+0x4b/0x60 [ 203.379142][ C0] ret_from_fork_asm+0x1a/0x30 [ 203.383905][ C0] [ 203.386224][ C0] value changed: 0x00000000000184fc -> 0x00000000000184fe [ 203.393320][ C0] [ 203.395635][ C0] Reported by Kernel Concurrency Sanitizer on: [ 203.401780][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 203.412283][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 203.422339][ C0] Workqueue: events_power_efficient htable_gc [ 203.428425][ C0] ================================================================== [ 203.449903][ C0] ================================================================== [ 203.457997][ C0] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 203.465222][ C0] [ 203.467540][ C0] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 1: [ 203.475602][ C0] can_rcv_filter+0x237/0x4c0 [ 203.480290][ C0] can_receive+0x182/0x1f0 [ 203.484714][ C0] can_rcv+0xe7/0x180 [ 203.488709][ C0] __netif_receive_skb+0x123/0x280 [ 203.493828][ C0] process_backlog+0x22e/0x440 [ 203.498600][ C0] __napi_poll+0x63/0x3c0 [ 203.502932][ C0] net_rx_action+0x3a1/0x7f0 [ 203.507532][ C0] handle_softirqs+0xbf/0x280 [ 203.512221][ C0] run_ksoftirqd+0x1c/0x30 [ 203.516639][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 203.521593][ C0] kthread+0x1d1/0x210 [ 203.525660][ C0] ret_from_fork+0x4b/0x60 [ 203.530069][ C0] ret_from_fork_asm+0x1a/0x30 [ 203.534841][ C0] [ 203.537156][ C0] read-write to 0xffff888101ddd798 of 8 bytes by interrupt on cpu 0: [ 203.545221][ C0] can_rcv_filter+0x237/0x4c0 [ 203.549909][ C0] can_receive+0x182/0x1f0 [ 203.554339][ C0] can_rcv+0xe7/0x180 [ 203.558334][ C0] __netif_receive_skb+0x123/0x280 [ 203.563447][ C0] process_backlog+0x22e/0x440 [ 203.568237][ C0] __napi_poll+0x63/0x3c0 [ 203.572566][ C0] net_rx_action+0x3a1/0x7f0 [ 203.577161][ C0] handle_softirqs+0xbf/0x280 [ 203.581847][ C0] run_ksoftirqd+0x1c/0x30 [ 203.586264][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 203.591215][ C0] kthread+0x1d1/0x210 [ 203.595285][ C0] ret_from_fork+0x4b/0x60 [ 203.599698][ C0] ret_from_fork_asm+0x1a/0x30 [ 203.604467][ C0] [ 203.606785][ C0] value changed: 0x000000000013aa13 -> 0x000000000013aa15 [ 203.613887][ C0] [ 203.616204][ C0] Reported by Kernel Concurrency Sanitizer on: [ 203.622343][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 203.632935][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 203.642993][ C0] ================================================================== [ 203.706518][ C1] ================================================================== [ 203.714610][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 203.721316][ C1] [ 203.723634][ C1] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 0: [ 203.731695][ C1] can_receive+0x62/0x1f0 [ 203.736038][ C1] can_rcv+0xe7/0x180 [ 203.740031][ C1] __netif_receive_skb+0x123/0x280 [ 203.745150][ C1] process_backlog+0x22e/0x440 [ 203.749916][ C1] __napi_poll+0x63/0x3c0 [ 203.754248][ C1] net_rx_action+0x3a1/0x7f0 [ 203.758843][ C1] handle_softirqs+0xbf/0x280 [ 203.763534][ C1] do_softirq+0x5e/0x90 [ 203.767698][ C1] __local_bh_enable_ip+0x6e/0x70 [ 203.772735][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 203.777677][ C1] htable_selective_cleanup+0x179/0x1d0 [ 203.783242][ C1] htable_gc+0x1a/0x60 [ 203.787320][ C1] process_scheduled_works+0x483/0x9a0 [ 203.792797][ C1] worker_thread+0x51d/0x6f0 [ 203.797397][ C1] kthread+0x1d1/0x210 [ 203.801463][ C1] ret_from_fork+0x4b/0x60 [ 203.805878][ C1] ret_from_fork_asm+0x1a/0x30 [ 203.810649][ C1] [ 203.812962][ C1] read-write to 0xffff888104eabe68 of 8 bytes by interrupt on cpu 1: [ 203.821029][ C1] can_receive+0x62/0x1f0 [ 203.825375][ C1] can_rcv+0xe7/0x180 [ 203.829372][ C1] __netif_receive_skb+0x123/0x280 [ 203.834489][ C1] process_backlog+0x22e/0x440 [ 203.839263][ C1] __napi_poll+0x63/0x3c0 [ 203.843599][ C1] net_rx_action+0x3a1/0x7f0 [ 203.848193][ C1] handle_softirqs+0xbf/0x280 [ 203.852885][ C1] run_ksoftirqd+0x1c/0x30 [ 203.857302][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 203.862258][ C1] kthread+0x1d1/0x210 [ 203.866325][ C1] ret_from_fork+0x4b/0x60 [ 203.870750][ C1] ret_from_fork_asm+0x1a/0x30 [ 203.875520][ C1] [ 203.877838][ C1] value changed: 0x0000000000005e6f -> 0x0000000000005e71 [ 203.884937][ C1] [ 203.887255][ C1] Reported by Kernel Concurrency Sanitizer on: [ 203.893402][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 203.903989][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 203.914045][ C1] ================================================================== [ 203.926720][ C0] ================================================================== [ 203.934808][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 203.942024][ C0] [ 203.944348][ C0] read-write to 0xffff8881048b4020 of 4 bytes by interrupt on cpu 1: [ 203.952413][ C0] can_can_gw_rcv+0x7cb/0x7e0