last executing test programs: 5m10.727680815s ago: executing program 3 (id=613): syz_emit_ethernet(0x2a, &(0x7f0000000780)=ANY=[@ANYBLOB="ffffffffffff05009211d49c08004500001c00000000008890780a010101ffffffff110090780000007e66d3f48d06c8a521090f1e2c0ac05a049d66efc9aa8a39ddf2380b63616838fbac65d79c600b9d8a5fa1a582c09da56cd6d315b33ccd1876e7d1e0e45b829fece7765c75e5eded72bc6071a39ee0e42b5e31f2e36efc63fd441b7afba2ea01450d6c2236c5fa8f0401000100d6ce598f870aafce3996a76a90ad12e2216de59f717067b22ed55bb5e4849280cd4ab2569aca208cff8ae3f6a5"], 0x0) quotactl$Q_GETQUOTA(0xffffffff80000702, &(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x10, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="da2261875f58323cf5704ca92bdcc7e39a892ad9ce2e9482b397d74faa777043c79850203e844203a9e244"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) getpid() r0 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r0, r0}, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010300000000000000000100fffd0900010073797a300000000040000000030a01020000000000000000010000000900030073797a3200000000140004800800024032658aeb08000140000000010900010073797a300000000044000000060a010400000000000001040100000008000b40000000000900010073797a30000000001c000480180001800d00010073796e70726f7879000000000400028014000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 5m5.93978432s ago: executing program 1 (id=616): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x6}, 0x18) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630b00c145f94cd977", 0x18, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'blkio'}]}, 0x7) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r4 = socket(0x2, 0x80805, 0x0) fcntl$setflags(r4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fc0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x10) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x5, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000540)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dd308", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@generic={0x5, 0xa, "902172378d9aaccc"}]}}}}}}}}, 0x0) sendmmsg$inet(r4, &(0x7f0000001b80)=[{{&(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000340)="fd", 0x1}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000540)=[{&(0x7f00000006c0)='\f', 0x1}], 0x1}}], 0x2, 0x4000000) close_range(r3, 0xffffffffffffffff, 0x0) 5m3.864081664s ago: executing program 3 (id=617): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'geneve0\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) 4m58.778090781s ago: executing program 1 (id=620): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "87ee8ac6c46dad33", "2607080d7f4fcf00fd4ef2dece6c7c58"}, 0x28) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)="6e37cff5b582e082d58cb23db6f9d2b445ffdffc2096e3c19dc4971d9b59ddb52ae25a3ca48e8d5284721b4b722d1fd011", 0x31}, {&(0x7f0000000400)="1165b65dc1f84946f03562d6913624a2b6d8ec92d3b85d62c12f159214de3618d4dc028c1b6992dc66459f58c8b8b56fe04e31cdde47a1821cf3bddee1076115f9afb5391f0f33219347a02ffb4109374ae3528f700cf1963b704fd24e27b70dd82d3ef5fd0d6c7e9512db1aff64b84d0fe3cce36da98fcc74949374701d31a1418b3fb186b4fc5f661870be567805e16f89688c5b75b19b2081c8026c57eb5eefe65efbb7e36ceb1c63f4b46af44c39a7651531bd31e4bcb66636f5412f2f97dd0f6eba05988d5dbfef41b1382b757fa76544", 0xd3}, {&(0x7f0000000500)="0f1d547dfd011eee5ee96e9f1947841b6080ffadffd0f2ba53588a463cb08890097ea28302b894feb895cebb0e72a94c681955c3a39a1e5ebde1638c8f408cbb197ede5a6779e4582b685db9abb1184d1e4bf53bb5eafcc7d265002aeead4852d157cfb83a10f405c72c51bd99d99ea7f702c9424dcfffbd0387c5e7777aa1bf37cbffb95d0daf9ff4df9c2c6ce90807958457", 0x93}, {&(0x7f0000000700)="7a60507430110d45fba18e434184c81c9a10404af273af02537863cd4f9b455ba771ca5222198ae07333ef0d2beff796d017427138340fc2b1528610600c9b212beee90a7941df2f1ec93c7469156c30892b39b7b43f9d229a356cc43023e2eb30577ca2725e6c1ce2e4557d4150336ac279203360ee37b0f67dce3d0fa468aed602dc9f641bbacbeac908a860f4d02f22946a5a73f0bd6896b5fb16030000000000000007c6d07b767649101165270eb5c82bc6cd3d2c5954f370361578736b68b2d8d891071b5ad1e7ede7372c18df066960ba60b27a4a33fe21f9fb144b71ece5b7c8bc9eb9", 0xe7}, {&(0x7f0000001700)="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", 0xbf2}], 0x5}, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000680)=@gcm_128={{0x303}, "000037d7009400", "c0b6c5b29ca2b838d41ac2fc7ddf972d", "e9be1eae", "bb10000000000001"}, 0x28) recvfrom$inet6(r0, &(0x7f0000000100)=""/19, 0x1ff4, 0x40, 0x0, 0x0) 4m58.001350168s ago: executing program 3 (id=621): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r3, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x1, {0x84, 0x0, 0x3}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = gettid() r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="44000000020605000000000000000000000000000c000300686173683a69700005000400000000000900020073797a31001000000500050002000000050001000600"], 0x44}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$IPSET_CMD_ADD(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0xf9efffff, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$TCSETSF(r8, 0x5404, &(0x7f0000000000)={0xc3, 0x28000, 0xe21c, 0x200000, 0xfd, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r5}, 0x10) mount$9p_rdma(0x0, &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, &(0x7f0000000080)=ANY=[]) write(r4, &(0x7f00000001c0)="dfc00ffe2a387f8b88f9465954818532d70e2698b6a2c51caf22d4f1f1dff163f697a5498ab3467201da3221bae4c36daef7e5f463ccd686398c1c03ccb2e146846b7aa6965427803d3843a56506688ad2c2e4c2aeef4c053a06714ea8f4610aea5a4d0920852b6e705111b507d52250c565359ae5e7a256e4f0fdb156319e4ed37d1cb3c2148e67369455946b3409208eb68e1868d58d2374a6c02285c6c9bbe9fafc82303791b89193245bca316af807c3743bb17ee7fb449f33512bbeac43bb210215", 0xc4) setreuid(0xee01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x0, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 4m46.78699674s ago: executing program 1 (id=627): syz_emit_ethernet(0x2a, &(0x7f0000000780)=ANY=[@ANYBLOB="ffffffffffff05009211d49c08004500001c00000000008890780a010101ffffffff110090780000007e66d3f48d06c8a521090f1e2c0ac05a049d66efc9aa8a39ddf2380b63616838fbac65d79c600b9d8a5fa1a582c09da56cd6d315b33ccd1876e7d1e0e45b829fece7765c75e5eded72bc6071a39ee0e42b5e31f2e36efc63fd441b7afba2ea01450d6c2236c5fa8f0401000100d6ce598f870aafce3996a76a90ad12e2216de59f717067b22ed55bb5e4849280cd4ab2569aca208cff8ae3f6a5"], 0x0) quotactl$Q_GETQUOTA(0xffffffff80000702, &(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x10, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="da2261875f58323cf5704ca92bdcc7e39a892ad9ce2e9482b397d74faa777043c79850203e844203a9e244"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) getpid() r0 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r0, r0}, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010300000000000000000100fffd0900010073797a300000000040000000030a01020000000000000000010000000900030073797a3200000000140004800800024032658aeb08000140000000010900010073797a300000000044000000060a010400000000000001040100000008000b40000000000900010073797a30000000001c000480180001800d00010073796e70726f7879000000000400028014000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 4m46.170353395s ago: executing program 3 (id=628): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000720000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x2}}, 0x10) listen(r1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 4m37.336579421s ago: executing program 3 (id=633): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) recvmmsg(r2, &(0x7f0000007200)=[{{0x0, 0x0, 0x0}, 0x401}], 0x1, 0x10002, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 4m34.7673859s ago: executing program 0 (id=635): r0 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{r1}, &(0x7f0000000640), &(0x7f0000000680)='%pi6 \x00'}, 0x20) close(r0) 4m33.494868315s ago: executing program 1 (id=636): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) eventfd2(0x800, 0x800) 4m30.347115049s ago: executing program 0 (id=638): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r3, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x1, {0x84, 0x0, 0x3}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = gettid() r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="44000000020605000000000000000000000000000c000300686173683a69700005000400000000000900020073797a31001000000500050002000000050001000600"], 0x44}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$IPSET_CMD_ADD(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0xf9efffff, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$TCSETSF(r8, 0x5404, &(0x7f0000000000)={0xc3, 0x28000, 0xe21c, 0x200000, 0xfd, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r5}, 0x10) mount$9p_rdma(0x0, &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, &(0x7f0000000080)=ANY=[]) write(r4, &(0x7f00000001c0)="dfc00ffe2a387f8b88f9465954818532d70e2698b6a2c51caf22d4f1f1dff163f697a5498ab3467201da3221bae4c36daef7e5f463ccd686398c1c03ccb2e146846b7aa6965427803d3843a56506688ad2c2e4c2aeef4c053a06714ea8f4610aea5a4d0920852b6e705111b507d52250c565359ae5e7a256e4f0fdb156319e4ed37d1cb3c2148e67369455946b3409208eb68e1868d58d2374a6c02285c6c9bbe9fafc82303791b89193245bca316af807c3743bb17ee7fb449f33512bbeac43bb210215", 0xc4) setreuid(0xee01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x0, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 4m27.887046921s ago: executing program 1 (id=639): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac1414aa00000000000000001400020002000000e000000200000000000004000d0001007564703a"], 0x54}}, 0x0) 4m26.577091208s ago: executing program 3 (id=641): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001000070100f8", @ANYRES32=0x0, @ANYBLOB="020000000080000008001b00000000000500100004"], 0x30}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffde1, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x905, 0x0, 0x0, {0x0, 0x0, 0x4c}, [@IFLA_GROUP={0x8}, @IFLA_OPERSTATE={0x5, 0x10, 0x6}]}, 0x30}, 0x1, 0xffffa888}, 0x0) 4m20.980917233s ago: executing program 0 (id=643): r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3) read(r1, &(0x7f0000000080)=""/10, 0xa) fcntl$setsig(r1, 0xa, 0x12) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x13) 4m18.4612258s ago: executing program 1 (id=644): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c00)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x3, 0x9}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x40080) 4m14.474129525s ago: executing program 0 (id=646): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x10000, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x30}, 0x1, 0x0, 0x0, 0x4000800}, 0x4040) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x344, 0x10122, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick=0x1000000, {}, {}, @raw32={[0x2600]}}], 0xffc8) 4m10.975256735s ago: executing program 32 (id=641): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001000070100f8", @ANYRES32=0x0, @ANYBLOB="020000000080000008001b00000000000500100004"], 0x30}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffde1, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x905, 0x0, 0x0, {0x0, 0x0, 0x4c}, [@IFLA_GROUP={0x8}, @IFLA_OPERSTATE={0x5, 0x10, 0x6}]}, 0x30}, 0x1, 0xffffa888}, 0x0) 4m5.945799438s ago: executing program 0 (id=651): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfd, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./control\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x281, 0x0, 0x12, 0x14, 0x20, "95ad4489a25673b5a955f5f736ef1f1c033d36c0ee69107626f72875ceb9332cb79ea25534348f613b34a61a895ec716fbdbbfe992a25b1f2a25f36b0fad5d99", "4a1982d41c7c4e8f704adce76f19e1f6b54de1571daea73904d4af73e6f9d403919e5f74b51629df746181d1ffbfcd1d5b56e8615f129d343b1aec97cbd8d551", "1b5a0325815abc1c406400", [0x0, 0x7]}) 4m2.844978167s ago: executing program 33 (id=644): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c00)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x3, 0x9}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x40080) 3m57.053141797s ago: executing program 0 (id=655): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000080), 0x10) syz_usb_connect$cdc_ecm(0x6, 0x4d, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$sndseq(0xffffff9c, &(0x7f00000000c0), 0xc000) timerfd_create(0x1, 0x0) sendmsg$can_bcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r2}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x3, 0x2, 0x0, 0x0, "b68c52d2be3c0d90"}}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x6, 0xfffffe00) bind$inet6(r4, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @empty, 0xc}, 0x1c) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) close_range(r5, 0xffffffffffffffff, 0x0) 3m53.932156478s ago: executing program 4 (id=656): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfd, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./control\x00', 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x281, 0x0, 0x12, 0x14, 0x20, "95ad4489a25673b5a955f5f736ef1f1c033d36c0ee69107626f72875ceb9332cb79ea25534348f613b34a61a895ec716fbdbbfe992a25b1f2a25f36b0fad5d99", "4a1982d41c7c4e8f704adce76f19e1f6b54de1571daea73904d4af73e6f9d403919e5f74b51629df746181d1ffbfcd1d5b56e8615f129d343b1aec97cbd8d551", "1b5a0325815abc1c406400", [0x0, 0x7]}) 3m50.732473185s ago: executing program 2 (id=657): syz_emit_ethernet(0x2a, &(0x7f0000000780)=ANY=[@ANYBLOB="ffffffffffff05009211d49c08004500001c00000000008890780a010101ffffffff110090780000007e66d3f48d06c8a521090f1e2c0ac05a049d66efc9aa8a39ddf2380b63616838fbac65d79c600b9d8a5fa1a582c09da56cd6d315b33ccd1876e7d1e0e45b829fece7765c75e5eded72bc6071a39ee0e42b5e31f2e36efc63fd441b7afba2ea01450d6c2236c5fa8f0401000100d6ce598f870aafce3996a76a90ad12e2216de59f717067b22ed55bb5e4849280cd4ab2569aca208cff8ae3f6a5"], 0x0) quotactl$Q_GETQUOTA(0xffffffff80000702, &(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x10, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="da2261875f58323cf5704ca92bdcc7e39a892ad9ce2e9482b397d74faa777043c79850203e844203a9e244"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) r0 = getpid() keyctl$dh_compute(0x17, &(0x7f0000000140), 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010300000000000000000100fffd0900010073797a300000000040000000030a01020000000000000000010000000900030073797a3200000000140004800800024032658aeb08000140000000010900010073797a300000000044000000060a010400000000000001040100000008000b40000000000900010073797a30000000001c000480180001800d00010073796e70726f7879000000000400028014000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000000280)={0x10, 0x0, 0x1, 0x2ffffffff}, 0xc) r5 = socket$inet(0x2, 0x2, 0x1) bind$inet(r5, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r5, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb58", 0x6}], 0x2}, 0x0) 3m45.783283522s ago: executing program 2 (id=658): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x415, 0x3, 'wrr\x00', 0x1, 0x4, 0x74}, 0x2c) getpid() bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x4}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[], 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="01000000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b", @ANYBLOB="7469bd57f7c8b8fb26d29e5cd81bd437bf164239e9c868bf4c71ff350517c13e243fae30621a77e94748c1f9b10293ef6e718460c1521717bfa09ea519dfa0c71c9825cc37b7dba650edc32a082c41ef7c97f5a18da3e2fc2f"], 0x3c}}, 0x4000084) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'none\x00', 0x1d, 0x1000, 0x32}, 0x2c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac1414aa00000000000000001400020002000000e000000200000000000004000d0001007564703a73"], 0x54}}, 0x0) 3m44.783727846s ago: executing program 4 (id=659): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$rfkill(0xffffffffffffff9c, 0x0, 0x801, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x6, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="280500003d0007010000000000000000017c0000040000000c00018006000600800a000004"], 0x528}}, 0xc000) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x68, r6, 0x1, 0x70bd25, 0x25dfdbff, {{}, {0x0, 0x4108}, {0x4c, 0x18, {0x401, @media='udp\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x4040080) openat$snapshot(0xffffff9c, &(0x7f00000001c0), 0x8001, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) unshare(0x68060200) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 3m40.997336337s ago: executing program 34 (id=655): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000080), 0x10) syz_usb_connect$cdc_ecm(0x6, 0x4d, 0x0, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$sndseq(0xffffff9c, &(0x7f00000000c0), 0xc000) timerfd_create(0x1, 0x0) sendmsg$can_bcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r2}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x3, 0x2, 0x0, 0x0, "b68c52d2be3c0d90"}}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x6, 0xfffffe00) bind$inet6(r4, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @empty, 0xc}, 0x1c) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) close_range(r5, 0xffffffffffffffff, 0x0) 3m36.460816423s ago: executing program 2 (id=661): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000017c0), r1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x70bd2b, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7b, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000010c0)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x0, 0x0, 0x1e, 0x0, "61a1ed8439cde8054f2ada6fcd5fe76b933e8bb0ac60081e33dffa150835f7519d5f73b4f5d80eb4881a5b98cb9fb96d225d602392f816d0bdcc09b5063087117502d8c24f1fe97f61fd27a06d6a38a7"}, 0xd8) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001840)={0x48, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x44004) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x149800, 0x0) 3m33.630205823s ago: executing program 4 (id=662): syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x1a1300) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = syz_io_uring_setup(0x239, &(0x7f00000002c0)={0x0, 0x4533, 0x10100}, &(0x7f0000000180), &(0x7f0000000340)) io_uring_enter(r1, 0x2ded, 0x4000, 0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x58) 3m31.351494152s ago: executing program 2 (id=663): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000900)=[@in={0x2, 0x4e23, @loopback}], 0x10) sendto$inet6(r0, &(0x7f00000000c0)='\x00', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x8, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x8, 0x4) recvmmsg(r0, &(0x7f0000003b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20010061, 0x0) 3m28.381833202s ago: executing program 4 (id=664): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/79, 0x4f, 0x7f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000040), 0xc) r3 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r3, &(0x7f0000000040)={0x2a, 0x1, 0x4000}, 0xc) ioctl$sock_qrtr_TIOCINQ(r2, 0x541b, 0x0) writev(r3, &(0x7f0000000680)=[{&(0x7f0000000080)='~', 0x1}], 0x1) 3m24.601291243s ago: executing program 2 (id=665): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$rfkill(0xffffffffffffff9c, 0x0, 0x801, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x6, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="280500003d0007010000000000000000017c0000040000000c00018006000600800a000004"], 0x528}}, 0xc000) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x68, r5, 0x1, 0x70bd25, 0x25dfdbff, {{}, {0x0, 0x4108}, {0x4c, 0x18, {0x401, @media='udp\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x4040080) openat$snapshot(0xffffff9c, &(0x7f00000001c0), 0x8001, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) unshare(0x68060200) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 3m16.54094617s ago: executing program 2 (id=666): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) syz_usb_connect$cdc_ecm(0x6, 0x4d, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "f8ca44dfaa00"}}, 0x48}, 0x1, 0x0, 0x0, 0x48850}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$sndseq(0xffffff9c, &(0x7f00000000c0), 0xc000) timerfd_create(0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x3, 0x2, 0x0, 0x0, "b68c52d2be3c0d90"}}, 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x6, 0xfffffe00) bind$inet6(r3, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @empty, 0xc}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r1, {0x10, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) close_range(r4, 0xffffffffffffffff, 0x0) 3m15.505281827s ago: executing program 4 (id=667): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfd, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./control\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./control\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x281, 0x0, 0x12, 0x14, 0x20, "95ad4489a25673b5a955f5f736ef1f1c033d36c0ee69107626f72875ceb9332cb79ea25534348f613b34a61a895ec716fbdbbfe992a25b1f2a25f36b0fad5d99", "4a1982d41c7c4e8f704adce76f19e1f6b54de1571daea73904d4af73e6f9d403919e5f74b51629df746181d1ffbfcd1d5b56e8615f129d343b1aec97cbd8d551", "1b5a0325815abc1c406400", [0x0, 0x7]}) 3m4.820950909s ago: executing program 4 (id=668): socket$inet_mptcp(0x2, 0x1, 0x106) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) listen(0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(&(0x7f0000000500)=[{r1}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0xc0010) 2m58.092946978s ago: executing program 35 (id=666): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) syz_usb_connect$cdc_ecm(0x6, 0x4d, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "f8ca44dfaa00"}}, 0x48}, 0x1, 0x0, 0x0, 0x48850}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$sndseq(0xffffff9c, &(0x7f00000000c0), 0xc000) timerfd_create(0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x3, 0x2, 0x0, 0x0, "b68c52d2be3c0d90"}}, 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x6, 0xfffffe00) bind$inet6(r3, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @empty, 0xc}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r1, {0x10, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) close_range(r4, 0xffffffffffffffff, 0x0) 2m48.097223688s ago: executing program 36 (id=668): socket$inet_mptcp(0x2, 0x1, 0x106) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) listen(0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(&(0x7f0000000500)=[{r1}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0xc0010) 9.193241669s ago: executing program 7 (id=660): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001000070100f821200100000000325b38", @ANYRES32=0x0, @ANYBLOB="020000000080000008001b00000000000500100004"], 0x30}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x905, 0x0, 0x0, {0x0, 0x0, 0x4c}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0xffffa888}, 0x0) 8.861403544s ago: executing program 7 (id=671): syz_emit_ethernet(0x2a, &(0x7f0000000780)=ANY=[@ANYBLOB="ffffffffffff05009211d49c08004500001c00000000008890780a010101ffffffff110090780000007e66d3f48d06c8a521090f1e2c0ac05a049d66efc9aa8a39ddf2380b63616838fbac65d79c600b9d8a5fa1a582c09da56cd6d315b33ccd1876e7d1e0e45b829fece7765c75e5eded72bc6071a39ee0e42b5e31f2e36efc63fd441b7afba2ea01450d6c2236c5fa8f0401000100d6ce598f870aafce3996a76a90ad12e2216de59f717067b22ed55bb5e4849280cd4ab2569aca208cff8ae3f6a5"], 0x0) quotactl$Q_GETQUOTA(0xffffffff80000702, &(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x10, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="da2261875f58323cf5704ca92bdcc7e39a892ad9ce2e9482b397d74faa777043c79850203e844203a9e244"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) getpid() r0 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r0, r0}, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010300000000000000000100fffd0900010073797a300000000040000000030a01020000000000000000010000000900030073797a3200000000140004800800024032658aeb08000140000000010900010073797a300000000044000000060a010400000000000001040100000008000b40000000000900010073797a30000000001c000480180001800d00010073796e70726f7879000000000400028014000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000000280)={0x10, 0x0, 0x1, 0x2ffffffff}, 0xc) r5 = socket$inet(0x2, 0x2, 0x1) bind$inet(r5, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r5, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb58", 0x6}], 0x2}, 0x0) 8.549306787s ago: executing program 8 (id=669): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$rfkill(0xffffffffffffff9c, 0x0, 0x801, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x6, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="280500003d0007010000000000000000017c0000040000000c00018006000600800a000004"], 0x528}}, 0xc000) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x68, r6, 0x1, 0x70bd25, 0x25dfdbff, {{}, {0x0, 0x4108}, {0x4c, 0x18, {0x401, @media='udp\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x4040080) openat$snapshot(0xffffff9c, &(0x7f00000001c0), 0x8001, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) unshare(0x68060200) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 6.701883313s ago: executing program 5 (id=678): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x138) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x40000000000}, 0x18) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ae4885, 0x0, 0x1e, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) umount2(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r2 = socket(0x10, 0x80002, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f0000000080)={[{@usrquota}, {@noblock_validity}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@debug}, {@inlinecrypt}]}, 0x6, 0x5fd, &(0x7f0000000600)="$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") fstat(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000340)=@loop={'/dev/loop', 0x0}, r4, &(0x7f0000000080)={0x805, 0x80000d05, 0x2e1f, 0x7fffffff, 0x40000007, 0x0, 0x2000000000000000, 0xd402, 0xaa4}) getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000005400), &(0x7f0000005440)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(0x0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000005300)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r5, @ANYBLOB="040002000000000008000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="48000622cbce4e7a1fb6399b81decd617f239e360db8e430ece32d6c825040aff0034fbc3ecc58349ccf5b1b7d002c7ab915bd55cc6d74ad67b337e6da4d0ca70e28f56f48f9129e350028144a4a2de56eec6ddaf0cd7322259e4d6707904ad911ee5e99d9a62233e8605bd61e1cf367f605a3e8111f0d465623362515ab7747c939aee54374", @ANYRES32=r6, @ANYBLOB="10000300000000002000040000000000"], 0x44, 0x1) socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="300000001900010000000000000000001c140000fe00000100000000140016"], 0x30}}, 0x0) 6.335537531s ago: executing program 9 (id=679): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x0, 0x0, 0x0) 6.300019203s ago: executing program 7 (id=681): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfd, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./control\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./control\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x2) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x281, 0x0, 0x12, 0x14, 0x20, "95ad4489a25673b5a955f5f736ef1f1c033d36c0ee69107626f72875ceb9332cb79ea25534348f613b34a61a895ec716fbdbbfe992a25b1f2a25f36b0fad5d99", "4a1982d41c7c4e8f704adce76f19e1f6b54de1571daea73904d4af73e6f9d403919e5f74b51629df746181d1ffbfcd1d5b56e8615f129d343b1aec97cbd8d551", "1b5a0325815abc1c406400", [0x0, 0x7]}) 5.163721598s ago: executing program 9 (id=682): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="19000000040000000800000008", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000340)=0x0, &(0x7f0000000540)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000006740)=[0xffffffffffffffff], 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x9, 0x0, 0xffffffff}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0xda72ed5a9dc29567, 0x2000) msgsnd(r3, &(0x7f00000006c0)=ANY=[], 0x8, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000200)=0x400, 0x9e3b, 0x1) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000240)={0x0, 0xffac, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}}, 0x0) 4.982868071s ago: executing program 5 (id=683): socket$nl_sock_diag(0x10, 0x3, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$igmp(0x2, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="6c0000001000010400d201000072f60000020000", @ANYRES32=r0, @ANYBLOB="0524060000000000300012800b0001006272696467650000200002800c002e00fffff6ffffffffff050007001f000000060027"], 0x6c}}, 0x840) 4.58692507s ago: executing program 7 (id=684): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$rfkill(0xffffffffffffff9c, 0x0, 0x801, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x6, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="280500003d0007010000000000000000017c0000040000000c00018006000600800a000004"], 0x528}}, 0xc000) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x68, r5, 0x1, 0x70bd25, 0x25dfdbff, {{}, {0x0, 0x4108}, {0x4c, 0x18, {0x401, @media='udp\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x4040080) openat$snapshot(0xffffff9c, &(0x7f00000001c0), 0x8001, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) unshare(0x68060200) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 4.374886986s ago: executing program 8 (id=685): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4006000}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0a000000010000000900000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000380)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0x0, '.\x00'}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='mm_page_alloc\x00'}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 4.262764215s ago: executing program 5 (id=686): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 4.193718169s ago: executing program 9 (id=687): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r3, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = gettid() r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="44000000020605000000000000000000000000000c000300686173683a69700005000400000000000900020073797a31001000000500050002000000050001000600"], 0x44}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$IPSET_CMD_ADD(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0xf9efffff, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$TCSETSF(r8, 0x5404, &(0x7f0000000000)={0xc3, 0x28000, 0xe21c, 0x200000, 0xfd, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r5}, 0x10) mount$9p_rdma(0x0, &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, &(0x7f0000000080)=ANY=[]) write(r4, &(0x7f00000001c0)="dfc00ffe2a387f8b88f9465954818532d70e2698b6a2c51caf22d4f1f1dff163f697a5498ab3467201da3221bae4c36daef7e5f463ccd686398c1c03ccb2e146846b7aa6965427803d3843a56506688ad2c2e4c2aeef4c053a06714ea8f4610aea5a4d0920852b6e705111b507d52250c565359ae5e7a256e4f0fdb156319e4ed37d1cb3c2148e67369455946b3409208eb68e1868d58d2374a6c02285c6c9bbe9fafc82303791b89193245bca316af807c3743bb17ee7fb449f33512bbeac43bb21021556ef0f7833f6faedab784df8b8bcd02573f1d9f0a1d15b620377b4", 0xdf) setreuid(0xee01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x0, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 4.18356078s ago: executing program 8 (id=688): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000050d45882606f0913a3b412dcda5c5bc2f8a2a6ee0f3a50d33e4803895981d8a431aec8d2efa99af4c0ecac553a84b9d5ceb3c681df7b77839bb0c0843377c275c854e9726cc9c123d333297e2131a33fb3610d7d157066e1681e69fc62b8130282bc0ec02efb69fb47c716f5dfd80e00800000000000aee61dd0144196eb"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00'], 0x48) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000a80)=ANY=[@ANYBLOB="92b20f0005000000184a0000faffffff00000000000000000196d9030100000018190000", @ANYRES32=r2, @ANYBLOB="67040cf9a2d647b29270fcf781476c8985d27b817e1136aa864b00000000000000000d2bffff100000000c705000f0ffffff185900000000000000000000000000004022060008000000"], &(0x7f0000000680)='GPL\x00', 0x6, 0xb7, &(0x7f00000006c0)=""/183, 0x41100, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0xc, 0x7fffffff, 0x6}, 0x10, 0x2f3b1, r1, 0x2, &(0x7f00000007c0)=[r2, r2, r2, r2, r2, r2, r2], &(0x7f0000000800)=[{0x0, 0x5, 0xf, 0x5}, {0x3, 0x1, 0x0, 0x5}], 0x10, 0x20, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r3}, &(0x7f00000005c0), &(0x7f0000000900)=r4}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000780), 0x4, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x358, 0x25, 0x148, 0x0, 0x60, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0xffffff00, 0x0, 'macvtap0\x00', 'wg1\x00', {}, {}, 0x2, 0x1, 0x10}, 0x0, 0x2f8, 0x358, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x4, [0x1, 0x6, 0x4, 0x4, 0x1, 0x2], 0x6, 0x6}, {0x1, [0x5, 0x3, 0x2, 0x1, 0x1, 0x1], 0x6, 0x5}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x2}}, @common=@unspec=@connlabel={{0x28}, {0x62f, 0x2}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x538) 4.013124633s ago: executing program 8 (id=689): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x10000, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, 0x0, 0x4040) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x344, 0x10122, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick=0x1000000, {}, {}, @raw32={[0x2600]}}], 0xffc8) 3.553243617s ago: executing program 5 (id=690): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfd, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./control\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./control\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x281, 0x0, 0x12, 0x14, 0x20, "95ad4489a25673b5a955f5f736ef1f1c033d36c0ee69107626f72875ceb9332cb79ea25534348f613b34a61a895ec716fbdbbfe992a25b1f2a25f36b0fad5d99", "4a1982d41c7c4e8f704adce76f19e1f6b54de1571daea73904d4af73e6f9d403919e5f74b51629df746181d1ffbfcd1d5b56e8615f129d343b1aec97cbd8d551", "1b5a0325815abc1c406400", [0x0, 0x7]}) 3.352340572s ago: executing program 8 (id=691): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0xbed}, 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) 2.851994019s ago: executing program 7 (id=692): r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(0x0, r1) getsockname$packet(r1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000d00)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r4, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x4, 0x2, 0x0, 0x0, 0x7, 0x8}, {0x12, 0x3, 0x0, 0x401, 0x8001, 0x400}, 0xa5, 0x4, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) socket$packet(0x11, 0x2, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x705, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x1, 0xfff1}, {0x10, 0x8}, {0x4, 0x7}}}, 0x24}, 0x1, 0x0, 0x0, 0x4c88b}, 0x0) 2.722247059s ago: executing program 8 (id=693): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000080), 0x10) syz_usb_connect$cdc_ecm(0x6, 0x4d, 0x0, 0x0) sendmsg$can_bcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x48850}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$sndseq(0xffffff9c, &(0x7f00000000c0), 0xc000) timerfd_create(0x1, 0x0) sendmsg$can_bcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r2}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x3, 0x2, 0x0, 0x0, "b68c52d2be3c0d90"}}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x6, 0xfffffe00) bind$inet6(r4, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @empty, 0xc}, 0x1c) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) close_range(r5, 0xffffffffffffffff, 0x0) 2.560571331s ago: executing program 9 (id=694): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x25dfdbfd, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./control\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./control\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x281, 0x0, 0x12, 0x14, 0x20, "95ad4489a25673b5a955f5f736ef1f1c033d36c0ee69107626f72875ceb9332cb79ea25534348f613b34a61a895ec716fbdbbfe992a25b1f2a25f36b0fad5d99", "4a1982d41c7c4e8f704adce76f19e1f6b54de1571daea73904d4af73e6f9d403919e5f74b51629df746181d1ffbfcd1d5b56e8615f129d343b1aec97cbd8d551", "1b5a0325815abc1c406400", [0x0, 0x7]}) 1.846579393s ago: executing program 5 (id=696): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$rfkill(0xffffffffffffff9c, 0x0, 0x801, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x6, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="280500003d0007010000000000000000017c0000040000000c00018006000600800a000004"], 0x528}}, 0xc000) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x68, r6, 0x1, 0x70bd25, 0x25dfdbff, {{}, {0x0, 0x4108}, {0x4c, 0x18, {0x401, @media='udp\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x4040080) openat$snapshot(0xffffff9c, &(0x7f00000001c0), 0x8001, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) unshare(0x68060200) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 1.111926578s ago: executing program 9 (id=698): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000240), &(0x7f00000003c0)=r3}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x2e, &(0x7f0000000040)={@random="6ea88d319b8c", @random, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x43, 0x4e24, 0x8}}}}}, 0x0) 932.952001ms ago: executing program 9 (id=699): socket$inet6_sctp(0xa, 0x5, 0x84) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) sendto$packet(r4, &(0x7f0000000080)="020000ffffffba000040000086dd", 0xe, 0x0, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="6d6eb1f60783"}, 0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c000000130001000000000000edfc05b2000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) r6 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000080)={'dummy0\x00'}) 923.481262ms ago: executing program 7 (id=700): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000f00)=ANY=[@ANYBLOB="0002020100000008ff"], 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000b80)={0x1, {{0xa, 0x3, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x4e22, 0x4, @local, 0x40}}, {{0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fff}}]}, 0x190) add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="ae", 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0xbed}, 0x18) r5 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r5, &(0x7f0000000000)=ANY=[], 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x20, 0x3fa, 0x400, 0x70bd2c, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4004}, 0x24000000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 735.819216ms ago: executing program 6 (id=701): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0xbed}, 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) 681.11381ms ago: executing program 6 (id=702): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="19000000040000000800000008", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000340)=0x0, &(0x7f0000000540)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000006740)=[0xffffffffffffffff], 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x9, 0x0, 0xffffffff}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0xda72ed5a9dc29567, 0x2000) msgsnd(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="03000a00000000004ec6967266b644e7041c8ac15d4988d6c1a5d56f968fb34b56bb3e954d35a582bafe60c07714e72b33e9d2f4f6a0e97a7f15fec11c348aacedfc580676e9a97925c0cdf7cb8e9c2e0dcb3e11335d03f92e2e230d366770505e639bb045e07055a876b6923c0a2131a24d57d0d70c2c29b29ee316c8c5c6268dc107118950fa18e6e4d1a1319d53c05f5f6d59aba832871961df798676154bc438492aa9ab1062b6d851a391399a5d0c0a6b62876b9fb02de3e24658b109249f4ebcb7d447104c62304e3b5a9cdb4eb45d590e1b83ec7c8bfedff1af8f5c846a326a4daf943fb36f"], 0x8, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x30, 0x0, 0x3196aee33d918dfd, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d6163"], 0x5c}}, 0x40000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000200)=0x400, 0x9e3b, 0x1) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000240)={0x0, 0xffac, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}}, 0x0) 583.111207ms ago: executing program 6 (id=703): syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa"], 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = memfd_create(&(0x7f00000001c0)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9kL\xa2\xd28\xd6\x06\a\x0e\xfc\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb80xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r3, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x1, {0x84, 0x0, 0x3}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = gettid() r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="44000000020605000000000000000000000000000c000300686173683a69700005000400000000000900020073797a31001000000500050002000000050001000600"], 0x44}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$IPSET_CMD_ADD(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0xf9efffff, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$TCSETSF(r8, 0x5404, &(0x7f0000000000)={0xc3, 0x28000, 0xe21c, 0x200000, 0xfd, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r5}, 0x10) mount$9p_rdma(0x0, &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, &(0x7f0000000080)=ANY=[]) write(r4, &(0x7f00000001c0)="dfc00ffe2a387f8b88f9465954818532d70e2698b6a2c51caf22d4f1f1dff163f697a5498ab3467201da3221bae4c36daef7e5f463ccd686398c1c03ccb2e146846b7aa6965427803d3843a56506688ad2c2e4c2aeef4c053a06714ea8f4610aea5a4d0920852b6e705111b507d52250c565359ae5e7a256e4f0fdb156319e4ed37d1cb3c2148e67369455946b3409208eb68e1868d58d2374a6c02285c6c9bbe9fafc82303791b89193245bca316af807c3743bb17ee7fb449f33512bbeac43bb21021556ef0f7833f6faedab784df8b8bcd02573f1d9f0a1d15b620377b4", 0xdf) setreuid(0xee01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x0, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 124.674071ms ago: executing program 6 (id=705): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4622, @loopback}, 0x10) 90.446094ms ago: executing program 6 (id=706): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x10) close(r0) r1 = socket(0x1d, 0x2, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@can_newroute={0x3c, 0x18, 0x1, 0x0, 0x25dfdbfd, {0x1d, 0x1, 0x2}, [@CGW_DST_IF={0x8, 0xa, r5}, @CGW_SRC_IF={0x8, 0x9, r6}, @CGW_MOD_SET={0x15, 0x4, {{{0x3}, 0x0, 0x3, 0x0, 0x0, "4505a8b9e859abc0"}, 0x1}}]}, 0x3c}}, 0x0) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r3, 0x3}, 0x18) sendmmsg$inet(r1, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)="d1", 0x1}], 0x1}}], 0x1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) io_submit(r7, 0x1, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080)="7f", 0x1}]) 0s ago: executing program 5 (id=707): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x10) close(r0) r1 = socket(0x1d, 0x2, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r3, 0x3}, 0x18) sendmmsg$inet(r1, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)="d1", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) kernel console output (not intermixed with test programs): [ 21.519522][ T29] audit: type=1400 audit(1739748577.308:81): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.10' (ED25519) to the list of known hosts. [ 26.393291][ T29] audit: type=1400 audit(1739748582.178:82): avc: denied { mounton } for pid=3286 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.394316][ T3286] cgroup: Unknown subsys name 'net' [ 26.416028][ T29] audit: type=1400 audit(1739748582.178:83): avc: denied { mount } for pid=3286 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.443420][ T29] audit: type=1400 audit(1739748582.208:84): avc: denied { unmount } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.596452][ T3286] cgroup: Unknown subsys name 'cpuset' [ 26.602652][ T3286] cgroup: Unknown subsys name 'rlimit' [ 26.713881][ T29] audit: type=1400 audit(1739748582.498:85): avc: denied { setattr } for pid=3286 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.737252][ T29] audit: type=1400 audit(1739748582.498:86): avc: denied { create } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.756731][ T3291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.757732][ T29] audit: type=1400 audit(1739748582.498:87): avc: denied { write } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.786765][ T29] audit: type=1400 audit(1739748582.498:88): avc: denied { read } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.807046][ T29] audit: type=1400 audit(1739748582.518:89): avc: denied { mounton } for pid=3286 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.820574][ T3286] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.831811][ T29] audit: type=1400 audit(1739748582.518:90): avc: denied { mount } for pid=3286 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.863813][ T29] audit: type=1400 audit(1739748582.558:91): avc: denied { relabelto } for pid=3291 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.936160][ T3297] chnl_net:caif_netlink_parms(): no params data found [ 27.964704][ T3299] chnl_net:caif_netlink_parms(): no params data found [ 28.038818][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 28.053870][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 28.101534][ T3297] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.108656][ T3297] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.115900][ T3297] bridge_slave_0: entered allmulticast mode [ 28.122360][ T3297] bridge_slave_0: entered promiscuous mode [ 28.138901][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.146028][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.153172][ T3299] bridge_slave_0: entered allmulticast mode [ 28.159618][ T3299] bridge_slave_0: entered promiscuous mode [ 28.172074][ T3297] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.179227][ T3297] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.186652][ T3297] bridge_slave_1: entered allmulticast mode [ 28.192982][ T3297] bridge_slave_1: entered promiscuous mode [ 28.203696][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.210810][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.218027][ T3299] bridge_slave_1: entered allmulticast mode [ 28.224491][ T3299] bridge_slave_1: entered promiscuous mode [ 28.252639][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.271332][ T3301] chnl_net:caif_netlink_parms(): no params data found [ 28.280664][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.290871][ T3297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.321734][ T3297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.343386][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.350555][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.357767][ T3308] bridge_slave_0: entered allmulticast mode [ 28.364162][ T3308] bridge_slave_0: entered promiscuous mode [ 28.371268][ T3299] team0: Port device team_slave_0 added [ 28.383034][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.390263][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.398512][ T3306] bridge_slave_0: entered allmulticast mode [ 28.404968][ T3306] bridge_slave_0: entered promiscuous mode [ 28.417995][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.425041][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.432311][ T3308] bridge_slave_1: entered allmulticast mode [ 28.438758][ T3308] bridge_slave_1: entered promiscuous mode [ 28.445770][ T3299] team0: Port device team_slave_1 added [ 28.457186][ T3297] team0: Port device team_slave_0 added [ 28.463034][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.470117][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.477398][ T3306] bridge_slave_1: entered allmulticast mode [ 28.483721][ T3306] bridge_slave_1: entered promiscuous mode [ 28.502070][ T3297] team0: Port device team_slave_1 added [ 28.534314][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.549529][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.558989][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.566029][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.591951][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.603118][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.610112][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.636111][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.652924][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.666651][ T3301] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.673747][ T3301] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.680914][ T3301] bridge_slave_0: entered allmulticast mode [ 28.687353][ T3301] bridge_slave_0: entered promiscuous mode [ 28.694687][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.703800][ T3301] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.710953][ T3301] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.718122][ T3301] bridge_slave_1: entered allmulticast mode [ 28.724574][ T3301] bridge_slave_1: entered promiscuous mode [ 28.733741][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.740767][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.766824][ T3297] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.800874][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.807863][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.833816][ T3297] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.845179][ T3306] team0: Port device team_slave_0 added [ 28.851630][ T3306] team0: Port device team_slave_1 added [ 28.863468][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.872997][ T3308] team0: Port device team_slave_0 added [ 28.891370][ T3308] team0: Port device team_slave_1 added [ 28.906576][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.926998][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.934010][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.959925][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.977571][ T3299] hsr_slave_0: entered promiscuous mode [ 28.983785][ T3299] hsr_slave_1: entered promiscuous mode [ 28.999486][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.006623][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.032548][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.053840][ T3301] team0: Port device team_slave_0 added [ 29.066671][ T3297] hsr_slave_0: entered promiscuous mode [ 29.072856][ T3297] hsr_slave_1: entered promiscuous mode [ 29.078675][ T3297] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.086277][ T3297] Cannot create hsr debugfs directory [ 29.094421][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.101499][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.127532][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.139045][ T3301] team0: Port device team_slave_1 added [ 29.156905][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.163886][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.189841][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.235839][ T3306] hsr_slave_0: entered promiscuous mode [ 29.241905][ T3306] hsr_slave_1: entered promiscuous mode [ 29.247950][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.255608][ T3306] Cannot create hsr debugfs directory [ 29.261286][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.268306][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.294336][ T3301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.325454][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.332656][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.358737][ T3301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.409051][ T3308] hsr_slave_0: entered promiscuous mode [ 29.415034][ T3308] hsr_slave_1: entered promiscuous mode [ 29.420890][ T3308] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.428507][ T3308] Cannot create hsr debugfs directory [ 29.474979][ T3301] hsr_slave_0: entered promiscuous mode [ 29.480992][ T3301] hsr_slave_1: entered promiscuous mode [ 29.486843][ T3301] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.494394][ T3301] Cannot create hsr debugfs directory [ 29.562320][ T3299] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.584561][ T3299] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.595264][ T3299] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.616185][ T3299] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.645271][ T3297] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.654147][ T3297] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.665492][ T3297] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.686325][ T3297] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.714791][ T3306] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.731601][ T3308] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.741202][ T3308] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.751523][ T3306] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.760286][ T3308] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.769372][ T3308] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.782359][ T3306] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.801832][ T3306] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.827719][ T3301] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.836619][ T3301] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.850200][ T3301] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.859926][ T3301] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.874426][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.905938][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.929503][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.936725][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.949265][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.956409][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.968538][ T3297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.015464][ T3297] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.029099][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.044605][ T38] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.051715][ T38] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.068999][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.079986][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.088771][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.095855][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.113648][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.124800][ T38] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.131894][ T38] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.148081][ T3301] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.161081][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.170930][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.178042][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.188347][ T38] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.195420][ T38] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.204126][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.211207][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.240043][ T3308] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.250571][ T3308] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.264900][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.274094][ T3297] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.298264][ T3301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.328228][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.335389][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.344569][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.351778][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.372302][ T3306] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.382819][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.417949][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.440749][ T3297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.492898][ T3301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.528037][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.578565][ T3297] veth0_vlan: entered promiscuous mode [ 30.616471][ T3301] veth0_vlan: entered promiscuous mode [ 30.631689][ T3308] veth0_vlan: entered promiscuous mode [ 30.640799][ T3297] veth1_vlan: entered promiscuous mode [ 30.655461][ T3301] veth1_vlan: entered promiscuous mode [ 30.663547][ T3299] veth0_vlan: entered promiscuous mode [ 30.671385][ T3308] veth1_vlan: entered promiscuous mode [ 30.687580][ T3299] veth1_vlan: entered promiscuous mode [ 30.702843][ T3297] veth0_macvtap: entered promiscuous mode [ 30.712494][ T3306] veth0_vlan: entered promiscuous mode [ 30.719566][ T3297] veth1_macvtap: entered promiscuous mode [ 30.731191][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.741679][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.750310][ T3297] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.759205][ T3297] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.767966][ T3297] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.776754][ T3297] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.793492][ T3306] veth1_vlan: entered promiscuous mode [ 30.800816][ T3301] veth0_macvtap: entered promiscuous mode [ 30.818864][ T3301] veth1_macvtap: entered promiscuous mode [ 30.831579][ T3299] veth0_macvtap: entered promiscuous mode [ 30.841623][ T3308] veth0_macvtap: entered promiscuous mode [ 30.849570][ T3308] veth1_macvtap: entered promiscuous mode [ 30.858323][ T3297] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.864355][ T3299] veth1_macvtap: entered promiscuous mode [ 30.880917][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.891520][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.902616][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.913918][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.924529][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.934426][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.944958][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.957148][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.972662][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.983232][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.994886][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.005397][ T3306] veth0_macvtap: entered promiscuous mode [ 31.017754][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.028291][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.038155][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.048654][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.061984][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.069800][ T3301] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.078580][ T3301] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.087313][ T3301] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.096051][ T3301] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.108817][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.119344][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.129324][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.139891][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.149781][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.160255][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.176024][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.186606][ T3306] veth1_macvtap: entered promiscuous mode [ 31.203841][ T3308] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.212882][ T3308] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.221623][ T3308] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.230461][ T3308] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.245347][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.255883][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.265823][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.276421][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.286349][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.296830][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.308148][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.332743][ T3299] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.341662][ T3299] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.350408][ T3299] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.359310][ T3299] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.376349][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.386931][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.396838][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.407342][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.417415][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.427969][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.437889][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.448430][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.467163][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.500203][ T3443] Zero length message leads to an empty skb [ 31.527147][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.537795][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.547726][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.558265][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.568204][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.578842][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.588840][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.599355][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.611984][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.750335][ T3306] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.759147][ T3306] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.767877][ T3306] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.776601][ T3306] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.940762][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 31.940780][ T29] audit: type=1400 audit(1739748587.728:130): avc: denied { create } for pid=3451 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.170479][ T29] audit: type=1400 audit(1739748587.758:131): avc: denied { read } for pid=3449 comm="syz.1.2" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 32.192933][ T29] audit: type=1400 audit(1739748587.758:132): avc: denied { open } for pid=3449 comm="syz.1.2" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 32.216337][ T29] audit: type=1400 audit(1739748587.758:133): avc: denied { create } for pid=3449 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.235686][ T29] audit: type=1400 audit(1739748587.778:134): avc: denied { bind } for pid=3451 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.254672][ T29] audit: type=1400 audit(1739748587.778:135): avc: denied { name_bind } for pid=3451 comm="syz.4.5" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 32.275172][ T29] audit: type=1400 audit(1739748587.778:136): avc: denied { node_bind } for pid=3451 comm="syz.4.5" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 [ 32.295789][ T29] audit: type=1400 audit(1739748587.788:137): avc: denied { listen } for pid=3451 comm="syz.4.5" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.316044][ T29] audit: type=1400 audit(1739748587.788:138): avc: denied { connect } for pid=3451 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 32.335317][ T29] audit: type=1400 audit(1739748587.788:139): avc: denied { name_connect } for pid=3451 comm="syz.4.5" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 32.509039][ T3469] batman_adv: batadv0: Adding interface: dummy0 [ 32.515334][ T3469] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.545436][ T3469] batman_adv: batadv0: Interface activated: dummy0 [ 32.559429][ T3469] batadv0: mtu less than device minimum [ 32.565611][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.576361][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.587257][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.597973][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.608773][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.619459][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.630116][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.640968][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.651722][ T3469] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 32.667922][ T3471] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 32.675343][ T3471] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 32.696432][ T3471] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 32.703886][ T3471] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 32.895890][ T3480] netlink: 36 bytes leftover after parsing attributes in process `syz.2.13'. [ 33.108509][ T3486] bridge0: port 3(syz_tun) entered blocking state [ 33.115040][ T3486] bridge0: port 3(syz_tun) entered disabled state [ 33.123804][ T3486] syz_tun: entered allmulticast mode [ 33.145454][ T3486] syz_tun: entered promiscuous mode [ 33.152524][ T3486] bridge0: port 3(syz_tun) entered blocking state [ 33.159082][ T3486] bridge0: port 3(syz_tun) entered forwarding state [ 33.588493][ T3505] 9pnet_fd: Insufficient options for proto=fd [ 33.685480][ T3507] bridge0: port 3(syz_tun) entered blocking state [ 33.692202][ T3507] bridge0: port 3(syz_tun) entered disabled state [ 33.699080][ T3507] syz_tun: entered allmulticast mode [ 33.712920][ T3507] syz_tun: entered promiscuous mode [ 33.718614][ T3507] bridge0: port 3(syz_tun) entered blocking state [ 33.725112][ T3507] bridge0: port 3(syz_tun) entered forwarding state [ 34.320261][ T3517] syz.0.29 (3517) used greatest stack depth: 10928 bytes left [ 34.429765][ T3538] 9pnet_fd: Insufficient options for proto=fd [ 34.509450][ T3531] syz.1.32 (3531) used greatest stack depth: 10880 bytes left [ 35.298821][ T3574] netlink: 16 bytes leftover after parsing attributes in process `syz.3.48'. [ 35.308568][ T3575] 9pnet_fd: Insufficient options for proto=fd [ 36.003232][ T3615] netlink: 16 bytes leftover after parsing attributes in process `syz.2.65'. [ 36.596927][ T3637] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 36.604423][ T3637] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 36.674701][ T3637] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 36.682188][ T3637] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 37.230449][ T29] kauditd_printk_skb: 355 callbacks suppressed [ 37.230466][ T29] audit: type=1326 audit(1739748593.018:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3659 comm="syz.2.82" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f64763acde9 code=0x0 [ 37.284894][ T3665] batman_adv: batadv0: Adding interface: dummy0 [ 37.291381][ T3665] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.317610][ T3665] batman_adv: batadv0: Interface activated: dummy0 [ 37.371106][ T29] audit: type=1326 audit(1739748593.118:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.394415][ T29] audit: type=1326 audit(1739748593.118:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.417865][ T29] audit: type=1326 audit(1739748593.118:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.441056][ T29] audit: type=1326 audit(1739748593.118:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.464403][ T29] audit: type=1326 audit(1739748593.118:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.487893][ T29] audit: type=1326 audit(1739748593.118:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.511333][ T29] audit: type=1326 audit(1739748593.118:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.534537][ T29] audit: type=1326 audit(1739748593.118:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 37.557899][ T29] audit: type=1326 audit(1739748593.118:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3661 comm="syz.0.83" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 38.240664][ T3703] netlink: 8 bytes leftover after parsing attributes in process `syz.1.98'. [ 38.712850][ T3710] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 38.720403][ T3710] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 38.734424][ T3710] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 38.742106][ T3710] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.160726][ T3728] veth3: entered promiscuous mode [ 40.686587][ T3754] netlink: 8 bytes leftover after parsing attributes in process `syz.4.116'. [ 40.935203][ T3765] netlink: 16 bytes leftover after parsing attributes in process `syz.3.118'. [ 42.061280][ T3792] netlink: 8 bytes leftover after parsing attributes in process `syz.2.126'. [ 42.317814][ T29] kauditd_printk_skb: 304 callbacks suppressed [ 42.317904][ T29] audit: type=1400 audit(1739748598.108:809): avc: denied { bind } for pid=3795 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 42.605149][ T29] audit: type=1326 audit(1739748598.388:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa84e1c3da7 code=0x7ffc0000 [ 42.679071][ T29] audit: type=1326 audit(1739748598.438:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa84e168fb9 code=0x7ffc0000 [ 42.702263][ T29] audit: type=1326 audit(1739748598.438:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa84e1c3da7 code=0x7ffc0000 [ 42.725431][ T29] audit: type=1326 audit(1739748598.438:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa84e168fb9 code=0x7ffc0000 [ 42.748721][ T29] audit: type=1326 audit(1739748598.438:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa84e1ccde9 code=0x7ffc0000 [ 42.772147][ T29] audit: type=1326 audit(1739748598.438:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa84e1ccde9 code=0x7ffc0000 [ 42.795417][ T29] audit: type=1326 audit(1739748598.448:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa84e1c3da7 code=0x7ffc0000 [ 42.818674][ T29] audit: type=1326 audit(1739748598.448:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa84e168fb9 code=0x7ffc0000 [ 42.841850][ T29] audit: type=1326 audit(1739748598.448:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3796 comm="syz.4.127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa84e1ccde9 code=0x7ffc0000 [ 42.932762][ T3824] netlink: 16 bytes leftover after parsing attributes in process `syz.4.136'. [ 43.123325][ T3819] veth5: entered promiscuous mode [ 45.501624][ T3893] veth3: entered promiscuous mode [ 48.178522][ T3996] netlink: 8 bytes leftover after parsing attributes in process `syz.4.200'. [ 48.282752][ T29] kauditd_printk_skb: 453 callbacks suppressed [ 48.282770][ T29] audit: type=1400 audit(1739748604.068:1272): avc: denied { bind } for pid=4000 comm="syz.3.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.348236][ T29] audit: type=1400 audit(1739748604.108:1273): avc: denied { listen } for pid=4000 comm="syz.3.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.367818][ T29] audit: type=1400 audit(1739748604.108:1274): avc: denied { write } for pid=4000 comm="syz.3.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.387265][ T29] audit: type=1400 audit(1739748604.108:1275): avc: denied { accept } for pid=4000 comm="syz.3.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.662125][ T4018] netlink: 'syz.1.210': attribute type 1 has an invalid length. [ 48.670098][ T4018] netlink: 1280 bytes leftover after parsing attributes in process `syz.1.210'. [ 48.906921][ T4022] random: crng reseeded on system resumption [ 49.306187][ T29] audit: type=1400 audit(1739748604.698:1276): avc: denied { write } for pid=4017 comm="syz.1.210" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 49.329328][ T29] audit: type=1400 audit(1739748604.698:1277): avc: denied { open } for pid=4017 comm="syz.1.210" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 49.519076][ T4017] syz.1.210 (4017) used greatest stack depth: 10304 bytes left [ 50.107468][ T4069] netlink: 4 bytes leftover after parsing attributes in process `syz.2.230'. [ 50.196254][ T29] audit: type=1400 audit(1739748605.878:1278): avc: denied { create } for pid=4068 comm="syz.2.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 50.215720][ T29] audit: type=1400 audit(1739748605.888:1279): avc: denied { connect } for pid=4068 comm="syz.2.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 50.235206][ T29] audit: type=1400 audit(1739748605.888:1280): avc: denied { write } for pid=4068 comm="syz.2.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 50.254509][ T29] audit: type=1400 audit(1739748605.888:1281): avc: denied { ioctl } for pid=4068 comm="syz.2.230" path="socket:[6324]" dev="sockfs" ino=6324 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 51.357252][ T4127] netlink: 16 bytes leftover after parsing attributes in process `syz.4.255'. [ 52.679499][ T4203] netlink: 'syz.4.289': attribute type 1 has an invalid length. [ 52.687562][ T4203] netlink: 1280 bytes leftover after parsing attributes in process `syz.4.289'. [ 52.925055][ T4222] random: crng reseeded on system resumption [ 54.499012][ T4289] netlink: 'syz.3.322': attribute type 1 has an invalid length. [ 54.507100][ T4289] netlink: 1280 bytes leftover after parsing attributes in process `syz.3.322'. [ 54.745692][ T4301] random: crng reseeded on system resumption [ 55.852732][ T29] audit: type=1400 audit(1739748611.628:1282): avc: denied { read } for pid=4374 comm="syz.3.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 56.096955][ T29] audit: type=1326 audit(1739748611.888:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.137825][ T29] audit: type=1326 audit(1739748611.908:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.161267][ T29] audit: type=1326 audit(1739748611.908:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.184672][ T29] audit: type=1326 audit(1739748611.908:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.208146][ T29] audit: type=1326 audit(1739748611.908:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.231527][ T29] audit: type=1326 audit(1739748611.908:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.255204][ T29] audit: type=1326 audit(1739748611.908:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.278600][ T29] audit: type=1326 audit(1739748611.908:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 56.301964][ T29] audit: type=1326 audit(1739748611.908:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.1.372" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66bdd3cde9 code=0x7ffc0000 [ 57.107372][ T4444] veth5: entered promiscuous mode [ 58.830581][ T3364] IPVS: starting estimator thread 0... [ 58.925623][ T4487] IPVS: using max 2304 ests per chain, 115200 per kthread [ 59.122615][ T4495] tipc: Started in network mode [ 59.127565][ T4495] tipc: Node identity ac1414aa, cluster identity 4711 [ 59.134929][ T4495] tipc: Enabled bearer , priority 10 [ 59.171156][ T4496] net_ratelimit: 10 callbacks suppressed [ 59.171173][ T4496] batadv0: mtu less than device minimum [ 59.183051][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.193926][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.204692][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.215455][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.226310][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.237242][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.248040][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.258872][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.269746][ T4496] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 59.759971][ T4510] process 'syz.1.408' launched '/dev/fd/3' with NULL argv: empty string added [ 60.125793][ T24] tipc: Node number set to 2886997162 [ 60.858495][ T29] kauditd_printk_skb: 490 callbacks suppressed [ 60.858514][ T29] audit: type=1326 audit(1739748616.648:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5a4c6d3da7 code=0x7ffc0000 [ 61.081098][ T29] audit: type=1326 audit(1739748616.678:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5a4c678fb9 code=0x7ffc0000 [ 61.104526][ T29] audit: type=1326 audit(1739748616.678:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5a4c6d3da7 code=0x7ffc0000 [ 61.128355][ T29] audit: type=1326 audit(1739748616.678:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5a4c678fb9 code=0x7ffc0000 [ 61.152064][ T29] audit: type=1326 audit(1739748616.678:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 61.175407][ T29] audit: type=1326 audit(1739748616.688:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5a4c6d3da7 code=0x7ffc0000 [ 61.198636][ T29] audit: type=1326 audit(1739748616.688:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5a4c678fb9 code=0x7ffc0000 [ 61.222015][ T29] audit: type=1326 audit(1739748616.688:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 61.245351][ T29] audit: type=1326 audit(1739748616.698:1790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5a4c6d3da7 code=0x7ffc0000 [ 61.268625][ T29] audit: type=1326 audit(1739748616.698:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4534 comm="syz.0.417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5a4c678fb9 code=0x7ffc0000 [ 66.911639][ T29] kauditd_printk_skb: 467 callbacks suppressed [ 66.911656][ T29] audit: type=1326 audit(1739748622.698:2259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4727 comm="syz.0.481" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f5a4c6dcde9 code=0x0 [ 68.510397][ T29] audit: type=1326 audit(1739748624.298:2260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4794 comm="syz.4.505" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa84e1ccde9 code=0x0 [ 69.029899][ T4810] netlink: 96 bytes leftover after parsing attributes in process `syz.0.507'. [ 69.476833][ T4818] netlink: 12 bytes leftover after parsing attributes in process `syz.1.509'. [ 70.868299][ T4856] netlink: 96 bytes leftover after parsing attributes in process `syz.0.520'. [ 70.916119][ T4863] netlink: 12 bytes leftover after parsing attributes in process `syz.2.523'. [ 70.950193][ T29] audit: type=1326 audit(1739748626.738:2261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.524" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa84e1ccde9 code=0x0 [ 72.227556][ T29] audit: type=1400 audit(1739748628.018:2262): avc: denied { bind } for pid=4893 comm="syz.2.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 72.246953][ T29] audit: type=1400 audit(1739748628.018:2263): avc: denied { read } for pid=4893 comm="syz.2.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 72.403061][ T4902] netlink: 12 bytes leftover after parsing attributes in process `syz.0.536'. [ 72.743743][ T4911] netlink: 96 bytes leftover after parsing attributes in process `syz.2.538'. [ 72.815096][ T29] audit: type=1326 audit(1739748628.598:2264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4918 comm="syz.4.543" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa84e1ccde9 code=0x0 [ 73.279225][ T4932] netlink: 44 bytes leftover after parsing attributes in process `syz.1.547'. [ 73.889351][ T4944] netlink: 96 bytes leftover after parsing attributes in process `syz.2.552'. [ 74.090797][ T29] audit: type=1400 audit(1739748629.798:2265): avc: denied { create } for pid=4951 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 74.110169][ T29] audit: type=1400 audit(1739748629.798:2266): avc: denied { write } for pid=4951 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 74.840032][ T4960] netlink: 44 bytes leftover after parsing attributes in process `syz.0.559'. [ 75.040221][ T29] audit: type=1326 audit(1739748630.828:2267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4964 comm="syz.4.561" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa84e1ccde9 code=0x0 [ 75.229844][ T4976] netlink: 96 bytes leftover after parsing attributes in process `syz.0.564'. [ 75.293580][ T29] audit: type=1400 audit(1739748631.078:2268): avc: denied { name_bind } for pid=4977 comm="syz.0.565" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 75.315371][ T29] audit: type=1400 audit(1739748631.078:2269): avc: denied { node_bind } for pid=4977 comm="syz.0.565" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 82.477434][ T5005] netlink: 96 bytes leftover after parsing attributes in process `syz.3.575'. [ 83.026262][ T5013] netlink: 44 bytes leftover after parsing attributes in process `syz.1.574'. [ 90.141665][ T29] audit: type=1326 audit(1739748645.538:2270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5021 comm="syz.4.582" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa84e1ccde9 code=0x0 [ 114.787773][ T5077] netlink: 8 bytes leftover after parsing attributes in process `syz.4.591'. [ 131.317811][ T5123] netlink: 64 bytes leftover after parsing attributes in process `syz.0.601'. [ 144.878505][ T5144] netlink: 8 bytes leftover after parsing attributes in process `syz.0.608'. [ 163.295325][ T29] audit: type=1326 audit(1739748719.048:2271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 163.321501][ T29] audit: type=1326 audit(1739748719.048:2272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 163.347654][ T29] audit: type=1326 audit(1739748719.048:2273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 163.373915][ T29] audit: type=1326 audit(1739748719.048:2274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 164.471255][ T29] audit: type=1326 audit(1739748719.388:2275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 164.497610][ T29] audit: type=1326 audit(1739748719.388:2276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 164.523857][ T29] audit: type=1326 audit(1739748719.598:2277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 164.550232][ T29] audit: type=1326 audit(1739748719.658:2278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 164.576470][ T29] audit: type=1326 audit(1739748719.658:2279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 164.602673][ T29] audit: type=1326 audit(1739748719.698:2280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5186 comm="syz.3.621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7eb32ccde9 code=0x7ffc0000 [ 170.290643][ T5206] netlink: 8 bytes leftover after parsing attributes in process `syz.0.625'. [ 182.380916][ T5231] netlink: 36 bytes leftover after parsing attributes in process `syz.4.632'. [ 182.392874][ T5231] netlink: 16 bytes leftover after parsing attributes in process `syz.4.632'. [ 186.617255][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 186.617273][ T29] audit: type=1326 audit(1739748742.248:2323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.660096][ T29] audit: type=1326 audit(1739748742.248:2324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.686557][ T29] audit: type=1326 audit(1739748742.248:2325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.716563][ T29] audit: type=1326 audit(1739748742.248:2326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.746641][ T29] audit: type=1326 audit(1739748742.338:2327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.776588][ T29] audit: type=1326 audit(1739748742.338:2328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.806576][ T29] audit: type=1326 audit(1739748742.338:2329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.833267][ T29] audit: type=1326 audit(1739748742.388:2330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.859793][ T29] audit: type=1326 audit(1739748742.388:2331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 186.886379][ T29] audit: type=1326 audit(1739748742.388:2332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a4c6dcde9 code=0x7ffc0000 [ 197.199953][ T5262] netlink: 'syz.3.641': attribute type 4 has an invalid length. [ 212.402745][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 212.402762][ T29] audit: type=1400 audit(1739748768.188:2377): avc: denied { create } for pid=5305 comm="syz.4.649" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 212.435847][ T29] audit: type=1400 audit(1739748768.188:2378): avc: denied { map } for pid=5305 comm="syz.4.649" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9619 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 212.462786][ T29] audit: type=1400 audit(1739748768.188:2379): avc: denied { read write } for pid=5305 comm="syz.4.649" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9619 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 215.778634][ T29] audit: type=1400 audit(1739748771.518:2380): avc: denied { mounton } for pid=5316 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 219.585793][ T29] audit: type=1400 audit(1739748774.888:2381): avc: denied { watch watch_reads } for pid=5321 comm="syz.4.653" path="/126" dev="tmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 220.427133][ T5263] bridge0: port 3(syz_tun) entered disabled state [ 225.717359][ T5324] netlink: 4 bytes leftover after parsing attributes in process `syz.0.655'. [ 226.796983][ T5263] syz_tun (unregistering): left allmulticast mode [ 226.809412][ T5263] syz_tun (unregistering): left promiscuous mode [ 226.821620][ T5263] bridge0: port 3(syz_tun) entered disabled state [ 235.147566][ T5138] IPVS: starting estimator thread 0... [ 235.816569][ T5348] IPVS: using max 2256 ests per chain, 112800 per kthread [ 237.696832][ T5353] netlink: 'syz.4.659': attribute type 1 has an invalid length. [ 237.704508][ T5353] netlink: 1280 bytes leftover after parsing attributes in process `syz.4.659'. [ 247.010499][ T5000] kernel read not supported for file /vcsa1 (pid: 5000 comm: kworker/0:7) [ 255.676713][ T5378] netlink: 'syz.2.665': attribute type 1 has an invalid length. [ 255.684444][ T5378] netlink: 1280 bytes leftover after parsing attributes in process `syz.2.665'. [ 257.058350][ T5380] random: crng reseeded on system resumption [ 257.796550][ T29] audit: type=1400 audit(1739748813.498:2382): avc: denied { create } for pid=5375 comm="syz.4.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 257.887194][ T29] audit: type=1400 audit(1739748813.658:2383): avc: denied { connect } for pid=5375 comm="syz.4.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 258.318068][ T29] audit: type=1400 audit(1739748814.098:2384): avc: denied { write } for pid=5375 comm="syz.4.664" path="socket:[9703]" dev="sockfs" ino=9703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 268.215690][ T5403] netlink: 4 bytes leftover after parsing attributes in process `syz.2.666'. [ 305.488138][ T3308] bridge0: port 3(syz_tun) entered disabled state [ 307.418128][ T3308] syz_tun (unregistering): left allmulticast mode [ 307.430456][ T3308] syz_tun (unregistering): left promiscuous mode [ 307.442537][ T3308] bridge0: port 3(syz_tun) entered disabled state [ 441.057302][ T385] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.152979][ T385] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.278607][ T385] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.297582][ T5527] chnl_net:caif_netlink_parms(): no params data found [ 441.348106][ T385] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.388806][ T5523] chnl_net:caif_netlink_parms(): no params data found [ 441.401180][ T5515] chnl_net:caif_netlink_parms(): no params data found [ 441.425979][ T5499] chnl_net:caif_netlink_parms(): no params data found [ 441.453472][ T5511] chnl_net:caif_netlink_parms(): no params data found [ 441.482409][ T5527] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.489537][ T5527] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.496968][ T5527] bridge_slave_0: entered allmulticast mode [ 441.503416][ T5527] bridge_slave_0: entered promiscuous mode [ 441.512159][ T5527] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.519252][ T5527] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.526419][ T5527] bridge_slave_1: entered allmulticast mode [ 441.532860][ T5527] bridge_slave_1: entered promiscuous mode [ 441.592768][ T5527] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 441.640341][ T5527] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 441.681442][ T385] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.697640][ T5515] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.704684][ T5515] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.711932][ T5515] bridge_slave_0: entered allmulticast mode [ 441.718618][ T5515] bridge_slave_0: entered promiscuous mode [ 441.730334][ T5523] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.737449][ T5523] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.744603][ T5523] bridge_slave_0: entered allmulticast mode [ 441.751387][ T5523] bridge_slave_0: entered promiscuous mode [ 441.773092][ T5527] team0: Port device team_slave_0 added [ 441.779031][ T5515] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.786198][ T5515] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.793552][ T5515] bridge_slave_1: entered allmulticast mode [ 441.800112][ T5515] bridge_slave_1: entered promiscuous mode [ 441.813062][ T385] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.824482][ T5523] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.831627][ T5523] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.838886][ T5523] bridge_slave_1: entered allmulticast mode [ 441.845357][ T5523] bridge_slave_1: entered promiscuous mode [ 441.851806][ T5499] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.858894][ T5499] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.866147][ T5499] bridge_slave_0: entered allmulticast mode [ 441.872578][ T5499] bridge_slave_0: entered promiscuous mode [ 441.884315][ T5527] team0: Port device team_slave_1 added [ 441.902017][ T385] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.920352][ T5499] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.927528][ T5499] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.934647][ T5499] bridge_slave_1: entered allmulticast mode [ 441.941542][ T5499] bridge_slave_1: entered promiscuous mode [ 441.947846][ T5511] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.954901][ T5511] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.962180][ T5511] bridge_slave_0: entered allmulticast mode [ 441.968623][ T5511] bridge_slave_0: entered promiscuous mode [ 441.980711][ T5527] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 441.987702][ T5527] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.013619][ T5527] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.025877][ T5515] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 442.041009][ T5523] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 442.057950][ T385] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 442.069035][ T5511] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.076171][ T5511] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.083381][ T5511] bridge_slave_1: entered allmulticast mode [ 442.089936][ T5511] bridge_slave_1: entered promiscuous mode [ 442.101583][ T5527] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 442.108551][ T5527] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.134474][ T5527] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 442.146256][ T5515] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 442.159395][ T5523] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 442.165484][ T29] audit: type=1400 audit(1739748997.948:2385): avc: denied { read } for pid=3037 comm="dhcpcd" name="n25" dev="tmpfs" ino=1981 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 442.190141][ T29] audit: type=1400 audit(1739748997.948:2386): avc: denied { open } for pid=3037 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=1981 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 442.213169][ T29] audit: type=1400 audit(1739748997.948:2387): avc: denied { getattr } for pid=3037 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=1981 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 442.248772][ T5511] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 442.277550][ T5499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 442.287304][ T5523] team0: Port device team_slave_0 added [ 442.294079][ T5499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 442.309503][ T5511] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 442.324608][ T5515] team0: Port device team_slave_0 added [ 442.331208][ T5523] team0: Port device team_slave_1 added [ 442.347721][ T5523] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 442.354807][ T5523] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.380900][ T5523] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.402410][ T5499] team0: Port device team_slave_0 added [ 442.409230][ T5499] team0: Port device team_slave_1 added [ 442.417636][ T5515] team0: Port device team_slave_1 added [ 442.434781][ T5523] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 442.440427][ T29] audit: type=1400 audit(1739748998.228:2388): avc: denied { search } for pid=5590 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.441927][ T5523] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.490045][ T5523] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 442.491170][ T29] audit: type=1400 audit(1739748998.278:2389): avc: denied { read } for pid=5591 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=415 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.506301][ T5511] team0: Port device team_slave_0 added [ 442.534190][ T29] audit: type=1400 audit(1739748998.318:2390): avc: denied { open } for pid=5591 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=415 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.559368][ T29] audit: type=1400 audit(1739748998.318:2391): avc: denied { getattr } for pid=5591 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=415 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.605297][ T5527] hsr_slave_0: entered promiscuous mode [ 442.611152][ T29] audit: type=1400 audit(1739748998.388:2392): avc: denied { write } for pid=5590 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=414 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.634191][ T29] audit: type=1400 audit(1739748998.388:2393): avc: denied { add_name } for pid=5590 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.641591][ T5527] hsr_slave_1: entered promiscuous mode [ 442.656731][ T29] audit: type=1400 audit(1739748998.388:2394): avc: denied { create } for pid=5590 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 442.665200][ T5527] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 442.692567][ T5527] Cannot create hsr debugfs directory [ 442.703889][ T5511] team0: Port device team_slave_1 added [ 442.718125][ T5499] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 442.725081][ T5499] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.751133][ T5499] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.771054][ T5515] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 442.778100][ T5515] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.804226][ T5515] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.829822][ T5523] hsr_slave_0: entered promiscuous mode [ 442.836028][ T5523] hsr_slave_1: entered promiscuous mode [ 442.841887][ T5523] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 442.849532][ T5523] Cannot create hsr debugfs directory [ 442.863685][ T5511] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 442.870695][ T5511] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.896676][ T5511] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.909161][ T5499] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 442.916125][ T5499] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.942125][ T5499] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 442.956965][ T5515] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 442.963927][ T5515] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.989849][ T5515] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 443.015370][ T5511] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 443.022561][ T5511] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 443.048529][ T5511] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 443.077849][ T385] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.130200][ T5499] hsr_slave_0: entered promiscuous mode [ 443.136343][ T5499] hsr_slave_1: entered promiscuous mode [ 443.142098][ T5499] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 443.149744][ T5499] Cannot create hsr debugfs directory [ 443.157533][ T5515] hsr_slave_0: entered promiscuous mode [ 443.163559][ T5515] hsr_slave_1: entered promiscuous mode [ 443.169406][ T5515] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 443.177053][ T5515] Cannot create hsr debugfs directory [ 443.188018][ T385] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.203552][ T5511] hsr_slave_0: entered promiscuous mode [ 443.209660][ T5511] hsr_slave_1: entered promiscuous mode [ 443.215581][ T5511] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 443.223164][ T5511] Cannot create hsr debugfs directory [ 443.230837][ T385] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.306097][ T385] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.443432][ T5527] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 443.474110][ T385] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.488367][ T5527] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 443.497614][ T5527] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 443.506621][ T5527] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 443.530518][ T385] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.550640][ T5515] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 443.580772][ T385] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.592232][ T5515] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 443.603196][ T5499] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 443.613335][ T5499] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 443.622522][ T5515] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 443.631047][ T5515] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 443.643142][ T5499] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 443.652687][ T5499] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 443.663064][ T385] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.702513][ T5523] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 443.713246][ T5523] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 443.735251][ T5523] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 443.768915][ T5523] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 443.778000][ T5511] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 443.808899][ T5511] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 443.830543][ T5511] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 443.840216][ T5511] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 443.858966][ T5527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.891971][ T5527] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.904916][ T385] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.943203][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.950300][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.959529][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.966595][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.988737][ T385] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.013207][ T5499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.027158][ T5515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.039569][ T385] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.067526][ T5499] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.100955][ T3416] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.108145][ T3416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.128333][ T385] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.147745][ T5523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.162932][ T5511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.186477][ T5515] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.195170][ T3416] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.202280][ T3416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.233518][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.240632][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.253407][ T5511] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.261585][ T5523] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.273978][ T4803] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.281060][ T4803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.304908][ T5523] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 444.315342][ T5523] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 444.328854][ T5527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 444.337970][ T4803] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.345154][ T4803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.354604][ T4803] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.361699][ T4803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.370872][ T4803] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.378043][ T4803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.407943][ T4803] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.415097][ T4803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.469106][ T385] bridge_slave_1: left allmulticast mode [ 444.474831][ T385] bridge_slave_1: left promiscuous mode [ 444.480659][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.489034][ T385] bridge_slave_0: left allmulticast mode [ 444.494752][ T385] bridge_slave_0: left promiscuous mode [ 444.500688][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.509004][ T385] bridge_slave_1: left allmulticast mode [ 444.514637][ T385] bridge_slave_1: left promiscuous mode [ 444.520393][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.528107][ T385] bridge_slave_0: left allmulticast mode [ 444.533761][ T385] bridge_slave_0: left promiscuous mode [ 444.539511][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.547727][ T385] bridge_slave_1: left allmulticast mode [ 444.553424][ T385] bridge_slave_1: left promiscuous mode [ 444.559219][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.566869][ T385] bridge_slave_0: left allmulticast mode [ 444.572497][ T385] bridge_slave_0: left promiscuous mode [ 444.578172][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.587090][ T385] bridge_slave_1: left allmulticast mode [ 444.592745][ T385] bridge_slave_1: left promiscuous mode [ 444.598415][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.606155][ T385] bridge_slave_0: left allmulticast mode [ 444.611786][ T385] bridge_slave_0: left promiscuous mode [ 444.617491][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.627312][ T385] bridge_slave_1: left allmulticast mode [ 444.633013][ T385] bridge_slave_1: left promiscuous mode [ 444.638807][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.646609][ T385] bridge_slave_0: left allmulticast mode [ 444.652244][ T385] bridge_slave_0: left promiscuous mode [ 444.658005][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.417393][ T385] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 445.427189][ T385] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 445.436950][ T385] bond0 (unregistering): Released all slaves [ 445.445872][ T385] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 445.455306][ T385] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 445.465021][ T385] bond0 (unregistering): Released all slaves [ 445.473868][ T385] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 445.484306][ T385] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 445.493546][ T385] bond0 (unregistering): Released all slaves [ 445.502707][ T385] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 445.512478][ T385] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 445.521961][ T385] bond0 (unregistering): Released all slaves [ 445.530707][ T385] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 445.540592][ T385] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 445.550073][ T385] bond0 (unregistering): Released all slaves [ 445.570607][ T5499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 445.590747][ T5515] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 445.601165][ T5515] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 445.638124][ T5511] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 445.648634][ T5511] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 445.663768][ T385] tipc: Disabling bearer [ 445.668935][ T385] tipc: Left network mode [ 445.673381][ T5523] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 445.757264][ T385] hsr_slave_0: left promiscuous mode [ 445.771749][ T385] hsr_slave_1: left promiscuous mode [ 445.780001][ T385] hsr_slave_0: left promiscuous mode [ 445.787053][ T385] hsr_slave_1: left promiscuous mode [ 445.794507][ T385] hsr_slave_0: left promiscuous mode [ 445.802652][ T385] hsr_slave_1: left promiscuous mode [ 445.810118][ T385] hsr_slave_0: left promiscuous mode [ 445.816359][ T385] hsr_slave_1: left promiscuous mode [ 445.822102][ T385] batman_adv: batadv0: Interface deactivated: dummy0 [ 445.828903][ T385] batman_adv: batadv0: Removing interface: dummy0 [ 445.837869][ T385] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 445.845494][ T385] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 445.853537][ T385] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 445.861050][ T385] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 445.870661][ T385] hsr_slave_0: left promiscuous mode [ 445.876278][ T385] hsr_slave_1: left promiscuous mode [ 445.881845][ T385] batman_adv: batadv0: Interface deactivated: dummy0 [ 445.888663][ T385] batman_adv: batadv0: Removing interface: dummy0 [ 445.895656][ T385] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 445.903109][ T385] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 445.910777][ T385] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 445.918410][ T385] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 445.932637][ T385] veth1_macvtap: left promiscuous mode [ 445.938188][ T385] veth0_macvtap: left promiscuous mode [ 445.943733][ T385] veth1_vlan: left promiscuous mode [ 445.949080][ T385] veth0_vlan: left promiscuous mode [ 445.954970][ T385] veth1_macvtap: left promiscuous mode [ 445.960629][ T385] veth0_macvtap: left promiscuous mode [ 445.966300][ T385] veth1_vlan: left promiscuous mode [ 445.971520][ T385] veth0_vlan: left promiscuous mode [ 445.977674][ T385] veth1_macvtap: left promiscuous mode [ 445.983176][ T385] veth0_macvtap: left promiscuous mode [ 445.988903][ T385] veth1_vlan: left promiscuous mode [ 445.994135][ T385] veth0_vlan: left promiscuous mode [ 446.000025][ T385] veth1_macvtap: left promiscuous mode [ 446.005565][ T385] veth0_macvtap: left promiscuous mode [ 446.011133][ T385] veth1_vlan: left promiscuous mode [ 446.016690][ T385] veth0_vlan: left promiscuous mode [ 446.022493][ T385] veth1_macvtap: left promiscuous mode [ 446.027995][ T385] veth0_macvtap: left promiscuous mode [ 446.033478][ T385] veth1_vlan: left promiscuous mode [ 446.038858][ T385] veth0_vlan: left promiscuous mode [ 446.221831][ T385] team0 (unregistering): Port device team_slave_1 removed [ 446.231743][ T385] team0 (unregistering): Port device team_slave_0 removed [ 446.284818][ T385] team0 (unregistering): Port device team_slave_1 removed [ 446.297581][ T385] team0 (unregistering): Port device team_slave_0 removed [ 446.346355][ T385] team0 (unregistering): Port device team_slave_1 removed [ 446.356974][ T385] team0 (unregistering): Port device team_slave_0 removed [ 446.404903][ T385] team0 (unregistering): Port device team_slave_1 removed [ 446.414112][ T385] team0 (unregistering): Port device team_slave_0 removed [ 446.470437][ T385] team0 (unregistering): Port device team_slave_1 removed [ 446.480887][ T385] team0 (unregistering): Port device team_slave_0 removed [ 446.509991][ T5527] veth0_vlan: entered promiscuous mode [ 446.529413][ T5527] veth1_vlan: entered promiscuous mode [ 446.553899][ T5515] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 446.588388][ T5511] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 446.602938][ T5527] veth0_macvtap: entered promiscuous mode [ 446.633925][ T5527] veth1_macvtap: entered promiscuous mode [ 446.674154][ T5499] veth0_vlan: entered promiscuous mode [ 446.714368][ T5527] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 446.744975][ T5527] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 446.753959][ T5499] veth1_vlan: entered promiscuous mode [ 446.776702][ T5527] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.785600][ T5527] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.794378][ T5527] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.803205][ T5527] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.849376][ T5515] veth0_vlan: entered promiscuous mode [ 446.876172][ T5515] veth1_vlan: entered promiscuous mode [ 446.890068][ T5523] veth0_vlan: entered promiscuous mode [ 446.903330][ T5499] veth0_macvtap: entered promiscuous mode [ 446.920486][ T5511] veth0_vlan: entered promiscuous mode [ 446.941016][ T5499] veth1_macvtap: entered promiscuous mode [ 446.949651][ T5515] veth0_macvtap: entered promiscuous mode [ 446.958406][ T5523] veth1_vlan: entered promiscuous mode [ 446.983630][ T5763] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.992954][ T5763] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.034429][ T5511] veth1_vlan: entered promiscuous mode [ 447.071694][ T5499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.082262][ T5499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.093217][ T5499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 447.102644][ T5515] veth1_macvtap: entered promiscuous mode [ 447.118292][ T5499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.128919][ T5499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.140023][ T5499] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 447.150870][ T5511] veth0_macvtap: entered promiscuous mode [ 447.162294][ T5515] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.172891][ T5515] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.182783][ T5515] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.193346][ T5515] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.204639][ T5515] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 447.217357][ T5523] veth0_macvtap: entered promiscuous mode [ 447.226265][ T5499] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.234998][ T5499] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.243830][ T5499] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.252589][ T5499] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.266379][ T5515] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.276965][ T5515] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.286841][ T5515] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.297290][ T5515] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.310155][ T5515] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 447.317669][ T5511] veth1_macvtap: entered promiscuous mode [ 447.330646][ T5515] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.339456][ T5515] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.348221][ T5515] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.356997][ T5515] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.378492][ T5523] veth1_macvtap: entered promiscuous mode [ 447.395606][ T5511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.406110][ T5511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.416037][ T5511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.426595][ T5511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.436555][ T5511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.447136][ T5511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.481965][ T5511] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 447.497716][ T5511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.508362][ T5511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.518306][ T5511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.528782][ T5511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.538644][ T5511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.549094][ T5511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.561115][ T5511] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 447.571479][ T5511] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.580415][ T5511] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.589612][ T5511] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.598377][ T5511] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.618134][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.621672][ T5785] netlink: 'syz.8.669': attribute type 1 has an invalid length. [ 447.628785][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.636457][ T5785] netlink: 1280 bytes leftover after parsing attributes in process `syz.8.669'. [ 447.646293][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.665771][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.675664][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.686198][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.696087][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.706535][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.772510][ T5523] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 447.781232][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.791817][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.801652][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.812100][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.821930][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.832480][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.842386][ T5523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 447.852884][ T5523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.917299][ T5523] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 447.947560][ T5523] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.956341][ T5523] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.965103][ T5523] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.973873][ T5523] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.130297][ T5794] random: crng reseeded on system resumption [ 448.254605][ T385] IPVS: stop unused estimator thread 0... [ 448.411661][ T385] IPVS: stop unused estimator thread 0... [ 449.053573][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 449.053591][ T29] audit: type=1400 audit(1739749004.808:2400): avc: denied { create } for pid=5815 comm="syz.9.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 449.079065][ T29] audit: type=1400 audit(1739749004.828:2401): avc: denied { read write } for pid=5815 comm="syz.9.673" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 449.102303][ T29] audit: type=1400 audit(1739749004.828:2402): avc: denied { open } for pid=5815 comm="syz.9.673" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 449.126392][ T29] audit: type=1400 audit(1739749004.828:2403): avc: denied { setopt } for pid=5815 comm="syz.9.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 449.212133][ T5816] Cannot find add_set index 4 as target [ 449.444946][ T29] audit: type=1400 audit(1739749005.228:2404): avc: denied { mount } for pid=5831 comm="syz.5.678" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 449.467020][ T29] audit: type=1400 audit(1739749005.228:2405): avc: denied { unmount } for pid=5831 comm="syz.5.678" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 449.492655][ T5832] loop5: detected capacity change from 0 to 1024 [ 449.517446][ T5832] ======================================================= [ 449.517446][ T5832] WARNING: The mand mount option has been deprecated and [ 449.517446][ T5832] and is ignored by this kernel. Remove the mand [ 449.517446][ T5832] option from the mount to silence this warning. [ 449.517446][ T5832] ======================================================= [ 449.776180][ T5832] EXT4-fs: Ignoring removed bh option [ 449.781641][ T5832] EXT4-fs: inline encryption not supported [ 449.982842][ T5832] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 450.066084][ T5832] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=c84ce018, mo2=0000] [ 450.173914][ T5832] EXT4-fs error (device loop5): ext4_map_blocks:671: inode #3: block 2: comm syz.5.678: lblock 2 mapped to illegal pblock 2 (length 1) [ 450.207710][ T5832] Quota error (device loop5): qtree_write_dquot: dquota write failed [ 450.259806][ T5832] EXT4-fs error (device loop5): ext4_map_blocks:671: inode #3: block 48: comm syz.5.678: lblock 0 mapped to illegal pblock 48 (length 1) [ 450.344712][ T5832] Quota error (device loop5): v2_write_file_info: Can't write info structure [ 450.353752][ T5832] EXT4-fs error (device loop5): ext4_acquire_dquot:6927: comm syz.5.678: Failed to acquire dquot type 0 [ 450.471472][ T5832] EXT4-fs error (device loop5) in ext4_reserve_inode_write:5838: Corrupt filesystem [ 450.523667][ T5832] EXT4-fs error (device loop5): ext4_evict_inode:256: inode #11: comm syz.5.678: mark_inode_dirty error [ 450.582634][ T5832] EXT4-fs warning (device loop5): ext4_evict_inode:259: couldn't mark inode dirty (err -117) [ 450.634168][ T5832] EXT4-fs (loop5): 1 orphan inode deleted [ 450.664568][ T5832] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 450.732886][ T29] audit: type=1400 audit(1739749006.518:2406): avc: denied { mount } for pid=5831 comm="syz.5.678" name="/" dev="loop5" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 450.777193][ T5832] EXT4-fs error (device loop5): ext4_map_blocks:671: inode #3: block 1: comm syz.5.678: lblock 1 mapped to illegal pblock 1 (length 1) [ 450.918785][ T5832] Quota error (device loop5): find_tree_dqentry: Can't read quota tree block 1 [ 450.927882][ T5832] EXT4-fs error (device loop5): ext4_acquire_dquot:6927: comm syz.5.678: Failed to acquire dquot type 0 [ 451.018181][ T5862] EXT4-fs error (device loop5): ext4_map_blocks:671: inode #2: block 16: comm syz.5.678: lblock 0 mapped to illegal pblock 16 (length 1) [ 451.046275][ T5863] netlink: 12 bytes leftover after parsing attributes in process `syz.9.682'. [ 451.219560][ T375] EXT4-fs error (device loop5): ext4_map_blocks:671: inode #3: block 1: comm kworker/u8:5: lblock 1 mapped to illegal pblock 1 (length 1) [ 451.282052][ T375] EXT4-fs error (device loop5): ext4_release_dquot:6950: comm kworker/u8:5: Failed to release dquot type 0 [ 451.328158][ T5499] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 451.376760][ T5499] EXT4-fs error (device loop5): __ext4_get_inode_loc:4435: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 451.431426][ T5499] EXT4-fs error (device loop5) in ext4_reserve_inode_write:5838: Corrupt filesystem [ 451.472596][ T5499] EXT4-fs error (device loop5): ext4_quota_off:7194: inode #3: comm syz-executor: mark_inode_dirty error [ 451.600792][ T5875] netlink: 'syz.7.684': attribute type 1 has an invalid length. [ 451.608522][ T5875] netlink: 1280 bytes leftover after parsing attributes in process `syz.7.684'. [ 451.774905][ T5879] netlink: 28 bytes leftover after parsing attributes in process `syz.5.683'. [ 451.785706][ T5883] netdevsim netdevsim8: loading /lib/firmware/. failed with error -22 [ 451.793891][ T5883] netdevsim netdevsim8: Direct firmware load for . failed with error -22 [ 451.990884][ T5897] Cannot find add_set index 4 as target [ 452.144177][ T5899] random: crng reseeded on system resumption [ 453.531667][ T5932] netlink: 4 bytes leftover after parsing attributes in process `syz.8.693'. [ 454.317292][ T5941] netlink: 'syz.5.696': attribute type 1 has an invalid length. [ 454.325028][ T5941] netlink: 1280 bytes leftover after parsing attributes in process `syz.5.696'. [ 454.368074][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 454.368089][ T29] audit: type=1326 audit(1739749010.158:2495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.552772][ T29] audit: type=1326 audit(1739749010.268:2496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.576129][ T29] audit: type=1326 audit(1739749010.268:2497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.599543][ T29] audit: type=1326 audit(1739749010.268:2498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.622901][ T29] audit: type=1326 audit(1739749010.268:2499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.646184][ T29] audit: type=1326 audit(1739749010.268:2500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.669520][ T29] audit: type=1326 audit(1739749010.268:2501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.692864][ T29] audit: type=1326 audit(1739749010.268:2502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.716239][ T29] audit: type=1326 audit(1739749010.268:2503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 454.739700][ T29] audit: type=1326 audit(1739749010.268:2504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5942 comm="syz.6.697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f858bbdcde9 code=0x7ffc0000 [ 455.031167][ T5949] random: crng reseeded on system resumption [ 455.126480][ T5929] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 455.277325][ T5960] netlink: 20 bytes leftover after parsing attributes in process `syz.9.699'. [ 455.431413][ T5964] syz.6.701 (5964) used greatest stack depth: 10112 bytes left [ 455.513152][ T5966] netlink: 12 bytes leftover after parsing attributes in process `syz.6.702'. [ 455.562758][ T5969] netlink: 44 bytes leftover after parsing attributes in process `syz.6.703'. [ 455.571967][ T5969] netlink: 8 bytes leftover after parsing attributes in process `syz.6.703'. [ 456.203221][ C1] ================================================================== [ 456.211435][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 456.218227][ C1] [ 456.220561][ C1] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 0: [ 456.228633][ C1] can_receive+0x1ca/0x1f0 [ 456.233065][ C1] can_rcv+0xe7/0x180 [ 456.237069][ C1] __netif_receive_skb+0x123/0x280 [ 456.242204][ C1] process_backlog+0x22e/0x440 [ 456.246989][ C1] __napi_poll+0x63/0x3c0 [ 456.251341][ C1] net_rx_action+0x3a1/0x7f0 [ 456.255955][ C1] handle_softirqs+0xbf/0x280 [ 456.260694][ C1] do_softirq+0x5e/0x90 [ 456.264869][ C1] __local_bh_enable_ip+0x6e/0x70 [ 456.269915][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 456.274883][ C1] wg_packet_decrypt_worker+0x6ac/0x6f0 [ 456.280460][ C1] process_scheduled_works+0x4db/0xa20 [ 456.285939][ C1] worker_thread+0x51d/0x6f0 [ 456.290546][ C1] kthread+0x4ae/0x520 [ 456.294638][ C1] ret_from_fork+0x4b/0x60 [ 456.299077][ C1] ret_from_fork_asm+0x1a/0x30 [ 456.303862][ C1] [ 456.306195][ C1] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 1: [ 456.314276][ C1] can_receive+0x1ca/0x1f0 [ 456.318722][ C1] can_rcv+0xe7/0x180 [ 456.322722][ C1] __netif_receive_skb+0x123/0x280 [ 456.327853][ C1] process_backlog+0x22e/0x440 [ 456.332644][ C1] __napi_poll+0x63/0x3c0 [ 456.336998][ C1] net_rx_action+0x3a1/0x7f0 [ 456.341613][ C1] handle_softirqs+0xbf/0x280 [ 456.346308][ C1] do_softirq+0x5e/0x90 [ 456.350484][ C1] __local_bh_enable_ip+0x6e/0x70 [ 456.355542][ C1] netif_rx+0x83/0x240 [ 456.359628][ C1] can_send+0x586/0x6d0 [ 456.363793][ C1] isotp_sendmsg+0x99c/0xbf0 [ 456.368401][ C1] __sock_sendmsg+0x140/0x180 [ 456.373107][ C1] ____sys_sendmsg+0x326/0x4b0 [ 456.378008][ C1] __sys_sendmmsg+0x227/0x4b0 [ 456.382705][ C1] __x64_sys_sendmmsg+0x57/0x70 [ 456.387575][ C1] x64_sys_call+0x29aa/0x2dc0 [ 456.392278][ C1] do_syscall_64+0xc9/0x1c0 [ 456.396808][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 456.402725][ C1] [ 456.405067][ C1] value changed: 0x000000000000568d -> 0x000000000000568e [ 456.412185][ C1] [ 456.414513][ C1] Reported by Kernel Concurrency Sanitizer on: [ 456.420686][ C1] CPU: 1 UID: 0 PID: 5980 Comm: syz.6.706 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 456.431288][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 456.441361][ C1] ================================================================== [ 456.459521][ C0] ================================================================== [ 456.467641][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 456.474340][ C0] [ 456.476670][ C0] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 1: [ 456.484750][ C0] can_receive+0x62/0x1f0 [ 456.489098][ C0] can_rcv+0xe7/0x180 [ 456.493093][ C0] __netif_receive_skb+0x123/0x280 [ 456.498225][ C0] process_backlog+0x22e/0x440 [ 456.503010][ C0] __napi_poll+0x63/0x3c0 [ 456.507363][ C0] net_rx_action+0x3a1/0x7f0 [ 456.511984][ C0] handle_softirqs+0xbf/0x280 [ 456.516684][ C0] do_softirq+0x5e/0x90 [ 456.520867][ C0] __local_bh_enable_ip+0x6e/0x70 [ 456.525933][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 456.530911][ C0] lock_sock_nested+0x10f/0x140 [ 456.535792][ C0] sockopt_lock_sock+0x42/0x50 [ 456.540569][ C0] do_ip_getsockopt+0xbf3/0x1270 [ 456.545530][ C0] ip_getsockopt+0x5c/0x170 [ 456.550052][ C0] tcp_getsockopt+0xaa/0xe0 [ 456.554581][ C0] sock_common_getsockopt+0x5b/0x70 [ 456.559813][ C0] do_sock_getsockopt+0x1ca/0x260 [ 456.564853][ C0] __x64_sys_getsockopt+0x18c/0x200 [ 456.570068][ C0] x64_sys_call+0x1288/0x2dc0 [ 456.574757][ C0] do_syscall_64+0xc9/0x1c0 [ 456.579273][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 456.585179][ C0] [ 456.587503][ C0] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 0: [ 456.595572][ C0] can_receive+0x62/0x1f0 [ 456.599918][ C0] can_rcv+0xe7/0x180 [ 456.603909][ C0] __netif_receive_skb+0x123/0x280 [ 456.609043][ C0] process_backlog+0x22e/0x440 [ 456.613815][ C0] __napi_poll+0x63/0x3c0 [ 456.618155][ C0] net_rx_action+0x3a1/0x7f0 [ 456.622753][ C0] handle_softirqs+0xbf/0x280 [ 456.627440][ C0] do_softirq+0x5e/0x90 [ 456.631598][ C0] __local_bh_enable_ip+0x6e/0x70 [ 456.636630][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 456.641596][ C0] batadv_nc_purge_paths+0x220/0x270 [ 456.646912][ C0] batadv_nc_worker+0x3db/0xad0 [ 456.651783][ C0] process_scheduled_works+0x4db/0xa20 [ 456.657245][ C0] worker_thread+0x51d/0x6f0 [ 456.661837][ C0] kthread+0x4ae/0x520 [ 456.665920][ C0] ret_from_fork+0x4b/0x60 [ 456.670353][ C0] ret_from_fork_asm+0x1a/0x30 [ 456.675128][ C0] [ 456.677467][ C0] value changed: 0x0000000000007baf -> 0x0000000000007bb0 [ 456.684565][ C0] [ 456.686886][ C0] Reported by Kernel Concurrency Sanitizer on: [ 456.693041][ C0] CPU: 0 UID: 0 PID: 375 Comm: kworker/u8:5 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 456.703801][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 456.713945][ C0] Workqueue: bat_events batadv_nc_worker [ 456.719598][ C0] ================================================================== [ 456.732092][ C1] ================================================================== [ 456.740202][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 456.746898][ C1] [ 456.749227][ C1] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 0: [ 456.757394][ C1] can_receive+0x4e/0x1f0 [ 456.761740][ C1] can_rcv+0xe7/0x180 [ 456.765737][ C1] __netif_receive_skb+0x123/0x280 [ 456.770871][ C1] process_backlog+0x22e/0x440 [ 456.775660][ C1] __napi_poll+0x63/0x3c0 [ 456.780008][ C1] net_rx_action+0x3a1/0x7f0 [ 456.784626][ C1] handle_softirqs+0xbf/0x280 [ 456.789323][ C1] do_softirq+0x5e/0x90 [ 456.793495][ C1] __local_bh_enable_ip+0x6e/0x70 [ 456.798540][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 456.803510][ C1] batadv_nc_purge_paths+0x220/0x270 [ 456.808828][ C1] batadv_nc_worker+0x3db/0xad0 [ 456.813703][ C1] process_scheduled_works+0x4db/0xa20 [ 456.819181][ C1] worker_thread+0x51d/0x6f0 [ 456.823796][ C1] kthread+0x4ae/0x520 [ 456.827889][ C1] ret_from_fork+0x4b/0x60 [ 456.832330][ C1] ret_from_fork_asm+0x1a/0x30 [ 456.837145][ C1] [ 456.839479][ C1] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 1: [ 456.847554][ C1] can_receive+0x4e/0x1f0 [ 456.851905][ C1] can_rcv+0xe7/0x180 [ 456.855900][ C1] __netif_receive_skb+0x123/0x280 [ 456.861036][ C1] process_backlog+0x22e/0x440 [ 456.865824][ C1] __napi_poll+0x63/0x3c0 [ 456.870173][ C1] net_rx_action+0x3a1/0x7f0 [ 456.874785][ C1] handle_softirqs+0xbf/0x280 [ 456.879481][ C1] run_ksoftirqd+0x1c/0x30 [ 456.883922][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 456.888883][ C1] kthread+0x4ae/0x520 [ 456.892976][ C1] ret_from_fork+0x4b/0x60 [ 456.897417][ C1] ret_from_fork_asm+0x1a/0x30 [ 456.902204][ C1] [ 456.904535][ C1] value changed: 0x000000000005de56 -> 0x000000000005de57 [ 456.911661][ C1] [ 456.913993][ C1] Reported by Kernel Concurrency Sanitizer on: [ 456.920152][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 456.930753][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 456.940823][ C1] ================================================================== SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 457.103292][ C0] ================================================================== [ 457.111510][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 457.118751][ C0] [ 457.121082][ C0] read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 1: [ 457.129162][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 457.133874][ C0] can_rcv_filter+0xbf/0x4c0 [ 457.138488][ C0] can_receive+0x182/0x1f0 [ 457.142930][ C0] can_rcv+0xe7/0x180 [ 457.146936][ C0] __netif_receive_skb+0x123/0x280 [ 457.152087][ C0] process_backlog+0x22e/0x440 [ 457.156879][ C0] __napi_poll+0x63/0x3c0 [ 457.161229][ C0] net_rx_action+0x3a1/0x7f0 [ 457.165837][ C0] handle_softirqs+0xbf/0x280 [ 457.170538][ C0] do_softirq+0x5e/0x90 [ 457.174719][ C0] __local_bh_enable_ip+0x6e/0x70 [ 457.179768][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 457.184740][ C0] lock_sock_nested+0x10f/0x140 [ 457.189619][ C0] sockopt_lock_sock+0x42/0x50 [ 457.194397][ C0] do_ip_getsockopt+0xbf3/0x1270 [ 457.199356][ C0] ip_getsockopt+0x5c/0x170 [ 457.203879][ C0] tcp_getsockopt+0xaa/0xe0 [ 457.208410][ C0] sock_common_getsockopt+0x5b/0x70 [ 457.213647][ C0] do_sock_getsockopt+0x1ca/0x260 [ 457.218697][ C0] __x64_sys_getsockopt+0x18c/0x200 [ 457.223908][ C0] x64_sys_call+0x1288/0x2dc0 [ 457.228616][ C0] do_syscall_64+0xc9/0x1c0 [ 457.233149][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.239065][ C0] [ 457.241400][ C0] read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 0: [ 457.249475][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 457.254189][ C0] can_rcv_filter+0xbf/0x4c0 [ 457.258803][ C0] can_receive+0x182/0x1f0 [ 457.263239][ C0] can_rcv+0xe7/0x180 [ 457.267234][ C0] __netif_receive_skb+0x123/0x280 [ 457.272372][ C0] process_backlog+0x22e/0x440 [ 457.277168][ C0] __napi_poll+0x63/0x3c0 [ 457.281520][ C0] net_rx_action+0x3a1/0x7f0 [ 457.286138][ C0] handle_softirqs+0xbf/0x280 [ 457.290842][ C0] run_ksoftirqd+0x1c/0x30 [ 457.295282][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 457.300278][ C0] kthread+0x4ae/0x520 [ 457.304374][ C0] ret_from_fork+0x4b/0x60 [ 457.308828][ C0] ret_from_fork_asm+0x1a/0x30 [ 457.313611][ C0] [ 457.315940][ C0] value changed: 0x00062726 -> 0x00062727 [ 457.321661][ C0] [ 457.323983][ C0] Reported by Kernel Concurrency Sanitizer on: [ 457.330142][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 457.340747][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 457.350828][ C0] ================================================================== [ 457.389802][ C0] ================================================================== [ 457.397926][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 457.404622][ C0] [ 457.406952][ C0] read-write to 0xffff88811ddc3f98 of 8 bytes by interrupt on cpu 1: [ 457.415028][ C0] can_receive+0x1b6/0x1f0 [ 457.419466][ C0] can_rcv+0xe7/0x180 [ 457.423466][ C0] __netif_receive_skb+0x123/0x280 [ 457.428602][ C0] process_backlog+0x22e/0x440 [ 457.433395][ C0] __napi_poll+0x63/0x3c0 [ 457.437752][ C0] net_rx_action+0x3a1/0x7f0 [ 457.442364][ C0] handle_softirqs+0xbf/0x280 [ 457.447072][ C0] run_ksoftirqd+0x1c/0x30 [ 457.451857][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 457.456827][ C0] kthread+0x4ae/0x520 [ 457.460929][ C0] ret_from_fork+0x4b/0x60 [ 457.465376][ C0] ret_from_fork_asm+0x1a/0x30 [ 457.470182][ C0] [ 457.472515][ C0] read-write to 0xffff88811ddc3f98 of 8 bytes by interrupt on cpu 0: [ 457.480592][ C0] can_receive+0x1b6/0x1f0 [ 457.485027][ C0] can_rcv+0xe7/0x180 [ 457.489026][ C0] __netif_receive_skb+0x123/0x280 [ 457.494169][ C0] process_backlog+0x22e/0x440 [ 457.498963][ C0] __napi_poll+0x63/0x3c0 [ 457.503319][ C0] net_rx_action+0x3a1/0x7f0 [ 457.507929][ C0] handle_softirqs+0xbf/0x280 [ 457.512627][ C0] do_softirq+0x5e/0x90 [ 457.516808][ C0] __local_bh_enable_ip+0x6e/0x70 [ 457.521869][ C0] copy_fpstate_to_sigframe+0x31d/0x7e0 [ 457.527435][ C0] get_sigframe+0x2f3/0x430 [ 457.531967][ C0] x64_setup_rt_frame+0xad/0x590 [ 457.536931][ C0] arch_do_signal_or_restart+0x287/0x4b0 [ 457.542589][ C0] syscall_exit_to_user_mode+0x62/0x120 [ 457.548169][ C0] do_syscall_64+0xd6/0x1c0 [ 457.552696][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.558618][ C0] [ 457.560948][ C0] value changed: 0x0000000000065227 -> 0x0000000000065228 [ 457.568083][ C0] [ 457.570413][ C0] Reported by Kernel Concurrency Sanitizer on: [ 457.576567][ C0] CPU: 0 UID: 0 PID: 5499 Comm: syz-executor Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 457.587430][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 457.597496][ C0] ================================================================== [ 459.242637][ C0] ================================================================== [ 459.250972][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 459.257705][ C0] [ 459.260041][ C0] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 1: [ 459.268119][ C0] can_receive+0x1ca/0x1f0 [ 459.272558][ C0] can_rcv+0xe7/0x180 [ 459.276556][ C0] __netif_receive_skb+0x123/0x280 [ 459.281745][ C0] process_backlog+0x22e/0x440 [ 459.286538][ C0] __napi_poll+0x63/0x3c0 [ 459.290891][ C0] net_rx_action+0x3a1/0x7f0 [ 459.295510][ C0] handle_softirqs+0xbf/0x280 [ 459.300205][ C0] do_softirq+0x5e/0x90 [ 459.304383][ C0] __local_bh_enable_ip+0x6e/0x70 [ 459.309428][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 459.314403][ C0] batadv_nc_purge_paths+0x220/0x270 [ 459.319723][ C0] batadv_nc_worker+0x3db/0xad0 [ 459.324606][ C0] process_scheduled_works+0x4db/0xa20 [ 459.330091][ C0] worker_thread+0x51d/0x6f0 [ 459.334700][ C0] kthread+0x4ae/0x520 [ 459.338795][ C0] ret_from_fork+0x4b/0x60 [ 459.343239][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.348041][ C0] [ 459.350376][ C0] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 0: [ 459.358461][ C0] can_receive+0x1ca/0x1f0 [ 459.362901][ C0] can_rcv+0xe7/0x180 [ 459.366897][ C0] __netif_receive_skb+0x123/0x280 [ 459.372032][ C0] process_backlog+0x22e/0x440 [ 459.376817][ C0] __napi_poll+0x63/0x3c0 [ 459.381168][ C0] net_rx_action+0x3a1/0x7f0 [ 459.385795][ C0] handle_softirqs+0xbf/0x280 [ 459.390597][ C0] do_softirq+0x5e/0x90 [ 459.394777][ C0] __local_bh_enable_ip+0x6e/0x70 [ 459.399830][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 459.404798][ C0] wg_index_hashtable_insert+0xaa/0x2a0 [ 459.410380][ C0] wg_noise_handshake_create_response+0x60d/0x6c0 [ 459.416819][ C0] wg_packet_send_handshake_response+0x6e/0x120 [ 459.423088][ C0] wg_packet_handshake_receive_worker+0x3ed/0x5f0 [ 459.429538][ C0] process_scheduled_works+0x4db/0xa20 [ 459.435019][ C0] worker_thread+0x51d/0x6f0 [ 459.439666][ C0] kthread+0x4ae/0x520 [ 459.443759][ C0] ret_from_fork+0x4b/0x60 [ 459.448199][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.452995][ C0] [ 459.455340][ C0] value changed: 0x000000000000d049 -> 0x000000000000d04a [ 459.462455][ C0] [ 459.464786][ C0] Reported by Kernel Concurrency Sanitizer on: [ 459.470942][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 459.481463][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 459.491534][ C0] Workqueue: wg-kex-wg1 wg_packet_handshake_receive_worker [ 459.498776][ C0] ================================================================== [ 459.508554][ C0] ================================================================== [ 459.516656][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 459.523355][ C0] [ 459.525679][ C0] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 1: [ 459.533758][ C0] can_receive+0x62/0x1f0 [ 459.538111][ C0] can_rcv+0xe7/0x180 [ 459.542107][ C0] __netif_receive_skb+0x123/0x280 [ 459.547238][ C0] process_backlog+0x22e/0x440 [ 459.552022][ C0] __napi_poll+0x63/0x3c0 [ 459.556373][ C0] net_rx_action+0x3a1/0x7f0 [ 459.560986][ C0] handle_softirqs+0xbf/0x280 [ 459.565689][ C0] do_softirq+0x5e/0x90 [ 459.569861][ C0] __local_bh_enable_ip+0x6e/0x70 [ 459.574910][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 459.579880][ C0] batadv_nc_purge_paths+0x220/0x270 [ 459.585198][ C0] batadv_nc_worker+0x402/0xad0 [ 459.590074][ C0] process_scheduled_works+0x4db/0xa20 [ 459.595561][ C0] worker_thread+0x51d/0x6f0 [ 459.600174][ C0] kthread+0x4ae/0x520 [ 459.604266][ C0] ret_from_fork+0x4b/0x60 [ 459.608706][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.613505][ C0] [ 459.615837][ C0] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 0: [ 459.623912][ C0] can_receive+0x62/0x1f0 [ 459.628260][ C0] can_rcv+0xe7/0x180 [ 459.632258][ C0] __netif_receive_skb+0x123/0x280 [ 459.637392][ C0] process_backlog+0x22e/0x440 [ 459.642188][ C0] __napi_poll+0x63/0x3c0 [ 459.646540][ C0] net_rx_action+0x3a1/0x7f0 [ 459.651159][ C0] handle_softirqs+0xbf/0x280 [ 459.655859][ C0] do_softirq+0x5e/0x90 [ 459.660039][ C0] __local_bh_enable_ip+0x6e/0x70 [ 459.665089][ C0] wg_index_hashtable_insert+0x26e/0x2a0 [ 459.670750][ C0] wg_noise_handshake_create_response+0x60d/0x6c0 [ 459.677196][ C0] wg_packet_send_handshake_response+0x6e/0x120 [ 459.683471][ C0] wg_packet_handshake_receive_worker+0x3ed/0x5f0 [ 459.689914][ C0] process_scheduled_works+0x4db/0xa20 [ 459.695398][ C0] worker_thread+0x51d/0x6f0 [ 459.700015][ C0] kthread+0x4ae/0x520 [ 459.704109][ C0] ret_from_fork+0x4b/0x60 [ 459.708548][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.713344][ C0] [ 459.715680][ C0] value changed: 0x000000000000fd16 -> 0x000000000000fd17 [ 459.722795][ C0] [ 459.725127][ C0] Reported by Kernel Concurrency Sanitizer on: [ 459.731288][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 459.741806][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 459.751880][ C0] Workqueue: wg-kex-wg1 wg_packet_handshake_receive_worker [ 459.759121][ C0] ================================================================== [ 459.774811][ C0] ================================================================== [ 459.782926][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 459.789623][ C0] [ 459.791959][ C0] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 1: [ 459.800039][ C0] can_receive+0x4e/0x1f0 [ 459.804385][ C0] can_rcv+0xe7/0x180 [ 459.808384][ C0] __netif_receive_skb+0x123/0x280 [ 459.813522][ C0] process_backlog+0x22e/0x440 [ 459.818316][ C0] __napi_poll+0x63/0x3c0 [ 459.822676][ C0] net_rx_action+0x3a1/0x7f0 [ 459.827292][ C0] handle_softirqs+0xbf/0x280 [ 459.831989][ C0] do_softirq+0x5e/0x90 [ 459.836165][ C0] __local_bh_enable_ip+0x6e/0x70 [ 459.841213][ C0] update_defense_level+0x575/0x5b0 [ 459.846429][ C0] defense_work_handler+0x1f/0x80 [ 459.851571][ C0] process_scheduled_works+0x4db/0xa20 [ 459.857050][ C0] worker_thread+0x51d/0x6f0 [ 459.861656][ C0] kthread+0x4ae/0x520 [ 459.865837][ C0] ret_from_fork+0x4b/0x60 [ 459.870271][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.875065][ C0] [ 459.877396][ C0] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 0: [ 459.885478][ C0] can_receive+0x4e/0x1f0 [ 459.889835][ C0] can_rcv+0xe7/0x180 [ 459.893845][ C0] __netif_receive_skb+0x123/0x280 [ 459.898984][ C0] process_backlog+0x22e/0x440 [ 459.903788][ C0] __napi_poll+0x63/0x3c0 [ 459.908143][ C0] net_rx_action+0x3a1/0x7f0 [ 459.912755][ C0] handle_softirqs+0xbf/0x280 [ 459.917453][ C0] do_softirq+0x5e/0x90 [ 459.921633][ C0] __local_bh_enable_ip+0x6e/0x70 [ 459.926680][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 459.931698][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 459.937356][ C0] process_scheduled_works+0x4db/0xa20 [ 459.942837][ C0] worker_thread+0x51d/0x6f0 [ 459.947446][ C0] kthread+0x4ae/0x520 [ 459.951539][ C0] ret_from_fork+0x4b/0x60 [ 459.955988][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.960778][ C0] [ 459.963107][ C0] value changed: 0x0000000000086b1c -> 0x0000000000086b1d [ 459.970221][ C0] [ 459.972560][ C0] Reported by Kernel Concurrency Sanitizer on: [ 459.978717][ C0] CPU: 0 UID: 0 PID: 143 Comm: kworker/u8:4 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 459.989493][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 459.999574][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 460.006370][ C0] ================================================================== [ 460.108248][ C0] ================================================================== [ 460.116378][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 460.123623][ C0] [ 460.125954][ C0] read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 1: [ 460.134032][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 460.138738][ C0] can_rcv_filter+0xbf/0x4c0 [ 460.143344][ C0] can_receive+0x182/0x1f0 [ 460.147778][ C0] can_rcv+0xe7/0x180 [ 460.151777][ C0] __netif_receive_skb+0x123/0x280 [ 460.156915][ C0] process_backlog+0x22e/0x440 [ 460.161706][ C0] __napi_poll+0x63/0x3c0 [ 460.166060][ C0] net_rx_action+0x3a1/0x7f0 [ 460.170680][ C0] handle_softirqs+0xbf/0x280 [ 460.175381][ C0] do_softirq+0x5e/0x90 [ 460.179565][ C0] __local_bh_enable_ip+0x6e/0x70 [ 460.184611][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 460.189615][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 460.195270][ C0] process_scheduled_works+0x4db/0xa20 [ 460.200743][ C0] worker_thread+0x51d/0x6f0 [ 460.205350][ C0] kthread+0x4ae/0x520 [ 460.209451][ C0] ret_from_fork+0x4b/0x60 [ 460.213896][ C0] ret_from_fork_asm+0x1a/0x30 [ 460.218683][ C0] [ 460.221008][ C0] read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 0: [ 460.229082][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 460.233786][ C0] can_rcv_filter+0xbf/0x4c0 [ 460.238478][ C0] can_receive+0x182/0x1f0 [ 460.242910][ C0] can_rcv+0xe7/0x180 [ 460.246912][ C0] __netif_receive_skb+0x123/0x280 [ 460.252054][ C0] process_backlog+0x22e/0x440 [ 460.256850][ C0] __napi_poll+0x63/0x3c0 [ 460.261207][ C0] net_rx_action+0x3a1/0x7f0 [ 460.265832][ C0] handle_softirqs+0xbf/0x280 [ 460.270541][ C0] do_softirq+0x5e/0x90 [ 460.274723][ C0] __local_bh_enable_ip+0x6e/0x70 [ 460.279773][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 460.284766][ C0] wg_packet_decrypt_worker+0x173/0x6f0 [ 460.290339][ C0] process_scheduled_works+0x4db/0xa20 [ 460.295817][ C0] worker_thread+0x51d/0x6f0 [ 460.300421][ C0] kthread+0x4ae/0x520 [ 460.304508][ C0] ret_from_fork+0x4b/0x60 [ 460.308954][ C0] ret_from_fork_asm+0x1a/0x30 [ 460.313745][ C0] [ 460.316072][ C0] value changed: 0x0008ac8d -> 0x0008ac8e [ 460.321817][ C0] [ 460.324148][ C0] Reported by Kernel Concurrency Sanitizer on: [ 460.330303][ C0] CPU: 0 UID: 0 PID: 5374 Comm: kworker/0:13 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 460.341171][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 460.351244][ C0] Workqueue: wg-crypt-wg0 wg_packet_decrypt_worker [ 460.357783][ C0] ================================================================== [ 460.396345][ C0] ================================================================== [ 460.404459][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 460.411160][ C0] [ 460.413498][ C0] read-write to 0xffff88811ddc3f98 of 8 bytes by interrupt on cpu 1: [ 460.421583][ C0] can_receive+0x1b6/0x1f0 [ 460.426015][ C0] can_rcv+0xe7/0x180 [ 460.430009][ C0] __netif_receive_skb+0x123/0x280 [ 460.435144][ C0] process_backlog+0x22e/0x440 [ 460.439938][ C0] __napi_poll+0x63/0x3c0 [ 460.444292][ C0] net_rx_action+0x3a1/0x7f0 [ 460.448908][ C0] handle_softirqs+0xbf/0x280 [ 460.453611][ C0] do_softirq+0x5e/0x90 [ 460.457785][ C0] __local_bh_enable_ip+0x6e/0x70 [ 460.462834][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 460.467802][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 460.473547][ C0] process_scheduled_works+0x4db/0xa20 [ 460.479031][ C0] worker_thread+0x51d/0x6f0 [ 460.483652][ C0] kthread+0x4ae/0x520 [ 460.487749][ C0] ret_from_fork+0x4b/0x60 [ 460.492198][ C0] ret_from_fork_asm+0x1a/0x30 [ 460.496990][ C0] [ 460.499320][ C0] read-write to 0xffff88811ddc3f98 of 8 bytes by interrupt on cpu 0: [ 460.507399][ C0] can_receive+0x1b6/0x1f0 [ 460.511839][ C0] can_rcv+0xe7/0x180 [ 460.515835][ C0] __netif_receive_skb+0x123/0x280 [ 460.520967][ C0] process_backlog+0x22e/0x440 [ 460.525755][ C0] __napi_poll+0x63/0x3c0 [ 460.530115][ C0] net_rx_action+0x3a1/0x7f0 [ 460.534733][ C0] handle_softirqs+0xbf/0x280 [ 460.539435][ C0] run_ksoftirqd+0x1c/0x30 [ 460.543882][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 460.548843][ C0] kthread+0x4ae/0x520 [ 460.552936][ C0] ret_from_fork+0x4b/0x60 [ 460.557377][ C0] ret_from_fork_asm+0x1a/0x30 [ 460.562170][ C0] [ 460.564501][ C0] value changed: 0x000000000008e5db -> 0x000000000008e5dc [ 460.571619][ C0] [ 460.573954][ C0] Reported by Kernel Concurrency Sanitizer on: [ 460.580111][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 460.590713][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 460.600792][ C0] ================================================================== [ 462.307961][ C0] ================================================================== [ 462.316170][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 462.322865][ C0] [ 462.325192][ C0] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 1: [ 462.333280][ C0] can_receive+0x1ca/0x1f0 [ 462.337715][ C0] can_rcv+0xe7/0x180 [ 462.341716][ C0] __netif_receive_skb+0x123/0x280 [ 462.346845][ C0] process_backlog+0x22e/0x440 [ 462.351646][ C0] __napi_poll+0x63/0x3c0 [ 462.356013][ C0] net_rx_action+0x3a1/0x7f0 [ 462.360634][ C0] handle_softirqs+0xbf/0x280 [ 462.365345][ C0] do_softirq+0x5e/0x90 [ 462.369528][ C0] __local_bh_enable_ip+0x6e/0x70 [ 462.374577][ C0] _raw_read_unlock_bh+0x1b/0x20 [ 462.379536][ C0] wg_socket_send_skb_to_peer+0x109/0x130 [ 462.385296][ C0] wg_packet_tx_worker+0x127/0x360 [ 462.390437][ C0] process_scheduled_works+0x4db/0xa20 [ 462.395919][ C0] worker_thread+0x51d/0x6f0 [ 462.400536][ C0] kthread+0x4ae/0x520 [ 462.404644][ C0] ret_from_fork+0x4b/0x60 [ 462.409083][ C0] ret_from_fork_asm+0x1a/0x30 [ 462.413874][ C0] [ 462.416205][ C0] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 0: [ 462.424283][ C0] can_receive+0x1ca/0x1f0 [ 462.428716][ C0] can_rcv+0xe7/0x180 [ 462.432714][ C0] __netif_receive_skb+0x123/0x280 [ 462.437854][ C0] process_backlog+0x22e/0x440 [ 462.442646][ C0] __napi_poll+0x63/0x3c0 [ 462.447003][ C0] net_rx_action+0x3a1/0x7f0 [ 462.451625][ C0] handle_softirqs+0xbf/0x280 [ 462.456356][ C0] do_softirq+0x5e/0x90 [ 462.460547][ C0] __local_bh_enable_ip+0x6e/0x70 [ 462.465608][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 462.470574][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 462.476225][ C0] process_scheduled_works+0x4db/0xa20 [ 462.481705][ C0] worker_thread+0x51d/0x6f0 [ 462.486321][ C0] kthread+0x4ae/0x520 [ 462.490412][ C0] ret_from_fork+0x4b/0x60 [ 462.494867][ C0] ret_from_fork_asm+0x1a/0x30 [ 462.499652][ C0] [ 462.501983][ C0] value changed: 0x000000000000dcf3 -> 0x000000000000dcf4 [ 462.509096][ C0] [ 462.511429][ C0] Reported by Kernel Concurrency Sanitizer on: [ 462.517655][ C0] CPU: 0 UID: 0 PID: 385 Comm: kworker/u8:6 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 462.528454][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 462.538538][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 462.545332][ C0] ================================================================== [ 462.600919][ C0] ================================================================== [ 462.609037][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 462.615731][ C0] [ 462.618068][ C0] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 1: [ 462.626145][ C0] can_receive+0x62/0x1f0 [ 462.630488][ C0] can_rcv+0xe7/0x180 [ 462.634485][ C0] __netif_receive_skb+0x123/0x280 [ 462.639627][ C0] process_backlog+0x22e/0x440 [ 462.644419][ C0] __napi_poll+0x63/0x3c0 [ 462.648774][ C0] net_rx_action+0x3a1/0x7f0 [ 462.653396][ C0] handle_softirqs+0xbf/0x280 [ 462.658098][ C0] do_softirq+0x5e/0x90 [ 462.662279][ C0] __local_bh_enable_ip+0x6e/0x70 [ 462.667332][ C0] update_defense_level+0x575/0x5b0 [ 462.672547][ C0] defense_work_handler+0x1f/0x80 [ 462.677590][ C0] process_scheduled_works+0x4db/0xa20 [ 462.683067][ C0] worker_thread+0x51d/0x6f0 [ 462.687676][ C0] kthread+0x4ae/0x520 [ 462.691774][ C0] ret_from_fork+0x4b/0x60 [ 462.696217][ C0] ret_from_fork_asm+0x1a/0x30 [ 462.701007][ C0] [ 462.703335][ C0] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 0: [ 462.711415][ C0] can_receive+0x62/0x1f0 [ 462.715761][ C0] can_rcv+0xe7/0x180 [ 462.719750][ C0] __netif_receive_skb+0x123/0x280 [ 462.724883][ C0] process_backlog+0x22e/0x440 [ 462.729679][ C0] __napi_poll+0x63/0x3c0 [ 462.734035][ C0] net_rx_action+0x3a1/0x7f0 [ 462.738655][ C0] handle_softirqs+0xbf/0x280 [ 462.743355][ C0] do_softirq+0x5e/0x90 [ 462.747533][ C0] __local_bh_enable_ip+0x6e/0x70 [ 462.752579][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 462.757554][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 462.763209][ C0] process_scheduled_works+0x4db/0xa20 [ 462.768691][ C0] worker_thread+0x51d/0x6f0 [ 462.773299][ C0] kthread+0x4ae/0x520 [ 462.777396][ C0] ret_from_fork+0x4b/0x60 [ 462.781836][ C0] ret_from_fork_asm+0x1a/0x30 [ 462.786624][ C0] [ 462.788954][ C0] value changed: 0x0000000000000dee -> 0x0000000000000def [ 462.796070][ C0] [ 462.798411][ C0] Reported by Kernel Concurrency Sanitizer on: [ 462.804566][ C0] CPU: 0 UID: 0 PID: 28 Comm: kworker/u8:1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 462.815257][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 462.825332][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 462.832133][ C0] ================================================================== [ 462.872287][ C1] ================================================================== [ 462.880407][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 462.887103][ C1] [ 462.889436][ C1] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 0: [ 462.897514][ C1] can_receive+0x4e/0x1f0 [ 462.901866][ C1] can_rcv+0xe7/0x180 [ 462.905862][ C1] __netif_receive_skb+0x123/0x280 [ 462.910994][ C1] process_backlog+0x22e/0x440 [ 462.915786][ C1] __napi_poll+0x63/0x3c0 [ 462.920134][ C1] net_rx_action+0x3a1/0x7f0 [ 462.924748][ C1] handle_softirqs+0xbf/0x280 [ 462.929450][ C1] do_softirq+0x5e/0x90 [ 462.933626][ C1] __local_bh_enable_ip+0x6e/0x70 [ 462.938680][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 462.943658][ C1] nsim_dev_trap_report_work+0x522/0x620 [ 462.949312][ C1] process_scheduled_works+0x4db/0xa20 [ 462.954795][ C1] worker_thread+0x51d/0x6f0 [ 462.959406][ C1] kthread+0x4ae/0x520 [ 462.963502][ C1] ret_from_fork+0x4b/0x60 [ 462.967943][ C1] ret_from_fork_asm+0x1a/0x30 [ 462.972732][ C1] [ 462.975067][ C1] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 1: [ 462.983138][ C1] can_receive+0x4e/0x1f0 [ 462.987487][ C1] can_rcv+0xe7/0x180 [ 462.991488][ C1] __netif_receive_skb+0x123/0x280 [ 462.996631][ C1] process_backlog+0x22e/0x440 [ 463.001418][ C1] __napi_poll+0x63/0x3c0 [ 463.005772][ C1] net_rx_action+0x3a1/0x7f0 [ 463.010382][ C1] handle_softirqs+0xbf/0x280 [ 463.015083][ C1] run_ksoftirqd+0x1c/0x30 [ 463.019527][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 463.024491][ C1] kthread+0x4ae/0x520 [ 463.028586][ C1] ret_from_fork+0x4b/0x60 [ 463.033030][ C1] ret_from_fork_asm+0x1a/0x30 [ 463.037823][ C1] [ 463.040155][ C1] value changed: 0x00000000000b4bbb -> 0x00000000000b4bbc [ 463.047269][ C1] [ 463.049602][ C1] Reported by Kernel Concurrency Sanitizer on: [ 463.055760][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 463.066365][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 463.076436][ C1] ================================================================== [ 463.223547][ C1] ================================================================== [ 463.231687][ C1] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 463.238940][ C1] [ 463.241290][ C1] read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 0: [ 463.249376][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 463.254090][ C1] can_rcv_filter+0xbf/0x4c0 [ 463.258699][ C1] can_receive+0x182/0x1f0 [ 463.263128][ C1] can_rcv+0xe7/0x180 [ 463.267133][ C1] __netif_receive_skb+0x123/0x280 [ 463.272275][ C1] process_backlog+0x22e/0x440 [ 463.277067][ C1] __napi_poll+0x63/0x3c0 [ 463.281418][ C1] net_rx_action+0x3a1/0x7f0 [ 463.286035][ C1] handle_softirqs+0xbf/0x280 [ 463.290738][ C1] do_softirq+0x5e/0x90 [ 463.294913][ C1] __local_bh_enable_ip+0x6e/0x70 [ 463.299960][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 463.304931][ C1] batadv_nc_purge_paths+0x220/0x270 [ 463.310250][ C1] batadv_nc_worker+0x402/0xad0 [ 463.315131][ C1] process_scheduled_works+0x4db/0xa20 [ 463.320616][ C1] worker_thread+0x51d/0x6f0 [ 463.325226][ C1] kthread+0x4ae/0x520 [ 463.329317][ C1] ret_from_fork+0x4b/0x60 [ 463.333754][ C1] ret_from_fork_asm+0x1a/0x30 [ 463.338542][ C1] [ 463.340873][ C1] read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 1: [ 463.348952][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 463.353667][ C1] can_rcv_filter+0xbf/0x4c0 [ 463.358286][ C1] can_receive+0x182/0x1f0 [ 463.362721][ C1] can_rcv+0xe7/0x180 [ 463.366720][ C1] __netif_receive_skb+0x123/0x280 [ 463.371861][ C1] process_backlog+0x22e/0x440 [ 463.376656][ C1] __napi_poll+0x63/0x3c0 [ 463.381009][ C1] net_rx_action+0x3a1/0x7f0 [ 463.385628][ C1] handle_softirqs+0xbf/0x280 [ 463.390329][ C1] do_softirq+0x5e/0x90 [ 463.394509][ C1] __local_bh_enable_ip+0x6e/0x70 [ 463.399557][ C1] fpu__restore_sig+0x5c1/0xb00 [ 463.404433][ C1] restore_sigcontext+0x1b5/0x220 [ 463.409569][ C1] __do_sys_rt_sigreturn+0xfd/0x160 [ 463.414799][ C1] x64_sys_call+0x2982/0x2dc0 [ 463.419511][ C1] do_syscall_64+0xc9/0x1c0 [ 463.424047][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.429969][ C1] [ 463.432336][ C1] value changed: 0x000b95e8 -> 0x000b95e9 [ 463.438154][ C1] [ 463.440486][ C1] Reported by Kernel Concurrency Sanitizer on: [ 463.446647][ C1] CPU: 1 UID: 0 PID: 5984 Comm: dhcpcd-run-hook Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 463.457778][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 463.467852][ C1] ================================================================== [ 463.492897][ C0] ================================================================== [ 463.501019][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 463.507720][ C0] [ 463.510050][ C0] read-write to 0xffff88811ddc3f98 of 8 bytes by interrupt on cpu 1: [ 463.518136][ C0] can_receive+0x1b6/0x1f0 [ 463.522575][ C0] can_rcv+0xe7/0x180 [ 463.526576][ C0] __netif_receive_skb+0x123/0x280 [ 463.531713][ C0] process_backlog+0x22e/0x440 [ 463.536506][ C0] __napi_poll+0x63/0x3c0 [ 463.540862][ C0] net_rx_action+0x3a1/0x7f0 [ 463.545480][ C0] handle_softirqs+0xbf/0x280 [ 463.550183][ C0] do_softirq+0x5e/0x90 [ 463.554360][ C0] __local_bh_enable_ip+0x6e/0x70 [ 463.559403][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 463.564374][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 463.570026][ C0] process_scheduled_works+0x4db/0xa20 [ 463.575508][ C0] worker_thread+0x51d/0x6f0 [ 463.580122][ C0] kthread+0x4ae/0x520 [ 463.584227][ C0] ret_from_fork+0x4b/0x60 [ 463.588675][ C0] ret_from_fork_asm+0x1a/0x30 [ 463.593470][ C0] [ 463.595801][ C0] read-write to 0xffff88811ddc3f98 of 8 bytes by interrupt on cpu 0: [ 463.603877][ C0] can_receive+0x1b6/0x1f0 [ 463.608306][ C0] can_rcv+0xe7/0x180 [ 463.612322][ C0] __netif_receive_skb+0x123/0x280 [ 463.617457][ C0] process_backlog+0x22e/0x440 [ 463.622250][ C0] __napi_poll+0x63/0x3c0 [ 463.626599][ C0] net_rx_action+0x3a1/0x7f0 [ 463.631208][ C0] handle_softirqs+0xbf/0x280 [ 463.635911][ C0] do_softirq+0x5e/0x90 [ 463.640080][ C0] __local_bh_enable_ip+0x6e/0x70 [ 463.645129][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 463.650097][ C0] macvlan_process_broadcast+0x138/0x310 [ 463.655755][ C0] process_scheduled_works+0x4db/0xa20 [ 463.661239][ C0] worker_thread+0x51d/0x6f0 [ 463.665853][ C0] kthread+0x4ae/0x520 [ 463.669953][ C0] ret_from_fork+0x4b/0x60 [ 463.674390][ C0] ret_from_fork_asm+0x1a/0x30 [ 463.679180][ C0] [ 463.681509][ C0] value changed: 0x00000000000bd195 -> 0x00000000000bd196 [ 463.688632][ C0] [ 463.690964][ C0] Reported by Kernel Concurrency Sanitizer on: [ 463.697124][ C0] CPU: 0 UID: 0 PID: 5034 Comm: kworker/u8:12 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 463.708081][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 463.718159][ C0] Workqueue: events_unbound macvlan_process_broadcast [ 463.724945][ C0] ================================================================== [ 464.706865][ T29] kauditd_printk_skb: 252 callbacks suppressed [ 464.706881][ T29] audit: type=1400 audit(1739749020.488:2757): avc: denied { unlink } for pid=2981 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 465.356997][ C1] ================================================================== [ 465.365212][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 465.371916][ C1] [ 465.374254][ C1] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 0: [ 465.382340][ C1] can_receive+0x1ca/0x1f0 [ 465.386779][ C1] can_rcv+0xe7/0x180 [ 465.390782][ C1] __netif_receive_skb+0x123/0x280 [ 465.395916][ C1] process_backlog+0x22e/0x440 [ 465.400703][ C1] __napi_poll+0x63/0x3c0 [ 465.405055][ C1] net_rx_action+0x3a1/0x7f0 [ 465.409674][ C1] handle_softirqs+0xbf/0x280 [ 465.414383][ C1] do_softirq+0x5e/0x90 [ 465.418561][ C1] __local_bh_enable_ip+0x6e/0x70 [ 465.423612][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 465.428586][ C1] batadv_nc_purge_paths+0x220/0x270 [ 465.433904][ C1] batadv_nc_worker+0x402/0xad0 [ 465.438788][ C1] process_scheduled_works+0x4db/0xa20 [ 465.444264][ C1] worker_thread+0x51d/0x6f0 [ 465.448875][ C1] kthread+0x4ae/0x520 [ 465.452967][ C1] ret_from_fork+0x4b/0x60 [ 465.457424][ C1] ret_from_fork_asm+0x1a/0x30 [ 465.462217][ C1] [ 465.464559][ C1] read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 1: [ 465.472639][ C1] can_receive+0x1ca/0x1f0 [ 465.477087][ C1] can_rcv+0xe7/0x180 [ 465.481092][ C1] __netif_receive_skb+0x123/0x280 [ 465.486237][ C1] process_backlog+0x22e/0x440 [ 465.491048][ C1] __napi_poll+0x63/0x3c0 [ 465.495413][ C1] net_rx_action+0x3a1/0x7f0 [ 465.500032][ C1] handle_softirqs+0xbf/0x280 [ 465.504734][ C1] do_softirq+0x5e/0x90 [ 465.508916][ C1] __local_bh_enable_ip+0x6e/0x70 [ 465.513966][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 465.518936][ C1] nsim_dev_trap_report_work+0x522/0x620 [ 465.524591][ C1] process_scheduled_works+0x4db/0xa20 [ 465.530072][ C1] worker_thread+0x51d/0x6f0 [ 465.534686][ C1] kthread+0x4ae/0x520 [ 465.538783][ C1] ret_from_fork+0x4b/0x60 [ 465.543225][ C1] ret_from_fork_asm+0x1a/0x30 [ 465.548018][ C1] [ 465.550352][ C1] value changed: 0x000000000000eeb7 -> 0x000000000000eeb8 [ 465.557487][ C1] [ 465.559821][ C1] Reported by Kernel Concurrency Sanitizer on: [ 465.565980][ C1] CPU: 1 UID: 0 PID: 143 Comm: kworker/u8:4 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 465.576765][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 465.586842][ C1] Workqueue: events_unbound nsim_dev_trap_report_work [ 465.593640][ C1] ================================================================== [ 465.668330][ C1] ================================================================== [ 465.676450][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 465.683166][ C1] [ 465.685500][ C1] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 0: [ 465.693574][ C1] can_receive+0x62/0x1f0 [ 465.697919][ C1] can_rcv+0xe7/0x180 [ 465.701915][ C1] __netif_receive_skb+0x123/0x280 [ 465.707050][ C1] process_backlog+0x22e/0x440 [ 465.711838][ C1] __napi_poll+0x63/0x3c0 [ 465.716187][ C1] net_rx_action+0x3a1/0x7f0 [ 465.720803][ C1] handle_softirqs+0xbf/0x280 [ 465.725503][ C1] run_ksoftirqd+0x1c/0x30 [ 465.729948][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 465.734907][ C1] kthread+0x4ae/0x520 [ 465.738998][ C1] ret_from_fork+0x4b/0x60 [ 465.743443][ C1] ret_from_fork_asm+0x1a/0x30 [ 465.748244][ C1] [ 465.750577][ C1] read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 1: [ 465.758655][ C1] can_receive+0x62/0x1f0 [ 465.763002][ C1] can_rcv+0xe7/0x180 [ 465.766994][ C1] __netif_receive_skb+0x123/0x280 [ 465.772130][ C1] process_backlog+0x22e/0x440 [ 465.776921][ C1] __napi_poll+0x63/0x3c0 [ 465.781269][ C1] net_rx_action+0x3a1/0x7f0 [ 465.785883][ C1] handle_softirqs+0xbf/0x280 [ 465.790580][ C1] run_ksoftirqd+0x1c/0x30 [ 465.795023][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 465.799980][ C1] kthread+0x4ae/0x520 [ 465.804077][ C1] ret_from_fork+0x4b/0x60 [ 465.808519][ C1] ret_from_fork_asm+0x1a/0x30 [ 465.813310][ C1] [ 465.815642][ C1] value changed: 0x000000000000133b -> 0x000000000000133c [ 465.822757][ C1] [ 465.825085][ C1] Reported by Kernel Concurrency Sanitizer on: [ 465.831240][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 465.841933][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 465.852008][ C1] ================================================================== [ 465.877711][ C1] ================================================================== [ 465.885824][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 465.892522][ C1] [ 465.894854][ C1] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 0: [ 465.902932][ C1] can_receive+0x4e/0x1f0 [ 465.907283][ C1] can_rcv+0xe7/0x180 [ 465.911280][ C1] __netif_receive_skb+0x123/0x280 [ 465.916417][ C1] process_backlog+0x22e/0x440 [ 465.921212][ C1] __napi_poll+0x63/0x3c0 [ 465.925565][ C1] net_rx_action+0x3a1/0x7f0 [ 465.930182][ C1] handle_softirqs+0xbf/0x280 [ 465.934880][ C1] do_softirq+0x5e/0x90 [ 465.939057][ C1] __local_bh_enable_ip+0x6e/0x70 [ 465.944102][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 465.949070][ C1] addrconf_ifdown+0x3b7/0xed0 [ 465.953851][ C1] addrconf_notify+0x2ff/0x950 [ 465.958643][ C1] raw_notifier_call_chain+0x6f/0x1d0 [ 465.964041][ C1] call_netdevice_notifiers_info+0xae/0x100 [ 465.969962][ C1] unregister_netdevice_many_notify+0x98a/0x1280 [ 465.976314][ C1] unregister_netdevice_queue+0x1f4/0x220 [ 465.982054][ C1] __tun_detach+0x7db/0xae0 [ 465.986579][ C1] tun_chr_close+0x58/0xf0 [ 465.991022][ C1] __fput+0x2ac/0x640 [ 465.995018][ C1] ____fput+0x1c/0x30 [ 465.999013][ C1] task_work_run+0x13a/0x1a0 [ 466.003629][ C1] do_exit+0x5d8/0x17f0 [ 466.007814][ C1] do_group_exit+0x142/0x150 [ 466.012445][ C1] __x64_sys_exit_group+0x1f/0x20 [ 466.017499][ C1] x64_sys_call+0x2db8/0x2dc0 [ 466.022205][ C1] do_syscall_64+0xc9/0x1c0 [ 466.026737][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 466.032655][ C1] [ 466.034988][ C1] read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 1: [ 466.043066][ C1] can_receive+0x4e/0x1f0 [ 466.047408][ C1] can_rcv+0xe7/0x180 [ 466.051407][ C1] __netif_receive_skb+0x123/0x280 [ 466.056547][ C1] process_backlog+0x22e/0x440 [ 466.061335][ C1] __napi_poll+0x63/0x3c0 [ 466.065686][ C1] net_rx_action+0x3a1/0x7f0 [ 466.070299][ C1] handle_softirqs+0xbf/0x280 [ 466.074995][ C1] do_softirq+0x5e/0x90 [ 466.079168][ C1] __local_bh_enable_ip+0x6e/0x70 [ 466.084210][ C1] wg_packet_tx_worker+0x2c8/0x360 [ 466.089347][ C1] process_scheduled_works+0x4db/0xa20 [ 466.094822][ C1] worker_thread+0x51d/0x6f0 [ 466.099434][ C1] kthread+0x4ae/0x520 [ 466.103524][ C1] ret_from_fork+0x4b/0x60 [ 466.107962][ C1] ret_from_fork_asm+0x1a/0x30 [ 466.112754][ C1] [ 466.115084][ C1] value changed: 0x00000000000e1be8 -> 0x00000000000e1be9 [ 466.122200][ C1] [ 466.124531][ C1] Reported by Kernel Concurrency Sanitizer on: [ 466.130689][ C1] CPU: 1 UID: 0 PID: 5362 Comm: kworker/1:14 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 466.141556][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 466.151625][ C1] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 466.157722][ C1] ==================================================================