last executing test programs: 14.581994418s ago: executing program 4 (id=7535): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f0000000580)="03", 0x1, 0x20000800, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14.530010413s ago: executing program 4 (id=7538): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)=[{0x0, 0xfffffffffffffe8c}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0xfe77, 0x10}, 0x8000) readv(r1, &(0x7f00000001c0), 0x4) socket$kcm(0x2, 0xa, 0x2) r2 = socket$igmp6(0xa, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYRESOCT=r2], &(0x7f00000004c0)='GPL\x00', 0x2}, 0x90) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'pimreg0\x00', @link_local}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000001880)={'wg1\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)={0x40, r6, 0xa29, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PRIVATE_KEY={0x24}]}, 0x40}}, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r7, &(0x7f0000000000)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r7, &(0x7f0000000100)=ANY=[], 0x6) recvmmsg(r7, &(0x7f0000000580)=[{{&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/230, 0xe6}, {&(0x7f0000000240)=""/200, 0xc8}, {&(0x7f0000000340)=""/175, 0xaf}, {&(0x7f0000000400)=""/53, 0x35}, {&(0x7f0000000440)=""/119, 0x77}], 0x5, &(0x7f0000000540)=""/55, 0x37}}], 0x400000000000222, 0x12142, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x40, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0x40}}, 0x0) r8 = fcntl$getown(r4, 0x9) syz_open_procfs(r8, &(0x7f0000000000)='net/ip_vs_stats\x00') sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="0802000010004b0400000000000000007a000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x208}}, 0x0) 14.529288183s ago: executing program 1 (id=7548): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000500)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ff00f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@mp_fclose={0x1e, 0xc, 0x60, 0x0, 0xfffffffffffffffc}]}}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001b00)=""/4096, 0xff7}], 0x4e}}], 0x1, 0x0, 0x0) 14.495871786s ago: executing program 1 (id=7541): syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x9, 0x3, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r1, 0x0) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f0000000100)='wg1\x00', 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) ptrace(0x10, 0x1) inotify_init1(0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1}, 0x6e) connect$unix(r2, 0x0, 0x0) 13.652165858s ago: executing program 4 (id=7565): syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x9, 0x3, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r1, 0x0) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f0000000100)='wg1\x00', 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x20000000000000d8, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ptrace(0x10, 0x1) inotify_init1(0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect$unix(r3, &(0x7f0000000000)=@file={0x1}, 0x6e) connect$unix(r3, &(0x7f0000000080)=@file={0x1}, 0x6e) 8.359896168s ago: executing program 2 (id=7721): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 8.350002659s ago: executing program 2 (id=7722): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000500)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ff00f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@mp_fclose={0x1e, 0xc, 0x60, 0x0, 0xfffffffffffffffc}]}}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001b00)=""/4096, 0xff7}], 0x4e}}], 0x1, 0x0, 0x0) 8.324593831s ago: executing program 2 (id=7725): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x51) fcntl$setlease(r2, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x68102, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000005f00)=ANY=[@ANYBLOB="2800000010000100"/20, @ANYRES32=r4, @ANYBLOB="6d3082610000000008001300", @ANYRES32], 0x28}}, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) pread64(r5, &(0x7f0000001440)=""/126, 0x7e, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x1f0) r7 = request_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)='kmem_cache_free\x00', 0xfffffffffffffffd) r8 = add_key$user(&(0x7f0000000000), &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000004c0)="2c2a89327d17a9962bfbc1d5cf5f628b21e3d6737fd7da75eecb6f6999e75345fa96e50bbf08f9606ac3efcbfcdd140fd600861312acc9a9f769079feb6a47109597e5f8fc1a20ef9ebfc1819c83a7fa9800f14429093c3abb0c0727c2a5f6672e93f2235dbe63eecdbf88bfa2818d086488575dc6399e7eca51e2d3941e2829e04c214439ca262338706c6ebcf5a8490f021897", 0x94, r7) setresuid(0x0, 0x0, 0x0) keyctl$chown(0x4, r8, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x880, &(0x7f0000000280)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {@abort}, {@noblock_validity}, {@debug}, {@noinit_itable}, {@noload}, {@prjquota}, {@orlov}, {@minixdf}, {@resgid}], [{@fowner_gt}, {@seclabel}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@fowner_gt}, {@dont_measure}, {@obj_role={'obj_role', 0x3d, 'func'}}, {@smackfshat={'smackfshat', 0x3d, 'fowner>'}}]}, 0xfe, 0x43a, &(0x7f00000008c0)="$eJzs289vFFUcAPDvzLag/GpFREHQKhobf7S0oHLwotHEgyYmesBjbQtBFmpoTYQ0Wo3BoyHxbjya+Bd40otRTyZe9W5IiDYmoKea2Z0pu0u39Mcui8znkwy8t/N23/vum7fz9r1uAKU1lP2TROyIiN8iYqCebS4wVP/v2uL85D+L85NJLC29+WdSK3d1cX6yKFo8b3ueGU4j0k+TvJJms+cvnJ6oVqfP5fnRuTPvjc6ev/DMqTMTJ6dPTp8dP3bs6JGx558bf7YjcWZxXd3/4cyBfa++fen1yeOX3vnpm6y9ew/WzzfG0SlDWeB/LdW0nnu805X12M6GdNLXw4awLpWIyLqrvzb+B6IS1ztvIF75pKeNA7oquzdtbX96YQm4gyXR6xYAvVHc6LPvv8Vxi6Yet4UrL9a/AGVxX8uP+pm+SPMy/V2sfygiji/8+2V2RJfWIQAAGn2XzX+eXmn+l8behnK78j2UwYi4JyJ2R8S9EbEnIu6LqJW9PyIeWGf9rVtDN85/0ssbCmyNsvnfC/neVvP8r5j9xWAlz+2sxd+fnDhVnT6cvyfD0b81y4+tUsf3L//6ebtzjfO/7MjqL+aCeTsu97Us0E1NzE10alJ65eOI/X0rxZ8s7wQkEbEvIvav76V3FYlTT359oF2hm8e/ig7sMy19FfFEvf8XoiX+QrL6/uToXVGdPjxaXBU3+vmXi2+0q39T8XdA1v/bmq//lhIDfyeN+7Wz66/j4u+ftf1Os9Hrf0vyVm3Pekv+2AcTc3PnxiK2JK/V8k2Pj19/bpEvymfxDx9aefzvzp+Txf9gRGQX8cGIeCgiHs7b/khEPBoRh1aJ/8eXHnt34/F3Vxb/1Iqff8vX/2Bz/68/UTn9w7ft6l9b/x+tpYbzR2qffzex1gZu5r0DAACA/4s0InZEko4sp9N0ZKT+N/x7YltanZmde+rEzPtnp+q/ERiM/rRY6RpoWA8dSxbyV6znx/O14uL8kXzd+IvK3bX8yORMdarHsUPZbW8z/jN/VHrdOqDr/F4Lyqt1/Kc9agdw67n/Q3kZ/1Bexj+U10rj/6OWvL0AuDO5/0N5Gf9QXsY/lJfxD6W0md/1S5Q5Eelt0QyJLiV6/ckEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQGf8FAAD//yWS7pw=") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) r9 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r9, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0xfffffffd, @local, 0x3}, 0x80, &(0x7f00000029c0)=[{&(0x7f00000016c0)="83", 0x1}], 0x1}, 0x41) fcntl$setlease(r6, 0x400, 0x1) setsockopt$packet_int(r5, 0x107, 0xb, &(0x7f0000000140)=0x6, 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff003, 0x66, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480), &(0x7f00000002c0), 0x7, r10}, 0x38) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r10, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000000c0)=0x90) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x7ffffffc, 0x3, 0x2, 0xfffffffc, 0x0, "c7eded010000000000000000804000"}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x400, 0x0, 0x4, 0x0, 0x0, "4415264a88b82c522013fb235902af2556c6b6"}) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0) 8.060746704s ago: executing program 2 (id=7731): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x3, &(0x7f0000000c00)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socket$inet6(0xa, 0x3, 0x8000000003c) 8.047244755s ago: executing program 2 (id=7732): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 8.038349845s ago: executing program 2 (id=7733): syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x9, 0x3, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r1, 0x0) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f0000000100)='wg1\x00', 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x20000000000000d8, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ptrace(0x10, 0x1) inotify_init1(0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect$unix(r3, &(0x7f0000000000)=@file={0x1}, 0x6e) connect$unix(r3, &(0x7f0000000080)=@file={0x1}, 0x6e) 4.078475793s ago: executing program 3 (id=7786): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000006c0)='./bus\x00', 0x532e612e25ad387b, &(0x7f0000000640), 0x41, 0x451, &(0x7f0000000a00)="$eJzs289rHFUcAPDvzOaH9ldirdXWVqNVDIpJk1btwUtFwYOCoId6jElaSreNNBFsKRpF6lEK3otHwb/Ak15EPQle9S6FokVo9bQyuzPJ7iab5scmm7qfD2z2vZm3+953Z97M2/eyAXStoexPErErIn6LiIFatrHAUO3pzq0rk//cujKZRKXy9p9JtdztW1cmi6LF63bmmeE0Iv0syStpNHvp8rmJcnn6Yp4fnTv//ujspcvPnz0/cWb6zPSF8RMnjh8be+nF8RfaEmcW1+2DH80cOvD6u9fenDx17b2fvsnau/9wbX99HO0ylAX+V6Wqed/T7a6sw3bXpZOeDjaENSlFRHa4eqv9fyBKsXjwBuK1TzvaOGBTZfem/ta75yvN+pdsAe5ZSXS6BUBnFDf67Ptv8diioce2cPNk7QtQFved/FHb0xNpXqZ3E+sfiqjk8ybXY5PmIQAA6n13srpUM790/JfG/rpye/I1lMGIeCAi9kbEgxGxLyIeiqiWfTgiHllj/c1LQ0vHP+mNdQW2Stn47+V8batx/FeM/mKwlOd2V+PvTU6fLU8fzT+T4ejtz/JjK9Tx/au/ftFqXxb/qfl/rxePrP7sebFEeqOnaYJuamJuol2D0pufRBzsWS7+ZGElIBufHoiIg2t76z1F4uyzXx9qVeju8a+gDetMla8inqkd//loir+QrLw+OXpflKePjhZnxVI//3L1rVb1byj+NsiO/47G87+pxMDfSf167eza67j6++ctv9Os9/zvS96prln35ds+nJibuzgW0Ze8Uc03bB9ffG2RL8pn8Q8fWb7/781fk8X/aERkJ/HhiHgsIh7P2/5ERDwZEUdWiP/HV55aZgV8tfFvriz+qWWvfwvn/2Dj8V97onTuh29b1b+643+8mhrOt1Svf3ex2gZu5LMDAACAe0UaEbsiSUcW0mk6MlL7H/59sSMtz8zOPXd65oMLU7XfCAxGb1rMdA3UzYeOJfP5O9by4/lccbH/WD5v/GXp/mp+ZHKmPNXh2KHb7WzR/zN/lDrdOmDT+b0WdK/m/p92qB3A1nP/h+6l/0P30v+hey3X/z9uylsLgP8n93/oXvo/dC/9H7qX/g9daSO/65fo5kSkLXf1xbZoYccT/dujGetLtLxkJFt6gQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANig/wIAAP//mmXpRA==") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYRES32=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080), 0x16) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x3, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r1, @ANYRES16], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000090400"/20, @ANYRES32=r5, @ANYBLOB="000000000000000034001280110000006272696467655f736c61766500"], 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0) r6 = syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x20040a, &(0x7f00000001c0)={[{@grpjquota}, {@errors_continue}, {@abort}, {@bsdgroups}]}, 0x12, 0x51a, &(0x7f0000001200)="$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") quotactl$Q_SETINFO(0xffffffff80000600, &(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000700)='./bus\x00', 0x1200840, &(0x7f0000000880)=ANY=[@ANYRESHEX], 0x3, 0x377, &(0x7f00000002c0)="$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") r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r7, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r7, 0x29, 0x30, &(0x7f0000000500)={0xb, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @private1}}, {{0xa, 0x0, 0x0, @private1}}]}, 0x190) syz_emit_ethernet(0x42, &(0x7f0000000380)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0xc, 0x11, 0x0, @private1, @mcast2, {[], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) mmap(&(0x7f0000821000/0xf000)=nil, 0xf000, 0xb635773f06ebbee7, 0x4010, r6, 0xffffc000) semget$private(0x0, 0x3, 0x864ee8df52df9e4) socketpair$unix(0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000540)={0x0, 0x12}, &(0x7f0000000580)) 3.975378382s ago: executing program 3 (id=7787): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000080)=ANY=[], 0x15) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) 3.954618284s ago: executing program 3 (id=7788): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001b00)=""/4096, 0xff7}], 0x4e}}], 0x1, 0x0, 0x0) 3.948195184s ago: executing program 3 (id=7789): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000"], 0x0}, 0x90) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r3) 3.744181801s ago: executing program 3 (id=7791): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 3.713949424s ago: executing program 3 (id=7792): syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x9, 0x3, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r1, 0x0) setsockopt$SO_BINDTODEVICE_wg(r1, 0x1, 0x19, &(0x7f0000000100)='wg1\x00', 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) ptrace(0x10, 0x1) inotify_init1(0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1}, 0x6e) connect$unix(r2, 0x0, 0x0) 1.706532875s ago: executing program 1 (id=7782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) socket$inet6_udp(0xa, 0x2, 0x0) r4 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000280)=0x60, 0x800) getsockname(r4, &(0x7f0000000340)=@in={0x2, 0x0, @empty}, &(0x7f00000002c0)=0x80) r5 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$eJzs3M9r034YwPGn6dZ0+7Ifpy/oxQe96CXMelQPVTYQC0q3inoQMpZpaG1HErQVwZw97e8YHr0J4j+w/8LbEGSnnYyszbKs+4Wza2f7fkHJkzz5tE8SUp5PId16uv66uupbq3YgRl7FEAllR2RWXNmTiZe5dpxLtsvdgoRyY+7N9sfFZ88fFkul+bLqQnHpVkFVp698ffv+09VvwX9PPk+bpmzOvtj6Wfi++f/mpa1fS69cX11f641AbV1uNAJ7ueboiutXLdXHNcf2HXXrvuMdyK/WGmtrLbXrK1OTa57j+2rXW2pIS4OG5uOq6mpZlk5N7sZ5GSG5Px5R2SiX7eK5FIMLw/OKdlZEJg7dDZWNwVQEAAAG6fj+30j22ev/je7+X+SU/v9DvNf0l573/1lJ+v+q0+7/A6+l9kvbTff/ONHZ+n/jfIrB38iEqZV7B1KeV5w4ehD9PwAAAAAAAAAAAAAAAAAAAAAA/4KdKJqJomhmd2mISBSvmyKSTa0fMXSknq0fVunrH6VeZnyBT7j+GAKpB/fyIj/CZqVZybSXnfzCg9L8nLalHvzbbjYr2SR/s5PXg/lxmYzzhSPzObl+rZPfzd1/VErn15uVCVk5sfKwV6cAAAAAAIChZ2liNtmYl2R+b1lqSne+PX/vROH+7wNd8/sxuTzWv+MAAAAAAADH81vvqnat5nj9CbJ9/KwzByJnG347MntSRlZETtmnvCgy+BN1KDDlQpQxzMGdnr1hlBHpbBmPvwy67gIAAAAAw2V/PjDoSgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGF39+OuyQR8jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcFH8DgAA//8sg70h") syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000a40)='.\x00', 0x1a4243c, &(0x7f00000006c0)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRESOCT=0x0, @ANYBLOB="f1bcde2281a84392f4e66ff7ef22aa9af727ceae8a8ec95fc1b73083de2de825a0cb2b0be774fdb33650d7dace27c16bc23b2f7c7fb72585548939698f280d138aa9255a8a924008f8477e82ba11cdb11efd5ca2f1ab049ce2ccc415d2daf8dac725533a558d561654faf5e0924f1376174f374d664fad4a6ab24ec0e822e7f9426e8e5de1fe58085a0ae86fd02a118b9365961834d46208b9fb4cb1a1fa962a8b0000dc2e319379ea1e5a07aeb3f9cd4e648df4dd18e6253e7b2310a78d63a232a2a40758027a472e7d263ef567a84166f26ee56e701c63a886378788a512f28edec086b1c0823c028840eeaf3f5d8769023c01218614f4fa40be9892e7a285ac63f7f97aaa5b8ecc86e28c6193bc21a2b833e5c9c703c4cfa063dd34c245706bde3d7ac373ab04b62b4111b59eabd436dd97e788a36ef25bad99be2aa924949558c800"/353, @ANYRESDEC=r5, @ANYRES16, @ANYRESDEC=0x0, @ANYRES32, @ANYRESOCT=r5, @ANYRES64], 0x0, 0x0, &(0x7f0000000000)) r6 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r6, &(0x7f00000008c0), &(0x7f0000000900)=0xc) open(&(0x7f0000000000)='./file1\x00', 0x14927e, 0x84) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r2, &(0x7f0000000040)=0xc6, r1, &(0x7f0000000180)=0x8000, 0x8, 0x8) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0xa400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') ppoll(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) socket$qrtr(0x2a, 0x2, 0x0) 1.682117857s ago: executing program 1 (id=7811): r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x9200000000000000) dup3(r1, r0, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/207, 0xcf}], 0x1}, 0x0) 975.695417ms ago: executing program 4 (id=7794): socket(0x11, 0x800000003, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0xc, 0x0, &(0x7f0000000000)="e06921e8682d85ff9782762f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1206"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x90) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) 940.36699ms ago: executing program 0 (id=7813): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = epoll_create1(0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x2000000000000119, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) socket(0x1, 0x803, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x20, 0x30}, 0xc) sendto$inet6(r6, &(0x7f00000002c0)="ba", 0x1, 0x8004, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback, 0x2}, 0x1c) 919.258142ms ago: executing program 0 (id=7814): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = socket$kcm(0x10, 0x2, 0x4) close(r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f00000000c0)="5c00000014006b02c84e21100af32c6e0a0675f8d34460400000000000005c1e6182949a36c23d3b48dfd8cdbf9367b498fa51f60a64c9f4d493803792684b71bdd70000b6c0504bb9183132be471b93c91b5d7870743719b4b53cf2", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="e03f030013006bcd9e3fe3dc6e48aa31086b8700350000007ea60264160af3653c002e000d000af08bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 899.928864ms ago: executing program 0 (id=7815): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000180)=ANY=[]) 889.478004ms ago: executing program 0 (id=7816): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001b00)=""/4096, 0xff7}], 0x4e}}], 0x1, 0x0, 0x0) 877.758406ms ago: executing program 0 (id=7817): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd']) 854.163228ms ago: executing program 0 (id=7818): r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000240)={[{@user_xattr}, {@nombcache}, {@noblock_validity}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x562, &(0x7f0000000980)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$key(0xf, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x2006}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000440)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) setxattr$system_posix_acl(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000800040000"], 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 833.85353ms ago: executing program 4 (id=7819): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) 833.05126ms ago: executing program 1 (id=7820): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001b00)=""/4096, 0xff7}], 0x4e}}], 0x1, 0x0, 0x0) 819.417051ms ago: executing program 1 (id=7821): r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000240)={[{@user_xattr}, {@nombcache}, {@noblock_validity}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x562, &(0x7f0000000980)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$key(0xf, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x2006}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000440)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) setxattr$system_posix_acl(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000001000000000008000400000000000000100003000000000020"], 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 0s ago: executing program 4 (id=7822): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000600), &(0x7f0000000640)=r4}, 0x1c) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xc586, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5}, 0x48) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): ntered promiscuous mode [ 737.351240][T31097] 9pnet_fd: Insufficient options for proto=fd [ 737.365193][T31017] veth0_macvtap: entered promiscuous mode [ 737.375579][T31017] veth1_macvtap: entered promiscuous mode [ 737.385734][T31017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 737.396262][T31017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.407085][T31017] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 737.417186][T31017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 737.427638][T31017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.438629][T31017] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 737.448754][T31017] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.457583][T31017] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.466358][T31017] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.475038][T31017] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.499228][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 737.581239][T31112] pim6reg1: entered promiscuous mode [ 737.586701][T31112] pim6reg1: entered allmulticast mode [ 737.704489][T31126] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 737.721076][T31132] 9pnet_fd: Insufficient options for proto=fd [ 737.773862][T31141] 9pnet_fd: Insufficient options for proto=fd [ 737.782982][T31116] chnl_net:caif_netlink_parms(): no params data found [ 737.818680][T31116] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.825903][T31116] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.833270][T31116] bridge_slave_0: entered allmulticast mode [ 737.839878][T31116] bridge_slave_0: entered promiscuous mode [ 737.846735][T31116] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.853830][T31116] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.861197][T31116] bridge_slave_1: entered allmulticast mode [ 737.867793][T31116] bridge_slave_1: entered promiscuous mode [ 737.884390][T31116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 737.894926][T31116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 737.913233][T15399] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 737.929360][T31116] team0: Port device team_slave_0 added [ 737.936184][T31116] team0: Port device team_slave_1 added [ 737.950109][T31116] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 737.957102][T31116] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 737.983104][T31116] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 737.994419][T31116] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 738.001403][T31116] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 738.027477][T31116] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 738.041082][T15399] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 738.070367][T31116] hsr_slave_0: entered promiscuous mode [ 738.076613][T31116] hsr_slave_1: entered promiscuous mode [ 738.082613][T31116] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 738.090217][T31116] Cannot create hsr debugfs directory [ 738.098935][T15399] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 738.169051][T15399] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 738.357433][T15399] bond0 (unregistering): Released all slaves [ 738.461544][T15399] hsr_slave_0: left promiscuous mode [ 738.467489][T15399] hsr_slave_1: left promiscuous mode [ 738.474411][T15399] veth1_macvtap: left promiscuous mode [ 738.479946][T15399] veth0_macvtap: left promiscuous mode [ 738.485525][T15399] veth1_vlan: left promiscuous mode [ 738.490876][T15399] veth0_vlan: left promiscuous mode [ 738.807750][T31116] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 738.816323][T31116] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 738.825792][T31116] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 738.834806][T31116] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 738.873106][T31116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 738.886411][T31116] 8021q: adding VLAN 0 to HW filter on device team0 [ 738.896573][T15397] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.903680][T15397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.915573][T15397] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.922670][T15397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.946737][T31116] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 738.993574][T31116] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 739.055059][T31116] veth0_vlan: entered promiscuous mode [ 739.062635][T31116] veth1_vlan: entered promiscuous mode [ 739.076575][T31116] veth0_macvtap: entered promiscuous mode [ 739.084148][T31116] veth1_macvtap: entered promiscuous mode [ 739.093869][T31116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.104366][T31116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.114294][T31116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.124805][T31116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.136224][T31116] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 739.144623][T31116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.155274][T31116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.165330][T31116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.175815][T31116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.186531][T31116] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 739.198902][T31116] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.207669][T31116] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.216574][T31116] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.225454][T31116] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.291180][T31193] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 739.333388][T31199] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 739.373076][T31203] pim6reg1: entered promiscuous mode [ 739.378518][T31203] pim6reg1: entered allmulticast mode [ 740.561623][T31211] 9pnet_fd: Insufficient options for proto=fd [ 740.639000][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 740.849225][T31216] bridge_slave_0: left allmulticast mode [ 740.854899][T31216] bridge_slave_0: left promiscuous mode [ 740.860788][T31216] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.869183][T31216] bridge_slave_1: left allmulticast mode [ 740.874806][T31216] bridge_slave_1: left promiscuous mode [ 740.880449][T31216] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.889998][T31216] bond0: (slave bond_slave_0): Releasing backup interface [ 740.900576][T31216] bond0: (slave bond_slave_1): Releasing backup interface [ 740.912627][T31216] team0: Port device team_slave_0 removed [ 740.926371][T31216] team0: Port device team_slave_1 removed [ 740.933409][T31216] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 740.940878][T31216] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 740.950087][T31216] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 740.957594][T31216] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 741.053501][T31221] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 741.102333][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 741.102348][ T29] audit: type=1326 audit(1725003943.071:14821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.132131][ T29] audit: type=1326 audit(1725003943.071:14822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.138451][T31231] pim6reg1: entered promiscuous mode [ 741.155821][ T29] audit: type=1326 audit(1725003943.071:14823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.161062][T31231] pim6reg1: entered allmulticast mode [ 741.184621][ T29] audit: type=1326 audit(1725003943.071:14824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.213721][ T29] audit: type=1326 audit(1725003943.071:14825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.237389][ T29] audit: type=1326 audit(1725003943.071:14826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.261032][ T29] audit: type=1326 audit(1725003943.071:14827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.284606][ T29] audit: type=1326 audit(1725003943.071:14828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.308309][ T29] audit: type=1326 audit(1725003943.071:14829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 741.332044][ T29] audit: type=1326 audit(1725003943.071:14830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31228 comm="syz.0.6861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 742.577410][T31243] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6868'. [ 743.380711][T31250] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 743.389330][T31250] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 743.411440][T31250] random: crng reseeded on system resumption [ 744.329956][T31273] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 744.376865][T31281] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 744.385372][T31281] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 744.407446][T31281] random: crng reseeded on system resumption [ 745.151174][T31290] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 745.654075][T31292] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 746.087868][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 746.328328][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 746.619794][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 746.661177][T31328] pim6reg1: entered promiscuous mode [ 746.666580][T31328] pim6reg1: entered allmulticast mode [ 746.788625][T31335] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 746.875001][T31347] 9pnet_fd: Insufficient options for proto=fd [ 746.936826][T31355] pim6reg1: entered promiscuous mode [ 746.942236][T31355] pim6reg1: entered allmulticast mode [ 746.968195][T31336] chnl_net:caif_netlink_parms(): no params data found [ 746.999162][T31336] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.006266][T31336] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.014139][T31336] bridge_slave_0: entered allmulticast mode [ 747.020834][T31336] bridge_slave_0: entered promiscuous mode [ 747.027773][T31336] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.034912][T31336] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.042068][T31336] bridge_slave_1: entered allmulticast mode [ 747.049623][T31336] bridge_slave_1: entered promiscuous mode [ 747.063507][T15399] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 747.084558][T31336] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 747.094947][T31336] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 747.111074][T15399] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 747.127888][T31336] team0: Port device team_slave_0 added [ 747.134409][T31336] team0: Port device team_slave_1 added [ 747.150872][T31336] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 747.158089][T31336] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 747.184546][T31336] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 747.198610][T15399] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 747.210144][T31336] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 747.217362][T31336] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 747.243567][T31336] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 747.267251][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 747.267263][ T29] audit: type=1326 audit(1725003949.241:14871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.296948][ T29] audit: type=1326 audit(1725003949.241:14872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.321310][ T29] audit: type=1326 audit(1725003949.241:14873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.344951][ T29] audit: type=1326 audit(1725003949.241:14874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.368867][ T29] audit: type=1326 audit(1725003949.241:14875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.392542][ T29] audit: type=1326 audit(1725003949.241:14876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.416115][ T29] audit: type=1326 audit(1725003949.241:14877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.439848][ T29] audit: type=1326 audit(1725003949.241:14878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.463525][ T29] audit: type=1326 audit(1725003949.241:14879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.487247][ T29] audit: type=1326 audit(1725003949.241:14880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31363 comm="syz.0.6914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90add09ef9 code=0x7ffc0000 [ 747.512405][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 747.523084][T15399] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 747.536258][T31336] hsr_slave_0: entered promiscuous mode [ 747.542213][T31336] hsr_slave_1: entered promiscuous mode [ 747.618431][T15399] bridge_slave_1: left allmulticast mode [ 747.624171][T15399] bridge_slave_1: left promiscuous mode [ 747.630002][T15399] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.638348][T15399] bridge_slave_0: left allmulticast mode [ 747.644004][T15399] bridge_slave_0: left promiscuous mode [ 747.649702][T15399] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.728689][T15399] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 747.738924][T15399] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 747.749073][T15399] bond0 (unregistering): Released all slaves [ 747.877734][T15399] hsr_slave_0: left promiscuous mode [ 747.883474][T15399] hsr_slave_1: left promiscuous mode [ 747.889292][T15399] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 747.896784][T15399] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 747.908608][T15399] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 747.916120][T15399] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 747.932621][T15399] veth1_macvtap: left promiscuous mode [ 747.938287][T15399] veth0_macvtap: left promiscuous mode [ 747.943902][T15399] veth1_vlan: left promiscuous mode [ 747.949319][T15399] veth0_vlan: left promiscuous mode [ 748.081693][T15399] team0 (unregistering): Port device team_slave_1 removed [ 748.091958][T15399] team0 (unregistering): Port device team_slave_0 removed [ 748.311694][T31336] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 748.324975][T31336] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 748.346355][T31336] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 748.363600][T31336] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 748.390277][T31414] chnl_net:caif_netlink_parms(): no params data found [ 748.414011][T31411] chnl_net:caif_netlink_parms(): no params data found [ 748.471774][T31411] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.478900][T31411] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.486215][T31411] bridge_slave_0: entered allmulticast mode [ 748.492607][T31411] bridge_slave_0: entered promiscuous mode [ 748.499949][T31414] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.507082][T31414] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.514856][T31414] bridge_slave_0: entered allmulticast mode [ 748.521502][T31414] bridge_slave_0: entered promiscuous mode [ 748.529018][T31411] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.536110][T31411] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.543888][T31411] bridge_slave_1: entered allmulticast mode [ 748.550593][T31411] bridge_slave_1: entered promiscuous mode [ 748.563874][T31414] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.571021][T31414] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.578445][T31414] bridge_slave_1: entered allmulticast mode [ 748.584995][T31414] bridge_slave_1: entered promiscuous mode [ 748.593970][T31473] 9pnet_fd: Insufficient options for proto=fd [ 748.603246][T15399] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 748.621844][T31475] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 748.634488][T31411] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 748.650579][T31414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 748.661193][T31411] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 748.676555][T31414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 748.688391][T15399] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 748.717478][T31411] team0: Port device team_slave_0 added [ 748.723997][T31411] team0: Port device team_slave_1 added [ 748.730569][T31414] team0: Port device team_slave_0 added [ 748.738551][T31414] team0: Port device team_slave_1 added [ 748.760814][T15399] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 748.776526][T31411] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 748.783473][T31411] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 748.809456][T31411] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 748.822267][T31411] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 748.829255][T31411] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 748.855343][T31411] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 748.867220][T31414] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 748.874186][T31414] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 748.900143][T31414] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 748.919751][T31336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 748.928939][T15399] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 748.942312][T31414] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 748.949280][T31414] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 748.975407][T31414] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 749.003445][T31414] hsr_slave_0: entered promiscuous mode [ 749.009474][T31414] hsr_slave_1: entered promiscuous mode [ 749.015348][T31414] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 749.022975][T31414] Cannot create hsr debugfs directory [ 749.047555][T31411] hsr_slave_0: entered promiscuous mode [ 749.053723][T31411] hsr_slave_1: entered promiscuous mode [ 749.059819][T31411] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 749.067446][T31411] Cannot create hsr debugfs directory [ 749.081026][T31336] 8021q: adding VLAN 0 to HW filter on device team0 [ 749.104691][T15397] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.111949][T15397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 749.155947][T15397] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.163009][T15397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.196278][T15399] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.259372][T15399] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.293664][T31336] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 749.342301][T15399] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.441443][T15399] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.464763][T31336] veth0_vlan: entered promiscuous mode [ 749.478124][T31336] veth1_vlan: entered promiscuous mode [ 749.495312][T31336] veth0_macvtap: entered promiscuous mode [ 749.502884][T31336] veth1_macvtap: entered promiscuous mode [ 749.513632][T31336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 749.524346][T31336] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 749.535197][T31336] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 749.559461][T31336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 749.570083][T31336] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 749.581014][T31336] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 749.758018][T15399] bond0 (unregistering): Released all slaves [ 749.767506][T15399] bond1 (unregistering): Released all slaves [ 749.775825][T15399] bond0 (unregistering): Released all slaves [ 749.796640][T31336] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.805370][T31336] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.814111][T31336] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.822844][T31336] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.841352][T31414] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 749.857261][T31414] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 749.867657][T31414] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 749.882590][T31414] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 749.936444][T15399] hsr_slave_0: left promiscuous mode [ 749.947201][T15399] hsr_slave_1: left promiscuous mode [ 749.957155][T15399] hsr_slave_0: left promiscuous mode [ 749.966264][T15399] hsr_slave_1: left promiscuous mode [ 749.975462][T15399] veth1_macvtap: left promiscuous mode [ 749.981023][T15399] veth0_macvtap: left promiscuous mode [ 749.986605][T15399] veth1_vlan: left promiscuous mode [ 749.991913][T15399] veth0_vlan: left promiscuous mode [ 749.998378][T15399] veth1_macvtap: left promiscuous mode [ 750.003979][T15399] veth0_macvtap: left promiscuous mode [ 750.009510][T15399] veth1_vlan: left promiscuous mode [ 750.014791][T15399] veth0_vlan: left promiscuous mode [ 750.078544][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 750.230180][T31414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 750.247395][T31414] 8021q: adding VLAN 0 to HW filter on device team0 [ 750.258669][T15401] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.265810][T15401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.271305][T31546] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 750.293383][T15409] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.300560][T15409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 750.378538][T31411] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 750.388012][T31411] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 750.399355][T31411] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 750.410839][T31414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 750.420300][T31411] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 750.474857][T31411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 750.489880][T31411] 8021q: adding VLAN 0 to HW filter on device team0 [ 750.499935][T15397] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.507015][T15397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.518854][T15397] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.526122][T15397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 750.553369][T31414] veth0_vlan: entered promiscuous mode [ 750.566837][T31414] veth1_vlan: entered promiscuous mode [ 750.596444][T31414] veth0_macvtap: entered promiscuous mode [ 750.604296][T31414] veth1_macvtap: entered promiscuous mode [ 750.615627][T31414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 750.626203][T31414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.636041][T31414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 750.646546][T31414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.657804][T31414] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 750.666716][T31414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 750.677169][T31414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.687038][T31414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 750.697584][T31414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.708421][T31414] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 750.722082][T31414] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 750.730933][T31414] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 750.739689][T31414] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 750.748398][T31414] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 750.768884][T31411] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 750.845006][T31411] veth0_vlan: entered promiscuous mode [ 750.854507][T31411] veth1_vlan: entered promiscuous mode [ 750.869431][T31411] veth0_macvtap: entered promiscuous mode [ 750.876969][T31411] veth1_macvtap: entered promiscuous mode [ 750.888370][T31411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 750.899054][T31411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.908934][T31411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 750.919415][T31411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.929300][T31411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 750.939879][T31411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.950639][T31411] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 750.959920][T31411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 750.970568][T31411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.980472][T31411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 750.990933][T31411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 751.000750][T31411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 751.011196][T31411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 751.022688][T31411] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 751.037822][T31411] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.047603][T31411] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.056855][T31411] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.065531][T31411] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.116344][T31602] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6922'. [ 751.180053][T31612] pim6reg1: entered promiscuous mode [ 751.185387][T31612] pim6reg1: entered allmulticast mode [ 751.361301][T31621] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 751.371391][T31621] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 751.597025][T31645] 9pnet_fd: Insufficient options for proto=fd [ 751.656315][T31654] 9pnet_fd: Insufficient options for proto=fd [ 751.697581][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 751.738399][T31663] 9pnet_fd: Insufficient options for proto=fd [ 751.788264][T31671] 9pnet_fd: Insufficient options for proto=fd [ 751.869118][T31679] 9pnet_fd: Insufficient options for proto=fd [ 751.898929][T31683] pim6reg1: entered promiscuous mode [ 751.904266][T31683] pim6reg1: entered allmulticast mode [ 752.114164][T31691] 9pnet_fd: Insufficient options for proto=fd [ 752.158833][T31695] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 752.186325][T31699] 9pnet_fd: Insufficient options for proto=fd [ 752.204673][T31701] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 752.213317][T31701] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 752.236157][T31701] random: crng reseeded on system resumption [ 752.987173][T31710] 9pnet_fd: Insufficient options for proto=fd [ 753.004884][T31712] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 753.013425][T31712] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 753.544398][T31716] pim6reg1: entered promiscuous mode [ 753.549770][T31716] pim6reg1: entered allmulticast mode [ 754.383538][T31722] 9pnet_fd: Insufficient options for proto=fd [ 754.427553][T31726] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 754.449537][T31730] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 754.462162][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 754.462174][ T29] audit: type=1326 audit(1725003956.431:14925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.492180][ T29] audit: type=1326 audit(1725003956.431:14926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.515960][ T29] audit: type=1326 audit(1725003956.431:14927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.539539][ T29] audit: type=1326 audit(1725003956.431:14928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.563133][ T29] audit: type=1326 audit(1725003956.431:14929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.587025][ T29] audit: type=1326 audit(1725003956.431:14930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.610574][ T29] audit: type=1326 audit(1725003956.431:14931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.634202][ T29] audit: type=1326 audit(1725003956.431:14932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.657863][ T29] audit: type=1326 audit(1725003956.431:14933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 754.681538][ T29] audit: type=1326 audit(1725003956.431:14934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31729 comm="syz.1.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 755.188467][T31740] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 755.197880][T31740] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 755.304493][T31744] 9pnet_fd: Insufficient options for proto=fd [ 755.379502][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 755.573212][T31750] 9pnet_fd: Insufficient options for proto=fd [ 755.783591][T31768] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 755.901492][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 756.087500][T31782] 9pnet_fd: Insufficient options for proto=fd [ 756.156930][T31792] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7020'. [ 756.212981][T31794] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 756.290218][T31802] 9pnet_fd: Insufficient options for proto=fd [ 756.440381][T31818] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7031'. [ 756.477673][T31820] 9pnet_fd: Insufficient options for proto=fd [ 756.511685][T31822] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 756.641689][T31835] 9pnet_fd: Insufficient options for proto=fd [ 756.738227][T31849] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7043'. [ 756.756218][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 756.770618][T31851] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 756.837477][T31861] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 757.720329][T31885] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7057'. [ 757.769514][T31899] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 757.780074][T31899] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 757.813660][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 757.849315][T31888] chnl_net:caif_netlink_parms(): no params data found [ 757.881816][T31888] bridge0: port 1(bridge_slave_0) entered blocking state [ 757.889068][T31888] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.896300][T31888] bridge_slave_0: entered allmulticast mode [ 757.902704][T31888] bridge_slave_0: entered promiscuous mode [ 757.909788][T31888] bridge0: port 2(bridge_slave_1) entered blocking state [ 757.916901][T31888] bridge0: port 2(bridge_slave_1) entered disabled state [ 757.924173][T31888] bridge_slave_1: entered allmulticast mode [ 757.930763][T31888] bridge_slave_1: entered promiscuous mode [ 757.949796][T31888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 757.960179][T31888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 757.978166][T15399] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 757.994603][T31888] team0: Port device team_slave_0 added [ 758.001246][T31888] team0: Port device team_slave_1 added [ 758.016639][T31888] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 758.023671][T31888] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 758.049650][T31888] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 758.061261][T31888] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 758.068287][T31888] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 758.094435][T31888] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 758.110026][T15399] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.139975][T31888] hsr_slave_0: entered promiscuous mode [ 758.146739][T31888] hsr_slave_1: entered promiscuous mode [ 758.152900][T31888] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 758.160671][T31888] Cannot create hsr debugfs directory [ 758.182398][T15399] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.224917][T15399] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.258503][T31927] bridge_slave_0: left allmulticast mode [ 758.264223][T31927] bridge_slave_0: left promiscuous mode [ 758.269885][T31927] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.278897][T31927] bridge_slave_1: left allmulticast mode [ 758.284521][T31927] bridge_slave_1: left promiscuous mode [ 758.290283][T31927] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.299692][T31927] bond0: (slave bond_slave_0): Releasing backup interface [ 758.310228][T31927] bond0: (slave bond_slave_1): Releasing backup interface [ 758.326588][T31927] team0: Port device team_slave_0 removed [ 758.337337][T31927] team0: Port device team_slave_1 removed [ 758.344288][T31927] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 758.351717][T31927] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 758.360478][T31927] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 758.368052][T31927] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 758.436654][T15399] bridge_slave_1: left allmulticast mode [ 758.442313][T15399] bridge_slave_1: left promiscuous mode [ 758.448150][T15399] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.459226][T15399] bridge_slave_0: left allmulticast mode [ 758.464903][T15399] bridge_slave_0: left promiscuous mode [ 758.470652][T15399] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.558387][T31955] 9pnet_fd: Insufficient options for proto=fd [ 758.619224][T15399] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 758.636026][T15399] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 758.649706][T15399] bond0 (unregistering): Released all slaves [ 758.715567][T31968] bridge_slave_0: left allmulticast mode [ 758.721400][T31968] bridge_slave_0: left promiscuous mode [ 758.727309][T31968] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.742715][T31968] bridge_slave_1: left allmulticast mode [ 758.748465][T31968] bridge_slave_1: left promiscuous mode [ 758.754173][T31968] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.848555][T31968] bond0: (slave bond_slave_0): Releasing backup interface [ 758.864664][T31968] bond0: (slave bond_slave_1): Releasing backup interface [ 758.886771][T31968] team0: Port device team_slave_0 removed [ 758.903268][T31968] team0: Port device team_slave_1 removed [ 758.918097][T31968] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 758.925586][T31968] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 758.937657][T31968] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 758.945074][T31968] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 758.989049][T15399] hsr_slave_0: left promiscuous mode [ 759.004294][T15399] hsr_slave_1: left promiscuous mode [ 759.019719][T15399] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 759.027193][T15399] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 759.035542][T15399] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 759.043135][T15399] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 759.051760][T15399] veth1_macvtap: left promiscuous mode [ 759.057413][T15399] veth0_macvtap: left promiscuous mode [ 759.063038][T15399] veth1_vlan: left promiscuous mode [ 759.068418][T15399] veth0_vlan: left promiscuous mode [ 759.136909][T15399] team0 (unregistering): Port device team_slave_1 removed [ 759.147059][T15399] team0 (unregistering): Port device team_slave_0 removed [ 759.231238][T32003] pim6reg1: entered promiscuous mode [ 759.236641][T32003] pim6reg1: entered allmulticast mode [ 759.340112][T31888] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 759.349779][T31888] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 759.358828][T31888] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 759.368928][T31888] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 759.414350][T32023] bridge_slave_0: left allmulticast mode [ 759.420307][T32023] bridge_slave_0: left promiscuous mode [ 759.426051][T32023] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.434494][T32023] bridge_slave_1: left allmulticast mode [ 759.440259][T32023] bridge_slave_1: left promiscuous mode [ 759.445947][T32023] bridge0: port 2(bridge_slave_1) entered disabled state [ 759.455442][T32023] bond0: (slave bond_slave_0): Releasing backup interface [ 759.465260][T32023] bond0: (slave bond_slave_1): Releasing backup interface [ 759.477477][T32023] team0: Port device team_slave_0 removed [ 759.487872][T32023] team0: Port device team_slave_1 removed [ 759.494553][T32023] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 759.502064][T32023] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 759.510125][T32023] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 759.517557][T32023] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 759.544292][T31888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 759.564722][T31888] 8021q: adding VLAN 0 to HW filter on device team0 [ 759.581527][T15402] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.588614][T15402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 759.602128][T15402] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.609284][T15402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 759.665977][T31888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 759.713401][T32037] pim6reg1: entered promiscuous mode [ 759.719029][T32037] pim6reg1: entered allmulticast mode [ 759.740234][T31888] veth0_vlan: entered promiscuous mode [ 759.748681][T31888] veth1_vlan: entered promiscuous mode [ 759.762541][T31888] veth0_macvtap: entered promiscuous mode [ 759.770528][T31888] veth1_macvtap: entered promiscuous mode [ 759.781529][T31888] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 759.792400][T31888] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 759.802172][T31888] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.811036][T31888] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.819748][T31888] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.828471][T31888] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.889644][T32046] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 760.499749][T32069] pim6reg1: entered promiscuous mode [ 760.505115][T32069] pim6reg1: entered allmulticast mode [ 760.709132][T32077] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 760.722523][ T29] kauditd_printk_skb: 89 callbacks suppressed [ 760.722537][ T29] audit: type=1326 audit(1725003962.691:15024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.752814][ T29] audit: type=1326 audit(1725003962.691:15025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.776483][ T29] audit: type=1326 audit(1725003962.691:15026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.799963][ T29] audit: type=1326 audit(1725003962.691:15027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.823572][ T29] audit: type=1326 audit(1725003962.691:15028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.847637][ T29] audit: type=1326 audit(1725003962.691:15029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.871722][ T29] audit: type=1326 audit(1725003962.691:15030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.895329][ T29] audit: type=1326 audit(1725003962.691:15031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.918876][ T29] audit: type=1326 audit(1725003962.691:15032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 760.942423][ T29] audit: type=1326 audit(1725003962.691:15033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32076 comm="syz.1.7109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 761.561484][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 761.587904][T32094] pim6reg1: entered promiscuous mode [ 761.593262][T32094] pim6reg1: entered allmulticast mode [ 761.681326][T32096] pim6reg1: entered promiscuous mode [ 761.686727][T32096] pim6reg1: entered allmulticast mode [ 761.985268][T32121] pim6reg1: entered promiscuous mode [ 761.990622][T32121] pim6reg1: entered allmulticast mode [ 762.078944][T32129] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 762.092487][T15397] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.118410][T32136] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 762.127355][T32136] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 762.142277][T32138] pim6reg1: entered promiscuous mode [ 762.147618][T32138] pim6reg1: entered allmulticast mode [ 762.166859][T32114] chnl_net:caif_netlink_parms(): no params data found [ 762.177563][T15397] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.210309][T32114] bridge0: port 1(bridge_slave_0) entered blocking state [ 762.217667][T32114] bridge0: port 1(bridge_slave_0) entered disabled state [ 762.224853][T32114] bridge_slave_0: entered allmulticast mode [ 762.231263][T32114] bridge_slave_0: entered promiscuous mode [ 762.241400][T15397] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.253261][T32114] bridge0: port 2(bridge_slave_1) entered blocking state [ 762.260379][T32114] bridge0: port 2(bridge_slave_1) entered disabled state [ 762.267732][T32114] bridge_slave_1: entered allmulticast mode [ 762.274127][T32114] bridge_slave_1: entered promiscuous mode [ 762.292472][T32114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 762.305758][T15397] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.319571][T32114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 762.339614][T32114] team0: Port device team_slave_0 added [ 762.345943][T32114] team0: Port device team_slave_1 added [ 762.359764][T32114] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 762.366907][T32114] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 762.393010][T32114] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 762.404639][T32114] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 762.411673][T32114] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 762.437688][T32114] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 762.461978][T32114] hsr_slave_0: entered promiscuous mode [ 762.468146][T32114] hsr_slave_1: entered promiscuous mode [ 762.473958][T32114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 762.481547][T32114] Cannot create hsr debugfs directory [ 762.587653][T15397] bond0 (unregistering): Released all slaves [ 762.677841][T15397] hsr_slave_0: left promiscuous mode [ 762.694979][T15397] hsr_slave_1: left promiscuous mode [ 762.703788][T15397] veth1_macvtap: left promiscuous mode [ 762.709365][T15397] veth0_macvtap: left promiscuous mode [ 762.714877][T15397] veth1_vlan: left promiscuous mode [ 762.720242][T15397] veth0_vlan: left promiscuous mode [ 762.851157][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 762.892371][T32189] pim6reg1: entered promiscuous mode [ 762.897768][T32189] pim6reg1: entered allmulticast mode [ 763.087189][T32226] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 763.095751][T32226] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 763.132909][T32114] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 763.142855][T32114] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 763.151316][T32114] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 763.170618][T32114] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 763.225533][T32114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 763.249681][T32114] 8021q: adding VLAN 0 to HW filter on device team0 [ 763.267343][T15399] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.274545][T15399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 763.296985][T32114] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 763.307470][T32114] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 763.322576][T15399] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.329804][T15399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 763.391293][T32114] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 763.492593][T32114] veth0_vlan: entered promiscuous mode [ 763.508113][T32114] veth1_vlan: entered promiscuous mode [ 763.525504][T32114] veth0_macvtap: entered promiscuous mode [ 763.533649][T32114] veth1_macvtap: entered promiscuous mode [ 763.547017][T32114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 763.557579][T32114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 763.569632][T32114] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 763.581232][T32114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 763.591866][T32114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 763.604053][T32114] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 763.615370][T32114] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 763.624202][T32114] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 763.632925][T32114] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 763.641676][T32114] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 763.763170][T32298] 9pnet_fd: Insufficient options for proto=fd [ 763.808194][T32301] 9pnet: Could not find request transport: fd [ 763.825479][T32304] pim6reg1: entered promiscuous mode [ 763.830874][T32304] pim6reg1: entered allmulticast mode [ 764.013064][T32326] 9pnet_fd: Insufficient options for proto=fd [ 764.881665][T32344] pim6reg1: entered promiscuous mode [ 764.887646][T32344] pim6reg1: entered allmulticast mode [ 764.951693][T32352] pim6reg1: entered promiscuous mode [ 764.957027][T32352] pim6reg1: entered allmulticast mode [ 765.107748][T32359] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 765.116349][T32359] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 765.758579][T32364] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7187'. [ 765.919047][T32375] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 765.943514][T32379] pim6reg1: entered promiscuous mode [ 765.948922][T32379] pim6reg1: entered allmulticast mode [ 765.991859][T32383] 9pnet_fd: Insufficient options for proto=fd [ 766.053411][T32387] 9pnet: Could not find request transport: fd0x0000000000000006 [ 766.308201][T32400] 9pnet_fd: Insufficient options for proto=fd [ 766.328309][T32402] 9pnet_fd: Insufficient options for proto=fd [ 766.980739][T32409] 9pnet_fd: Insufficient options for proto=fd [ 767.874946][T32425] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 767.888146][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 767.888159][ T29] audit: type=1326 audit(1725003969.861:15127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 767.918672][ T29] audit: type=1326 audit(1725003969.861:15128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 767.942363][ T29] audit: type=1326 audit(1725003969.861:15129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 767.966000][ T29] audit: type=1326 audit(1725003969.861:15130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 767.989586][ T29] audit: type=1326 audit(1725003969.861:15131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 768.013129][ T29] audit: type=1326 audit(1725003969.861:15132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 768.036799][ T29] audit: type=1326 audit(1725003969.861:15133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 768.060409][ T29] audit: type=1326 audit(1725003969.861:15134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 768.083876][ T29] audit: type=1326 audit(1725003969.861:15135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 768.107566][ T29] audit: type=1326 audit(1725003969.861:15136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32424 comm="syz.1.7214" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 768.147857][T32427] 9pnet: Could not find request transport: fd [ 768.166577][T32430] 9pnet_fd: Insufficient options for proto=fd [ 768.183281][T32432] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 769.163769][T32439] chnl_net:caif_netlink_parms(): no params data found [ 769.197461][T32439] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.204501][T32439] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.211719][T32439] bridge_slave_0: entered allmulticast mode [ 769.218145][T32439] bridge_slave_0: entered promiscuous mode [ 769.224916][T32439] bridge0: port 2(bridge_slave_1) entered blocking state [ 769.232094][T32439] bridge0: port 2(bridge_slave_1) entered disabled state [ 769.239622][T32439] bridge_slave_1: entered allmulticast mode [ 769.246278][T32439] bridge_slave_1: entered promiscuous mode [ 769.264521][T15397] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.276631][T32439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 769.287503][T32439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 769.299410][T15397] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.318968][T32439] team0: Port device team_slave_0 added [ 769.325271][T32439] team0: Port device team_slave_1 added [ 769.340016][T32439] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 769.347011][T32439] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 769.373060][T32439] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 769.389085][T15397] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.400727][T32439] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 769.407821][T32439] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 769.434371][T32439] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 769.455339][T32462] 9pnet: Could not find request transport: fd0x0000000000000008 [ 769.474436][T15397] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.488689][T32439] hsr_slave_0: entered promiscuous mode [ 769.494721][T32439] hsr_slave_1: entered promiscuous mode [ 769.500664][T32439] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 769.508389][T32439] Cannot create hsr debugfs directory [ 769.677679][T15397] bond0 (unregistering): Released all slaves [ 769.818323][T15397] hsr_slave_0: left promiscuous mode [ 769.824100][T15397] hsr_slave_1: left promiscuous mode [ 769.832147][T15397] veth1_macvtap: left promiscuous mode [ 769.837782][T15397] veth0_macvtap: left promiscuous mode [ 769.843348][T15397] veth1_vlan: left promiscuous mode [ 769.848695][T15397] veth0_vlan: left promiscuous mode [ 770.182533][T32439] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 770.191132][T32439] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 770.209177][T32439] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 770.218001][T32439] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 770.253786][T32439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 770.267049][T32439] 8021q: adding VLAN 0 to HW filter on device team0 [ 770.276566][T15397] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.283710][T15397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.293916][T15402] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.301020][T15402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.339558][T32558] 9pnet_fd: Insufficient options for proto=fd [ 770.380059][T32439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 770.482850][T32439] veth0_vlan: entered promiscuous mode [ 770.491138][T32439] veth1_vlan: entered promiscuous mode [ 770.506270][T32439] veth0_macvtap: entered promiscuous mode [ 770.513834][T32439] veth1_macvtap: entered promiscuous mode [ 770.523747][T32439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 770.534184][T32439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.544021][T32439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 770.554434][T32439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.565195][T32439] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 770.575421][T32439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 770.585982][T32439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.595963][T32439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 770.606402][T32439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 770.617396][T32439] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 770.627836][T32439] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 770.636608][T32439] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 770.645315][T32439] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 770.654160][T32439] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 770.708240][T32585] 9pnet: Could not find request transport: fd [ 770.874430][T32594] 9pnet: Could not find request transport: fd0x0000000000000008 [ 771.197826][T32603] pim6reg1: entered promiscuous mode [ 771.203223][T32603] pim6reg1: entered allmulticast mode [ 771.236805][T32605] 9pnet_fd: Insufficient options for proto=fd [ 771.260680][T32607] 9pnet_fd: Insufficient options for proto=fd [ 771.725407][T32623] 9pnet_fd: Insufficient options for proto=fd [ 771.790348][T32629] 9pnet_fd: Insufficient options for proto=fd [ 771.810747][T32631] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 771.833894][T32635] pim6reg1: entered promiscuous mode [ 771.839282][T32635] pim6reg1: entered allmulticast mode [ 771.852486][T32641] FAULT_INJECTION: forcing a failure. [ 771.852486][T32641] name failslab, interval 1, probability 0, space 0, times 0 [ 771.865198][T32641] CPU: 0 UID: 0 PID: 32641 Comm: syz.1.7256 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 771.876015][T32641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 771.886208][T32641] Call Trace: [ 771.889476][T32641] [ 771.892390][T32641] dump_stack_lvl+0xf2/0x150 [ 771.897032][T32641] dump_stack+0x15/0x20 [ 771.901239][T32641] should_fail_ex+0x229/0x230 [ 771.905960][T32641] ? audit_log_start+0x34c/0x6b0 [ 771.910916][T32641] should_failslab+0x8f/0xb0 [ 771.915497][T32641] kmem_cache_alloc_noprof+0x4c/0x290 [ 771.920855][T32641] audit_log_start+0x34c/0x6b0 [ 771.925737][T32641] audit_seccomp+0x4b/0x130 [ 771.930251][T32641] __seccomp_filter+0x6fa/0x1180 [ 771.935178][T32641] ? proc_fail_nth_write+0x130/0x160 [ 771.940513][T32641] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 771.946158][T32641] ? vfs_write+0x5a5/0x900 [ 771.950553][T32641] ? __fget_files+0x1da/0x210 [ 771.955213][T32641] __secure_computing+0x9f/0x1c0 [ 771.960207][T32641] syscall_trace_enter+0xd1/0x1f0 [ 771.965217][T32641] ? fpregs_assert_state_consistent+0x83/0xa0 [ 771.971276][T32641] do_syscall_64+0xaa/0x1c0 [ 771.975760][T32641] ? clear_bhb_loop+0x55/0xb0 [ 771.980415][T32641] ? clear_bhb_loop+0x55/0xb0 [ 771.985129][T32641] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 771.991065][T32641] RIP: 0033:0x7fdaa0a99ef9 [ 771.995590][T32641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 772.015232][T32641] RSP: 002b:00007fda9f717038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 772.023690][T32641] RAX: ffffffffffffffda RBX: 00007fdaa0c35f80 RCX: 00007fdaa0a99ef9 [ 772.031746][T32641] RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000005 [ 772.039711][T32641] RBP: 00007fda9f717090 R08: 0000000000000000 R09: 0000000000000000 [ 772.047684][T32641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 772.055743][T32641] R13: 0000000000000000 R14: 00007fdaa0c35f80 R15: 00007ffc3b36eb88 [ 772.063765][T32641] [ 772.111124][T32647] 9pnet_fd: Insufficient options for proto=fd [ 772.132654][T32651] FAULT_INJECTION: forcing a failure. [ 772.132654][T32651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.141355][T32650] 9pnet: Could not find request transport: fd0x0000000000000005 [ 772.145740][T32651] CPU: 0 UID: 0 PID: 32651 Comm: syz.3.7260 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 772.164081][T32651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 772.174133][T32651] Call Trace: [ 772.177392][T32651] [ 772.180303][T32651] dump_stack_lvl+0xf2/0x150 [ 772.184966][T32651] dump_stack+0x15/0x20 [ 772.189215][T32651] should_fail_ex+0x229/0x230 [ 772.193965][T32651] should_fail+0xb/0x10 [ 772.198105][T32651] should_fail_usercopy+0x1a/0x20 [ 772.203112][T32651] _copy_to_iter+0xd3/0xb00 [ 772.207603][T32651] ? avc_has_perm+0xd4/0x160 [ 772.212265][T32651] ? __virt_addr_valid+0x1ed/0x250 [ 772.217360][T32651] ? __check_object_size+0x35b/0x510 [ 772.222642][T32651] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 772.228430][T32651] __skb_datagram_iter+0xce/0x5c0 [ 772.233504][T32651] ? tipc_wait_for_rcvmsg+0x2ee/0x350 [ 772.238864][T32651] skb_copy_datagram_iter+0x41/0x130 [ 772.244221][T32651] tipc_recvstream+0x2df/0x7e0 [ 772.248980][T32651] ? __pfx_tipc_recvstream+0x10/0x10 [ 772.254335][T32651] sock_recvmsg+0x13f/0x170 [ 772.258930][T32651] ____sys_recvmsg+0xf9/0x280 [ 772.263826][T32651] __sys_recvmsg+0x1ea/0x280 [ 772.268441][T32651] __x64_sys_recvmsg+0x46/0x50 [ 772.273257][T32651] x64_sys_call+0xb84/0x2d60 [ 772.277832][T32651] do_syscall_64+0xc9/0x1c0 [ 772.282323][T32651] ? clear_bhb_loop+0x55/0xb0 [ 772.286981][T32651] ? clear_bhb_loop+0x55/0xb0 [ 772.291718][T32651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 772.297600][T32651] RIP: 0033:0x7efc89d19ef9 [ 772.301991][T32651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 772.321723][T32651] RSP: 002b:00007efc88991038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 772.330176][T32651] RAX: ffffffffffffffda RBX: 00007efc89eb5f80 RCX: 00007efc89d19ef9 [ 772.338220][T32651] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 [ 772.346180][T32651] RBP: 00007efc88991090 R08: 0000000000000000 R09: 0000000000000000 [ 772.354147][T32651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 772.362107][T32651] R13: 0000000000000000 R14: 00007efc89eb5f80 R15: 00007ffce79ae238 [ 772.370153][T32651] [ 772.397084][T32658] 9pnet_fd: Insufficient options for proto=fd [ 772.417918][T32664] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 772.455358][T32666] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 772.484675][T32678] pim6reg1: entered promiscuous mode [ 772.490055][T32678] pim6reg1: entered allmulticast mode [ 772.498253][T32676] 9pnet_fd: Insufficient options for proto=fd [ 772.658354][T32695] 9pnet_fd: Insufficient options for proto=fd [ 772.760518][T32707] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7284'. [ 772.792916][T32710] 9pnet: Could not find request transport: fd [ 772.818444][T32713] pim6reg1: entered promiscuous mode [ 772.823771][T32713] pim6reg1: entered allmulticast mode [ 773.002259][ T29] kauditd_printk_skb: 186 callbacks suppressed [ 773.002274][ T29] audit: type=1400 audit(1725003974.971:15321): avc: denied { read } for pid=32716 comm="syz.1.7288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 773.031590][T32722] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7288'. [ 773.043153][T32726] 9pnet_fd: Insufficient options for proto=fd [ 773.080377][ T29] audit: type=1326 audit(1725003975.051:15322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32731 comm="syz.2.7294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec42909ef9 code=0x7ffc0000 [ 773.097165][T32732] FAULT_INJECTION: forcing a failure. [ 773.097165][T32732] name failslab, interval 1, probability 0, space 0, times 0 [ 773.104953][ T29] audit: type=1326 audit(1725003975.071:15323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32731 comm="syz.2.7294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec42909ef9 code=0x7ffc0000 [ 773.116632][T32732] CPU: 0 UID: 0 PID: 32732 Comm: syz.2.7294 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 773.140161][ T29] audit: type=1326 audit(1725003975.071:15324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32731 comm="syz.2.7294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fec42908890 code=0x7ffc0000 [ 773.150853][T32732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 773.150868][T32732] Call Trace: [ 773.150875][T32732] [ 773.150921][T32732] dump_stack_lvl+0xf2/0x150 [ 773.150947][T32732] dump_stack+0x15/0x20 [ 773.150964][T32732] should_fail_ex+0x229/0x230 [ 773.174774][ T29] audit: type=1326 audit(1725003975.071:15325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32731 comm="syz.2.7294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fec429089df code=0x7ffc0000 [ 773.184630][T32732] ? __alloc_skb+0x10b/0x310 [ 773.232159][T32732] should_failslab+0x8f/0xb0 [ 773.236788][T32732] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 773.242607][T32732] __alloc_skb+0x10b/0x310 [ 773.247027][T32732] audit_log_start+0x368/0x6b0 [ 773.251833][T32732] audit_seccomp+0x4b/0x130 [ 773.256322][T32732] __seccomp_filter+0x6fa/0x1180 [ 773.261251][T32732] ? proc_fail_nth_write+0x130/0x160 [ 773.266518][T32732] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 773.272164][T32732] ? vfs_write+0x5a5/0x900 [ 773.276579][T32732] ? __fget_files+0x1da/0x210 [ 773.281302][T32732] __secure_computing+0x9f/0x1c0 [ 773.286248][T32732] syscall_trace_enter+0xd1/0x1f0 [ 773.291348][T32732] ? fpregs_assert_state_consistent+0x83/0xa0 [ 773.297463][T32732] do_syscall_64+0xaa/0x1c0 [ 773.301997][T32732] ? clear_bhb_loop+0x55/0xb0 [ 773.306738][T32732] ? clear_bhb_loop+0x55/0xb0 [ 773.311418][T32732] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 773.317364][T32732] RIP: 0033:0x7fec42909ef9 [ 773.321891][T32732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 773.341582][T32732] RSP: 002b:00007fec41581038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 773.350003][T32732] RAX: ffffffffffffffda RBX: 00007fec42aa5f80 RCX: 00007fec42909ef9 [ 773.357994][T32732] RDX: 000000000000006f RSI: 0000000000000084 RDI: ffffffffffffffff [ 773.365947][T32732] RBP: 00007fec41581090 R08: 0000000000000000 R09: 0000000000000000 [ 773.373960][T32732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 773.381994][T32732] R13: 0000000000000000 R14: 00007fec42aa5f80 R15: 00007ffdd94d9868 [ 773.389970][T32732] [ 773.393141][T32732] audit: audit_lost=15 audit_rate_limit=0 audit_backlog_limit=64 [ 773.400919][T32732] audit: out of memory in audit_log_start [ 773.400918][T32734] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7295'. [ 773.419037][ T29] audit: type=1326 audit(1725003975.391:15326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32731 comm="syz.2.7294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7fec4290893c code=0x7ffc0000 [ 773.442154][T32743] 9pnet: Could not find request transport: fd [ 773.442641][ T29] audit: type=1326 audit(1725003975.391:15327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32731 comm="syz.2.7294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fec429089df code=0x7ffc0000 [ 773.472775][ T29] audit: type=1326 audit(1725003975.391:15328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32731 comm="syz.2.7294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fec42908b8a code=0x7ffc0000 [ 773.530720][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 773.605346][T32753] 9pnet_fd: Insufficient options for proto=fd [ 773.903664][T32766] 9pnet: Could not find request transport: fd0x0000000000000006 [ 774.365189][ T314] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 774.443866][ T325] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 774.455477][ T323] raw_sendmsg: syz.0.7317 forgot to set AF_INET. Fix it! [ 774.497176][ T329] 9pnet_fd: Insufficient options for proto=fd [ 774.784651][ T352] 9pnet_fd: Insufficient options for proto=fd [ 774.878056][ T362] 9pnet_fd: Insufficient options for proto=fd [ 774.912857][ T366] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 775.407444][ T377] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 775.461026][ T382] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 775.470211][ T385] FAULT_INJECTION: forcing a failure. [ 775.470211][ T385] name failslab, interval 1, probability 0, space 0, times 0 [ 775.484199][ T385] CPU: 0 UID: 0 PID: 385 Comm: syz.2.7341 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 775.494876][ T385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 775.504926][ T385] Call Trace: [ 775.508210][ T385] [ 775.511158][ T385] dump_stack_lvl+0xf2/0x150 [ 775.515820][ T385] dump_stack+0x15/0x20 [ 775.520004][ T385] should_fail_ex+0x229/0x230 [ 775.524675][ T385] ? io_ring_ctx_alloc+0x38/0xe10 [ 775.529695][ T385] should_failslab+0x8f/0xb0 [ 775.534282][ T385] __kmalloc_cache_noprof+0x4b/0x2a0 [ 775.539596][ T385] io_ring_ctx_alloc+0x38/0xe10 [ 775.544522][ T385] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 775.550147][ T385] io_uring_create+0x1cf/0x920 [ 775.554907][ T385] __se_sys_io_uring_setup+0x1d2/0x1e0 [ 775.560512][ T385] __x64_sys_io_uring_setup+0x31/0x40 [ 775.565962][ T385] x64_sys_call+0x1f7e/0x2d60 [ 775.570723][ T385] do_syscall_64+0xc9/0x1c0 [ 775.575230][ T385] ? clear_bhb_loop+0x55/0xb0 [ 775.579893][ T385] ? clear_bhb_loop+0x55/0xb0 [ 775.584554][ T385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 775.590497][ T385] RIP: 0033:0x7fec42909ef9 [ 775.594898][ T385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 775.614508][ T385] RSP: 002b:00007fec4155ffc8 EFLAGS: 00000206 ORIG_RAX: 00000000000001a9 [ 775.622908][ T385] RAX: ffffffffffffffda RBX: 00007fec42aa6058 RCX: 00007fec42909ef9 [ 775.631006][ T385] RDX: 0000000020000040 RSI: 0000000020000080 RDI: 00000000000057ca [ 775.638965][ T385] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000040 [ 775.646970][ T385] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 775.654944][ T385] R13: 0000000020000100 R14: 00000000000057ca R15: 0000000020000040 [ 775.663011][ T385] [ 775.724792][ T393] 9pnet: Could not find request transport: fd0x0000000000000006 [ 775.886605][ T413] 9pnet_fd: Insufficient options for proto=fd [ 776.123939][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 776.184163][ T461] pim6reg1: entered promiscuous mode [ 776.189535][ T461] pim6reg1: entered allmulticast mode [ 776.366939][ T484] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7386'. [ 776.378440][ T487] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 776.408046][ T492] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 776.427510][ T495] pim6reg1: entered promiscuous mode [ 776.432824][ T495] pim6reg1: entered allmulticast mode [ 776.559610][ T514] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7399'. [ 776.587619][ T517] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 776.675749][ T540] pim6reg1: entered promiscuous mode [ 776.681214][ T540] pim6reg1: entered allmulticast mode [ 776.711407][ T544] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7412'. [ 776.962898][ T574] pim6reg1: entered promiscuous mode [ 776.968359][ T574] pim6reg1: entered allmulticast mode [ 776.999510][ T576] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7425'. [ 777.064869][ T585] pim6reg1: entered promiscuous mode [ 777.070256][ T585] pim6reg1: entered allmulticast mode [ 777.209116][ T604] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7437'. [ 777.241926][ T611] pim6reg1: entered promiscuous mode [ 777.247332][ T611] pim6reg1: entered allmulticast mode [ 777.379185][ T629] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7449'. [ 777.647675][ T650] pim6reg1: entered promiscuous mode [ 777.653003][ T650] pim6reg1: entered allmulticast mode [ 777.683840][ T654] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7460'. [ 777.786942][ T677] 9pnet: Could not find request transport: fd0x0000000000000006 [ 777.836249][ T685] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7473'. [ 777.905475][ T693] pim6reg1: entered promiscuous mode [ 777.910873][ T693] pim6reg1: entered allmulticast mode [ 778.004409][ T705] 9pnet: Could not find request transport: fd0x0000000000000006 [ 778.038454][ T712] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7485'. [ 778.172628][ T735] pim6reg1: entered promiscuous mode [ 778.178032][ T735] pim6reg1: entered allmulticast mode [ 778.233998][ T741] 9pnet: Could not find request transport: fd0x0000000000000006 [ 778.306255][ T764] FAULT_INJECTION: forcing a failure. [ 778.306255][ T764] name failslab, interval 1, probability 0, space 0, times 0 [ 778.320589][ T764] CPU: 1 UID: 0 PID: 764 Comm: syz.3.7508 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 778.331185][ T764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 778.341226][ T764] Call Trace: [ 778.344491][ T764] [ 778.347484][ T764] dump_stack_lvl+0xf2/0x150 [ 778.352143][ T764] dump_stack+0x15/0x20 [ 778.356373][ T764] should_fail_ex+0x229/0x230 [ 778.361069][ T764] ? dup_task_struct+0x6c/0x710 [ 778.365996][ T764] should_failslab+0x8f/0xb0 [ 778.370616][ T764] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 778.376457][ T764] dup_task_struct+0x6c/0x710 [ 778.381130][ T764] ? _parse_integer+0x27/0x30 [ 778.385801][ T764] copy_process+0x3a9/0x1f90 [ 778.390389][ T764] ? kstrtouint+0x77/0xc0 [ 778.394902][ T764] ? kstrtouint_from_user+0xb0/0xe0 [ 778.400135][ T764] kernel_clone+0x167/0x5e0 [ 778.404735][ T764] __x64_sys_clone+0xe8/0x120 [ 778.409471][ T764] x64_sys_call+0x2d23/0x2d60 [ 778.414207][ T764] do_syscall_64+0xc9/0x1c0 [ 778.418782][ T764] ? clear_bhb_loop+0x55/0xb0 [ 778.423482][ T764] ? clear_bhb_loop+0x55/0xb0 [ 778.428145][ T764] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 778.434035][ T764] RIP: 0033:0x7efc89d19ef9 [ 778.438543][ T764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 778.458179][ T764] RSP: 002b:00007efc88990fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 778.466576][ T764] RAX: ffffffffffffffda RBX: 00007efc89eb5f80 RCX: 00007efc89d19ef9 [ 778.474592][ T764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 778.482608][ T764] RBP: 00007efc88991090 R08: 0000000000000000 R09: 0000000000000000 [ 778.490562][ T764] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 778.498557][ T764] R13: 0000000000000000 R14: 00007efc89eb5f80 R15: 00007ffce79ae238 [ 778.506565][ T764] [ 778.510062][ T29] kauditd_printk_skb: 355 callbacks suppressed [ 778.510074][ T29] audit: type=1326 audit(1725003980.291:15684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=762 comm="syz.1.7507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 778.539811][ T29] audit: type=1326 audit(1725003980.291:15685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=762 comm="syz.1.7507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=47 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 778.563156][ T29] audit: type=1326 audit(1725003980.291:15686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=762 comm="syz.1.7507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 778.589022][ T769] net_ratelimit: 17 callbacks suppressed [ 778.589035][ T769] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 778.605208][ T29] audit: type=1326 audit(1725003980.481:15687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=762 comm="syz.1.7507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdaa0a99ef9 code=0x7ffc0000 [ 778.647636][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 778.665003][ T777] 9pnet: Could not find request transport: fd0x0000000000000006 [ 778.692754][ T782] pim6reg1: entered promiscuous mode [ 778.698230][ T782] pim6reg1: entered allmulticast mode [ 778.738018][ T792] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 778.761395][ T29] audit: type=1326 audit(1725003980.731:15688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=791 comm="syz.4.7520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3de3609ef9 code=0x7ffc0000 [ 778.784975][ T29] audit: type=1326 audit(1725003980.731:15689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=791 comm="syz.4.7520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3de3609ef9 code=0x7ffc0000 [ 778.808496][ T29] audit: type=1326 audit(1725003980.731:15690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=791 comm="syz.4.7520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=47 compat=0 ip=0x7f3de3609ef9 code=0x7ffc0000 [ 778.831915][ T29] audit: type=1326 audit(1725003980.731:15691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=791 comm="syz.4.7520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3de3609ef9 code=0x7ffc0000 [ 778.855571][ T29] audit: type=1326 audit(1725003980.731:15692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=791 comm="syz.4.7520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3de3609ef9 code=0x7ffc0000 [ 778.915497][ T804] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 778.947853][ T29] audit: type=1326 audit(1725003980.921:15693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=817 comm="syz.0.7529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 779.001599][ T821] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 779.004196][ T824] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 779.050375][ T827] 9pnet: Could not find request transport: fd0x0000000000000006 [ 779.065155][ T831] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 779.088157][ T837] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 779.119537][ T840] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 779.147811][ T847] netlink: 12 bytes leftover after parsing attributes in process `syz.4.7538'. [ 779.201053][ T857] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 779.305750][ T867] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 779.964628][ T897] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 780.339924][ T929] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 780.566334][ T956] FAULT_INJECTION: forcing a failure. [ 780.566334][ T956] name failslab, interval 1, probability 0, space 0, times 0 [ 780.567662][ T958] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 780.579084][ T956] CPU: 0 UID: 0 PID: 956 Comm: syz.2.7590 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 780.579137][ T956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 780.579147][ T956] Call Trace: [ 780.579154][ T956] [ 780.613757][ T956] dump_stack_lvl+0xf2/0x150 [ 780.619439][ T956] dump_stack+0x15/0x20 [ 780.623860][ T956] should_fail_ex+0x229/0x230 [ 780.628567][ T956] ? audit_log_start+0x34c/0x6b0 [ 780.633510][ T956] should_failslab+0x8f/0xb0 [ 780.638120][ T956] kmem_cache_alloc_noprof+0x4c/0x290 [ 780.643578][ T956] audit_log_start+0x34c/0x6b0 [ 780.648353][ T956] audit_seccomp+0x4b/0x130 [ 780.652919][ T956] __seccomp_filter+0x6fa/0x1180 [ 780.657945][ T956] ? proc_fail_nth_write+0x130/0x160 [ 780.663236][ T956] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 780.668868][ T956] ? vfs_write+0x5a5/0x900 [ 780.673365][ T956] __secure_computing+0x9f/0x1c0 [ 780.678287][ T956] syscall_trace_enter+0xd1/0x1f0 [ 780.683376][ T956] do_syscall_64+0xaa/0x1c0 [ 780.687868][ T956] ? clear_bhb_loop+0x55/0xb0 [ 780.692539][ T956] ? clear_bhb_loop+0x55/0xb0 [ 780.697211][ T956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 780.703099][ T956] RIP: 0033:0x7fec42909ef9 [ 780.707494][ T956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 780.727083][ T956] RSP: 002b:00007fec41581038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 780.735670][ T956] RAX: ffffffffffffffda RBX: 00007fec42aa5f80 RCX: 00007fec42909ef9 [ 780.743688][ T956] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 [ 780.751728][ T956] RBP: 00007fec41581090 R08: 0000000000000000 R09: 0000000000000000 [ 780.759691][ T956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 780.767669][ T956] R13: 0000000000000000 R14: 00007fec42aa5f80 R15: 00007ffdd94d9868 [ 780.775662][ T956] [ 781.115254][ T991] FAULT_INJECTION: forcing a failure. [ 781.115254][ T991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 781.128710][ T991] CPU: 0 UID: 0 PID: 991 Comm: syz.3.7604 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 781.139336][ T991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 781.149375][ T991] Call Trace: [ 781.152653][ T991] [ 781.155636][ T991] dump_stack_lvl+0xf2/0x150 [ 781.160289][ T991] dump_stack+0x15/0x20 [ 781.164530][ T991] should_fail_ex+0x229/0x230 [ 781.169220][ T991] should_fail+0xb/0x10 [ 781.173387][ T991] should_fail_usercopy+0x1a/0x20 [ 781.178417][ T991] _copy_from_user+0x1e/0xd0 [ 781.183007][ T991] copy_msghdr_from_user+0x54/0x2a0 [ 781.188335][ T991] __sys_sendmsg+0x17d/0x280 [ 781.192970][ T991] __x64_sys_sendmsg+0x46/0x50 [ 781.197721][ T991] x64_sys_call+0x2689/0x2d60 [ 781.202384][ T991] do_syscall_64+0xc9/0x1c0 [ 781.206968][ T991] ? clear_bhb_loop+0x55/0xb0 [ 781.211699][ T991] ? clear_bhb_loop+0x55/0xb0 [ 781.216434][ T991] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 781.222346][ T991] RIP: 0033:0x7efc89d19ef9 [ 781.226810][ T991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 781.246483][ T991] RSP: 002b:00007efc88991038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 781.254878][ T991] RAX: ffffffffffffffda RBX: 00007efc89eb5f80 RCX: 00007efc89d19ef9 [ 781.262880][ T991] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000007 [ 781.270835][ T991] RBP: 00007efc88991090 R08: 0000000000000000 R09: 0000000000000000 [ 781.278789][ T991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 781.286819][ T991] R13: 0000000000000000 R14: 00007efc89eb5f80 R15: 00007ffce79ae238 [ 781.294794][ T991] [ 781.697842][ T1023] FAULT_INJECTION: forcing a failure. [ 781.697842][ T1023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 781.710968][ T1023] CPU: 0 UID: 0 PID: 1023 Comm: syz.0.7617 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 781.721719][ T1023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 781.731758][ T1023] Call Trace: [ 781.735027][ T1023] [ 781.737988][ T1023] dump_stack_lvl+0xf2/0x150 [ 781.742572][ T1023] dump_stack+0x15/0x20 [ 781.746712][ T1023] should_fail_ex+0x229/0x230 [ 781.751418][ T1023] should_fail+0xb/0x10 [ 781.755555][ T1023] should_fail_usercopy+0x1a/0x20 [ 781.760616][ T1023] _copy_to_user+0x1e/0xa0 [ 781.765077][ T1023] simple_read_from_buffer+0xa0/0x110 [ 781.770478][ T1023] proc_fail_nth_read+0xff/0x140 [ 781.775429][ T1023] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 781.781029][ T1023] vfs_read+0x1a2/0x6e0 [ 781.785199][ T1023] ? __rcu_read_unlock+0x4e/0x70 [ 781.790126][ T1023] ? __fget_files+0x1da/0x210 [ 781.794786][ T1023] ksys_read+0xeb/0x1b0 [ 781.798925][ T1023] __x64_sys_read+0x42/0x50 [ 781.803416][ T1023] x64_sys_call+0x27d3/0x2d60 [ 781.808075][ T1023] do_syscall_64+0xc9/0x1c0 [ 781.812737][ T1023] ? clear_bhb_loop+0x55/0xb0 [ 781.817434][ T1023] ? clear_bhb_loop+0x55/0xb0 [ 781.822103][ T1023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 781.828066][ T1023] RIP: 0033:0x7faa59eb893c [ 781.832469][ T1023] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 781.852233][ T1023] RSP: 002b:00007faa58b37030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 781.860654][ T1023] RAX: ffffffffffffffda RBX: 00007faa5a055f80 RCX: 00007faa59eb893c [ 781.868615][ T1023] RDX: 000000000000000f RSI: 00007faa58b370a0 RDI: 0000000000000006 [ 781.876605][ T1023] RBP: 00007faa58b37090 R08: 0000000000000000 R09: 0000000000000000 [ 781.884660][ T1023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 781.892631][ T1023] R13: 0000000000000000 R14: 00007faa5a055f80 R15: 00007ffe8a5d2938 [ 781.900687][ T1023] [ 781.922203][ T1025] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7618'. [ 782.109502][ T1043] 9pnet: Could not find request transport: fd0xffffffffffffffff [ 782.168327][ T1057] 9pnet_fd: Insufficient options for proto=fd [ 782.327384][ T1077] FAULT_INJECTION: forcing a failure. [ 782.327384][ T1077] name failslab, interval 1, probability 0, space 0, times 0 [ 782.340169][ T1077] CPU: 1 UID: 0 PID: 1077 Comm: syz.0.7641 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 782.351010][ T1077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 782.361094][ T1077] Call Trace: [ 782.364362][ T1077] [ 782.367279][ T1077] dump_stack_lvl+0xf2/0x150 [ 782.371948][ T1077] dump_stack+0x15/0x20 [ 782.376154][ T1077] should_fail_ex+0x229/0x230 [ 782.381139][ T1077] ? audit_log_start+0x34c/0x6b0 [ 782.386262][ T1077] should_failslab+0x8f/0xb0 [ 782.390937][ T1077] kmem_cache_alloc_noprof+0x4c/0x290 [ 782.396293][ T1077] audit_log_start+0x34c/0x6b0 [ 782.401041][ T1077] audit_seccomp+0x4b/0x130 [ 782.405610][ T1077] __seccomp_filter+0x6fa/0x1180 [ 782.410615][ T1077] ? proc_fail_nth_write+0x130/0x160 [ 782.415995][ T1077] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 782.421623][ T1077] ? vfs_write+0x5a5/0x900 [ 782.426032][ T1077] ? __fget_files+0x1da/0x210 [ 782.430779][ T1077] __secure_computing+0x9f/0x1c0 [ 782.435714][ T1077] syscall_trace_enter+0xd1/0x1f0 [ 782.440733][ T1077] ? fpregs_assert_state_consistent+0x83/0xa0 [ 782.446807][ T1077] do_syscall_64+0xaa/0x1c0 [ 782.451434][ T1077] ? clear_bhb_loop+0x55/0xb0 [ 782.456121][ T1077] ? clear_bhb_loop+0x55/0xb0 [ 782.460795][ T1077] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 782.466728][ T1077] RIP: 0033:0x7faa59eb9ef9 [ 782.471143][ T1077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 782.490900][ T1077] RSP: 002b:00007faa58b36e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 782.499319][ T1077] RAX: ffffffffffffffda RBX: 000000000000044a RCX: 00007faa59eb9ef9 [ 782.507292][ T1077] RDX: 00007faa58b36ef0 RSI: 0000000000000000 RDI: 00007faa59f28131 [ 782.515321][ T1077] RBP: 0000000020000400 R08: 00007faa58b36bb7 R09: 00007faa58b36e40 [ 782.523280][ T1077] R10: 000000000000000a R11: 0000000000000202 R12: 00000000200001c0 [ 782.531249][ T1077] R13: 00007faa58b36ef0 R14: 00007faa58b36eb0 R15: 00000000200013c0 [ 782.539213][ T1077] [ 782.575840][ T1087] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7646'. [ 782.591692][ T1092] pim6reg1: entered promiscuous mode [ 782.597277][ T1092] pim6reg1: entered allmulticast mode [ 782.610398][ T1094] pim6reg1: entered promiscuous mode [ 782.615732][ T1094] pim6reg1: entered allmulticast mode [ 783.070892][ T1122] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7659'. [ 783.109341][ T1127] pim6reg1: entered promiscuous mode [ 783.114670][ T1127] pim6reg1: entered allmulticast mode [ 783.137065][ T1131] FAULT_INJECTION: forcing a failure. [ 783.137065][ T1131] name failslab, interval 1, probability 0, space 0, times 0 [ 783.149821][ T1131] CPU: 0 UID: 0 PID: 1131 Comm: syz.2.7663 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 783.160510][ T1131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 783.170545][ T1131] Call Trace: [ 783.173813][ T1131] [ 783.176745][ T1131] dump_stack_lvl+0xf2/0x150 [ 783.181321][ T1131] dump_stack+0x15/0x20 [ 783.185458][ T1131] should_fail_ex+0x229/0x230 [ 783.190118][ T1131] ? audit_log_start+0x34c/0x6b0 [ 783.195161][ T1131] should_failslab+0x8f/0xb0 [ 783.199860][ T1131] kmem_cache_alloc_noprof+0x4c/0x290 [ 783.205215][ T1131] audit_log_start+0x34c/0x6b0 [ 783.210020][ T1131] audit_seccomp+0x4b/0x130 [ 783.214622][ T1131] __seccomp_filter+0x6fa/0x1180 [ 783.219649][ T1131] ? proc_fail_nth_write+0x130/0x160 [ 783.224912][ T1131] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 783.230522][ T1131] ? vfs_write+0x5a5/0x900 [ 783.234923][ T1131] ? __fget_files+0x1da/0x210 [ 783.239586][ T1131] __secure_computing+0x9f/0x1c0 [ 783.244565][ T1131] syscall_trace_enter+0xd1/0x1f0 [ 783.249649][ T1131] ? fpregs_assert_state_consistent+0x83/0xa0 [ 783.255788][ T1131] do_syscall_64+0xaa/0x1c0 [ 783.260342][ T1131] ? clear_bhb_loop+0x55/0xb0 [ 783.265089][ T1131] ? clear_bhb_loop+0x55/0xb0 [ 783.269791][ T1131] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 783.275796][ T1131] RIP: 0033:0x7fec42909ef9 [ 783.280230][ T1131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 783.299820][ T1131] RSP: 002b:00007fec41581038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 783.308224][ T1131] RAX: ffffffffffffffda RBX: 00007fec42aa5f80 RCX: 00007fec42909ef9 [ 783.316226][ T1131] RDX: 0000000000000004 RSI: 00000000200000c0 RDI: 0000000000000005 [ 783.324196][ T1131] RBP: 00007fec41581090 R08: 0000000000000000 R09: 0000000000000000 [ 783.332164][ T1131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 783.340164][ T1131] R13: 0000000000000000 R14: 00007fec42aa5f80 R15: 00007ffdd94d9868 [ 783.348118][ T1131] [ 783.559556][ T1152] 9pnet: Could not find request transport: fd [ 783.580983][ T29] kauditd_printk_skb: 338 callbacks suppressed [ 783.580998][ T29] audit: type=1326 audit(1725003985.551:16026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.610847][ T29] audit: type=1326 audit(1725003985.551:16027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.636612][ T29] audit: type=1326 audit(1725003985.611:16028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.660134][ T29] audit: type=1326 audit(1725003985.611:16029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.683839][ T29] audit: type=1326 audit(1725003985.611:16030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.707796][ T29] audit: type=1326 audit(1725003985.611:16031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.731413][ T29] audit: type=1326 audit(1725003985.611:16032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.734300][ T1160] netlink: 'syz.2.7674': attribute type 21 has an invalid length. [ 783.755002][ T29] audit: type=1326 audit(1725003985.611:16033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.755028][ T29] audit: type=1326 audit(1725003985.611:16034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 783.755050][ T29] audit: type=1326 audit(1725003985.611:16035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1156 comm="syz.0.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 784.186429][ T1164] pim6reg1: entered promiscuous mode [ 784.191742][ T1164] pim6reg1: entered allmulticast mode [ 784.246291][ T1166] pim6reg1: entered promiscuous mode [ 784.251619][ T1166] pim6reg1: entered allmulticast mode [ 784.270360][ T1168] netlink: 52 bytes leftover after parsing attributes in process `syz.2.7678'. [ 784.367727][ T1180] netlink: 52 bytes leftover after parsing attributes in process `syz.2.7684'. [ 784.410263][ T1182] pim6reg1: entered promiscuous mode [ 784.415570][ T1182] pim6reg1: entered allmulticast mode [ 784.496640][ T1190] net_ratelimit: 10 callbacks suppressed [ 784.496651][ T1190] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 784.570746][ T1200] pim6reg1: entered promiscuous mode [ 784.576188][ T1200] pim6reg1: entered allmulticast mode [ 784.734938][ T1219] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7700'. [ 784.773245][ T1226] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 784.929300][ T1245] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 785.043647][ T1257] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 785.075658][ T1264] 9pnet_fd: Insufficient options for proto=fd [ 785.227564][ T1268] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7719'. [ 785.261714][ T1274] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 785.408139][ T1284] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 785.462534][ T1291] 9pnet_fd: Insufficient options for proto=fd [ 785.650899][ T1301] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7734'. [ 785.660407][ T1305] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 785.705309][ T1309] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 786.564030][ T1318] 9pnet_fd: Insufficient options for proto=fd [ 786.578829][ T1320] pim6reg1: entered promiscuous mode [ 786.584377][ T1320] pim6reg1: entered allmulticast mode [ 786.720720][ T1332] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7748'. [ 786.759157][ T1334] pim6reg1: entered promiscuous mode [ 786.764466][ T1334] pim6reg1: entered allmulticast mode [ 787.556967][ T1343] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 787.586491][ T1347] 9pnet_fd: Insufficient options for proto=fd [ 787.615434][ T1349] 9pnet: Could not find request transport: fd0x0000000000000008 [ 787.659025][ T1354] pim6reg1: entered promiscuous mode [ 787.664334][ T1354] pim6reg1: entered allmulticast mode [ 787.728182][ T1356] 9pnet_fd: Insufficient options for proto=fd [ 787.911432][ T1368] pim6reg1: entered promiscuous mode [ 787.916756][ T1368] pim6reg1: entered allmulticast mode [ 787.990693][ T1370] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 788.044495][ T1374] 9pnet: Could not find request transport: fd0x0000000000000008 [ 788.660322][ T1382] 9pnet_fd: Insufficient options for proto=fd [ 788.686109][ T1384] 9pnet_fd: Insufficient options for proto=fd [ 788.841985][ T1394] pim6reg1: entered promiscuous mode [ 788.847427][ T1394] pim6reg1: entered allmulticast mode [ 788.954703][ T1398] pim6reg1: entered promiscuous mode [ 788.960136][ T1398] pim6reg1: entered allmulticast mode [ 788.977649][ T1400] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7779'. [ 789.006560][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 789.006600][ T29] audit: type=1400 audit(1725003990.981:16181): avc: denied { bind } for pid=1401 comm="syz.0.7780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.008429][ T1402] netlink: 'syz.0.7780': attribute type 10 has an invalid length. [ 789.012862][ T29] audit: type=1400 audit(1725003990.981:16182): avc: denied { setopt } for pid=1401 comm="syz.0.7780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.063102][ T1403] netlink: 56 bytes leftover after parsing attributes in process `syz.0.7780'. [ 789.071841][ T1402] team0: Failed to send options change via netlink (err -105) [ 789.079627][ T1402] team0: Port device netdevsim1 added [ 789.099884][ T29] audit: type=1326 audit(1725003991.071:16183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.123512][ T29] audit: type=1326 audit(1725003991.071:16184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.147233][ T29] audit: type=1326 audit(1725003991.071:16185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.170779][ T29] audit: type=1326 audit(1725003991.071:16186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.194222][ T29] audit: type=1326 audit(1725003991.071:16187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.217768][ T29] audit: type=1326 audit(1725003991.071:16188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.241248][ T29] audit: type=1326 audit(1725003991.071:16189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.264703][ T29] audit: type=1326 audit(1725003991.071:16190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1401 comm="syz.0.7780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7faa59eb9ef9 code=0x7ffc0000 [ 789.388478][ T1410] 9pnet_fd: Insufficient options for proto=fd [ 789.517799][ T1413] chnl_net:caif_netlink_parms(): no params data found [ 789.541470][ T1428] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7786'. [ 789.563567][ T1413] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.570787][ T1413] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.577983][ T1413] bridge_slave_0: entered allmulticast mode [ 789.584418][ T1413] bridge_slave_0: entered promiscuous mode [ 789.591267][ T1413] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.598337][ T1413] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.605540][ T1413] bridge_slave_1: entered allmulticast mode [ 789.611873][ T1413] bridge_slave_1: entered promiscuous mode [ 789.630610][ T1413] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 789.641417][ T1413] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 789.660858][T15399] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 789.676858][ T1413] team0: Port device team_slave_0 added [ 789.684766][ T1413] team0: Port device team_slave_1 added [ 789.695373][ T1437] pim6reg1: entered promiscuous mode [ 789.700746][ T1437] pim6reg1: entered allmulticast mode [ 789.709905][T15399] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 789.729780][ T1413] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 789.736761][ T1413] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 789.762668][ T1413] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 789.773939][ T1413] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 789.781004][ T1413] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 789.806937][ T1413] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 789.818920][T15397] team0: Failed to send port change of device netdevsim1 via netlink (err -105) [ 789.836837][T15399] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 789.866935][ T1413] hsr_slave_0: entered promiscuous mode [ 789.874570][ T1413] hsr_slave_1: entered promiscuous mode [ 789.922764][T15399] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 790.107695][T15399] bond0 (unregistering): Released all slaves [ 790.227307][T15399] hsr_slave_0: left promiscuous mode [ 790.233130][T15399] hsr_slave_1: left promiscuous mode [ 790.241547][T15399] veth1_macvtap: left promiscuous mode [ 790.247131][T15399] veth0_macvtap: left promiscuous mode [ 790.252698][T15399] veth1_vlan: left promiscuous mode [ 790.258022][T15399] veth0_vlan: left promiscuous mode [ 790.585204][ T1413] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 790.604097][ T1413] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 790.617777][ T1413] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 790.641094][ T1413] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 790.685161][ T1507] chnl_net:caif_netlink_parms(): no params data found [ 790.725324][ T1413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 790.763641][ T1413] 8021q: adding VLAN 0 to HW filter on device team0 [ 790.773593][T15397] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.780665][T15397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 790.811916][T15403] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 790.825088][T15397] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.832185][T15397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 790.853023][ T1507] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.860205][ T1507] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.869056][ T1507] bridge_slave_0: entered allmulticast mode [ 790.876361][ T1507] bridge_slave_0: entered promiscuous mode [ 790.888152][ T1507] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.895369][ T1507] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.907978][ T1507] bridge_slave_1: entered allmulticast mode [ 790.914528][ T1507] bridge_slave_1: entered promiscuous mode [ 790.924399][T15403] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 790.954773][ T1507] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 790.965333][ T1507] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 790.977754][T15403] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 790.999474][ T1507] team0: Port device team_slave_0 added [ 791.006090][ T1507] team0: Port device team_slave_1 added [ 791.021130][ T1413] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 791.038677][ T1507] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 791.045815][ T1507] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 791.071823][ T1507] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 791.086350][T15403] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 791.092229][ T1585] 9pnet: Could not find request transport: fd [ 791.106475][ T1507] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 791.113453][ T1507] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 791.139450][ T1507] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 791.182061][ T1507] hsr_slave_0: entered promiscuous mode [ 791.188647][ T1507] hsr_slave_1: entered promiscuous mode [ 791.194571][ T1507] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 791.202644][ T1507] Cannot create hsr debugfs directory [ 791.219810][T15403] bridge_slave_1: left allmulticast mode [ 791.225458][T15403] bridge_slave_1: left promiscuous mode [ 791.231123][T15403] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.241593][T15403] bridge_slave_0: left allmulticast mode [ 791.247350][T15403] bridge_slave_0: left promiscuous mode [ 791.253010][T15403] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.338472][T15403] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 791.349251][T15403] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 791.359935][T15403] bond0 (unregistering): Released all slaves [ 791.379057][ T1413] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 791.453426][T15403] hsr_slave_0: left promiscuous mode [ 791.459740][T15403] hsr_slave_1: left promiscuous mode [ 791.465466][T15403] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 791.472893][T15403] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 791.481556][T15403] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 791.489059][T15403] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 791.499746][T15403] veth1_macvtap: left promiscuous mode [ 791.505294][T15403] veth0_macvtap: left promiscuous mode [ 791.510916][T15403] veth1_vlan: left promiscuous mode [ 791.516220][T15403] veth0_vlan: left promiscuous mode [ 791.592043][T15403] team0 (unregistering): Port device team_slave_1 removed [ 791.601753][T15403] team0 (unregistering): Port device team_slave_0 removed [ 791.662105][ T1413] veth0_vlan: entered promiscuous mode [ 791.672184][ T1413] veth1_vlan: entered promiscuous mode [ 791.689551][ T1413] veth0_macvtap: entered promiscuous mode [ 791.714522][ T1413] veth1_macvtap: entered promiscuous mode [ 791.725227][ T1413] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 791.735718][ T1413] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 791.745527][ T1413] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 791.755966][ T1413] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 791.767134][ T1413] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 791.779814][ T1413] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 791.790264][ T1413] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 791.800136][ T1413] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 791.810580][ T1413] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 791.821635][ T1413] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 791.831335][ T1413] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 791.840173][ T1413] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 791.848940][ T1413] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 791.857633][ T1413] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.045045][ T1507] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 792.059169][ T1507] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 792.068461][ T1507] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 792.078099][ T1507] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 792.120470][ T1507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 792.134109][ T1507] 8021q: adding VLAN 0 to HW filter on device team0 [ 792.144560][T15402] bridge0: port 1(bridge_slave_0) entered blocking state [ 792.151713][T15402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 792.174558][ T1507] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 792.185034][ T1507] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 792.200794][T15402] bridge0: port 2(bridge_slave_1) entered blocking state [ 792.207944][T15402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 792.271863][ T1507] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 792.366651][ T1507] veth0_vlan: entered promiscuous mode [ 792.374554][ T1507] veth1_vlan: entered promiscuous mode [ 792.389174][ T1507] veth0_macvtap: entered promiscuous mode [ 792.396977][ T1507] veth1_macvtap: entered promiscuous mode [ 792.407573][ T1507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 792.418044][ T1507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.427928][ T1507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 792.438397][ T1507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.448195][ T1507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 792.458708][ T1507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.469358][ T1507] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 792.480380][ T1507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 792.490847][ T1507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.500647][ T1507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 792.511044][ T1507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.520841][ T1507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 792.531250][ T1507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.542139][ T1507] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 792.551904][ T1507] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.560761][ T1507] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.569507][ T1507] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.578272][ T1507] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 792.592383][ T1723] pim6reg1: entered promiscuous mode [ 792.597759][ T1723] pim6reg1: entered allmulticast mode [ 792.737978][ T1736] 9pnet: Could not find request transport: fd [ 793.589046][ T1738] ================================================================== [ 793.597149][ T1738] BUG: KCSAN: data-race in _free_event / perf_pending_task [ 793.604369][ T1738] [ 793.606692][ T1738] write to 0xffff88811587a640 of 4 bytes by task 1739 on cpu 1: [ 793.614322][ T1738] perf_pending_task+0xe8/0x220 [ 793.619173][ T1738] task_work_run+0x13a/0x1a0 [ 793.623760][ T1738] syscall_exit_to_user_mode+0xbe/0x130 [ 793.629304][ T1738] do_syscall_64+0xd6/0x1c0 [ 793.633797][ T1738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 793.639686][ T1738] [ 793.641996][ T1738] read to 0xffff88811587a640 of 4 bytes by task 1738 on cpu 0: [ 793.649523][ T1738] _free_event+0xcf/0xa10 [ 793.653878][ T1738] perf_event_release_kernel+0x61a/0x670 [ 793.659510][ T1738] perf_release+0x25/0x30 [ 793.663835][ T1738] __fput+0x192/0x6f0 [ 793.667802][ T1738] ____fput+0x15/0x20 [ 793.671768][ T1738] task_work_run+0x13a/0x1a0 [ 793.676347][ T1738] syscall_exit_to_user_mode+0xbe/0x130 [ 793.681892][ T1738] do_syscall_64+0xd6/0x1c0 [ 793.686386][ T1738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 793.692275][ T1738] [ 793.694579][ T1738] value changed: 0x7bef85df -> 0x00000000 [ 793.700279][ T1738] [ 793.702594][ T1738] Reported by Kernel Concurrency Sanitizer on: [ 793.708724][ T1738] CPU: 0 UID: 0 PID: 1738 Comm: syz.0.7818 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 793.719381][ T1738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 793.729422][ T1738] ==================================================================