last executing test programs: 6.014228866s ago: executing program 2 (id=2035): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r4, &(0x7f00000000c0)=[{&(0x7f0000000100)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="8d", 0x1}], 0x1, 0x0, 0x0, 0x5}], 0x1, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f0000000140)={@broadcast, @loopback, 0x0, 0x6, [@broadcast, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @loopback, @multicast1]}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000000008d"], 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000080)={r6, 0x81, 0x20}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={r6, 0x2}, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240), r4) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@private1, @private0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x0, 0xb, 0x0, 0x100, 0x4, 0x0, r2}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@private2={0xfc, 0x2, '\x00', 0x1}, @empty, @private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x6, 0x0, 0x0, 0x6, 0x900066, r2}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r7) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000200)={'wlan0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r8, @ANYRESOCT=r7], 0x6c}}, 0x0) 5.821683095s ago: executing program 2 (id=2037): r0 = socket$kcm(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000f1000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r6, &(0x7f0000000340), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r7, 0x891d, &(0x7f0000000180)="36c4a5e33a6081f2e0fcc31a2ea92ef80f6427c344d1178a1c43ca4fabd6ec67b9f27cd83b08959c0e471c4aa78b9cc4c77dc3adcc0782f3c379a03019e3bfd92533743c915077dd984784e531853d184c539dcac54ff2e955ba3fd1c00b016be57263b9695d15c56bbfcc195f2becfab2f4273ea8aee645f9062c6ac6c6c02f59935620d42a59a7e285c4e602b443cbf3e1bfd856d18e4f37b281b5e13b55a48e24a9981b78fe163a9de127f5a2c8ae0a92cbc18936a1f44e298ff0acca36a0ecd21c85742bf68ca3ddf9884b543d868eac5217ad9b7bba6311f1707be2d5766abba3d757582a9b922b726173db7a850000983fcc0100") r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x18) poll(0x0, 0x0, 0x200) socket(0x1d, 0x6, 0xffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r10, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="34000000020801020000000000000000020000020600024088fb00000900010073797a30000000000400048006000240890d000008254fb9fc090da91d899b8c2c8b7ca93eedbcb3879ef2ad139d741b9e1e1911"], 0x34}}, 0x200080c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) shutdown(r3, 0x1) ppoll(&(0x7f0000000500)=[{r4}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x4000000, 0x0, 0x3, 0xfffffffffffffbfd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/19, 0x13}, 0x3}], 0x4000169, 0x60, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b05d25a806c8c6f94f90324fc6004001c000a000200053582c137153e37000c0480fc0b10000300", 0x33fe0}], 0x1}, 0x0) 4.902366833s ago: executing program 2 (id=2043): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b0050000000000002900000036000000"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 4.870525123s ago: executing program 3 (id=2044): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, 0x0, &(0x7f0000000040)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x81, 0x3, 0x8000, 0x52, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = socket$inet6(0xa, 0x80002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x7fefd, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = socket$inet_smc(0x2b, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r11, 0x58, &(0x7f0000000280)={0x0, 0x0}}, 0x10) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e00)={r12}, 0xc) close(r13) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x1f}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x28, 0x3, 0x6, 0x201, 0x0, 0x0, {0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x4001, 0x3, 0x1318, 0x1158, 0x0, 0x148, 0x0, 0x148, 0x1280, 0x240, 0x240, 0x1280, 0x240, 0x7fffffe, 0x0, {[{{@ip={@multicast2, @remote, 0x0, 0x0, 'ip6gretap0\x00', 'bridge0\x00'}, 0x0, 0x10f8, 0x1158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@unspec=@cgroup1={{0x1030}, {0x1, 0x0, 0x0, 0x0, './cgroup/syz0\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x1378) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r7, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x8, 0xc, &(0x7f0000000580)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xff7, &(0x7f0000002e00)=""/4087, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) socket$inet_sctp(0x2, 0x5, 0x84) 4.057949559s ago: executing program 0 (id=2048): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b0050000000000002900000036000000"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 4.047600714s ago: executing program 3 (id=2049): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f00008b7000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x1000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)='%-5lx \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 3.972813465s ago: executing program 2 (id=2050): socket$pppoe(0x18, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) unshare(0x62040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000021000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000400000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000300000000000000ffff0000000000000000000000000000000062726983676530000000000000000000736974300000000000000000000000007465616d300000000000000000000000aaaaaaaaaaaa000000000000aaaaaaaaaabb0000000000000000d8010000d801000010020000636f6d6d656e7400000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073746174697374696300000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa000000ffffffff000000001b0000000000000000007465616d5f736c6176655f310000000069726c616e300000000000000000000069726c616e3000e575dd73000000000073797a6b616c6c6572300000000000000180c2000000000000000000f646793b7b3900000000000000007000000070000000a8000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa000000ffffffff00000000"]}, 0x3c0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0xc, &(0x7f0000000240)=0x3, 0x4) connect$inet(r2, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00000000c0)=0x5, 0xfffffffffffffdd2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000dc020078000000000000000000000000ff02000000000000e26ea7250000000100000000000000000a"], 0xb8}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0xe8}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="650100001b"], 0x188}}, 0x0) recvmmsg(r2, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=""/1, 0x1}, 0x8}], 0x1, 0x32103, 0x0) close(r0) r4 = socket$netlink(0x10, 0x3, 0x0) unshare(0x60020c80) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f000000000000000000000000000039d1c723d667ee8b42bce1f54f7559"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x11, 0x3, &(0x7f0000000940)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='contention_end\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x2, 0xb, &(0x7f0000000980)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x181}, @alu={0x4, 0x0, 0x7, 0x5, 0xb, 0xfffffffffffffffe, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x7}, @alu={0x4, 0x1, 0x5, 0x4, 0xa, 0x6, 0x4}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r4) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 3.917242366s ago: executing program 3 (id=2051): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) unshare(0x2000380) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getpeername(r1, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x5}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_MARK={0x7, 0x10, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004880}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x47, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4cf68d79c8eac253, 0xffffffffffffffff, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="180100001700000000000000a54b0000850000007500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x14}]}}, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='signal_generate\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000200)='sys_enter\x00', r4}, 0x2b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000002000010000000000000000000200000000000001000000000800170065204e22080018"], 0x2c}, 0x1, 0x0, 0x0, 0x8044}, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x2}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x8000000}, [@call={0x85, 0x0, 0x0, 0x2e}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x17}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e0b9545dd30a3731677b2d0bfa91", 0x0, 0x27cb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0x4000) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, 0x0, 0x0) r8 = accept4(r7, 0x0, 0x0, 0x0) sendmsg$nl_route_sched_retired(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000012100), 0xe078}}, 0x0) recvmmsg(r8, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)=""/21, 0x15}], 0x1}}], 0x1, 0x60, 0x0) ioctl$FS_IOC_GETFSLABEL(r6, 0x400452c8, &(0x7f0000000100)) socket$kcm(0x2, 0x1, 0x84) 3.596991664s ago: executing program 3 (id=2053): unshare(0x40000000) r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@deltclass={0x24, 0x29, 0x200, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {}, {0x4, 0xfff2}, {0x1e, 0xc}}}, 0x24}, 0x1, 0x0, 0x0, 0x811}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newqdisc={0x3c, 0x24, 0xd0f, 0x70bd2b, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0x8}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_plug={{0x9}, {0xc, 0x2, {0x1, 0x7ffffffd}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008000}, 0x3000c81c) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000005c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, r4, 0x121, 0x70bd2c, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000004}, 0x4040) getsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000240)=""/75, &(0x7f00000002c0)=0x4b) bind$alg(r5, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a", 0x440) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 3.411100441s ago: executing program 4 (id=2055): socket(0x840000000002, 0x3, 0x100) socket$inet_mptcp(0x2, 0x1, 0x106) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x2}, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r3 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@getstat={0xe0, 0x15, 0x0, 0x70bd29, 0x0, {{'digest_null-generic\x00'}, '\x00', '\x00', 0x0, 0x2400}}, 0xe0}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) sendmsg$nl_crypto(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xf0}}, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='udp_fail_queue_rcv_skb\x00', r0}, 0x18) r4 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000ec0301"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r6, &(0x7f0000000340)="04040000010001", 0x7) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r9, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000280)='swiotlb_bounced\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r10, &(0x7f0000000400)='rdma.current\x00', 0x275a, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x2, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0xf}, {0x8, 0xffff}, {0xe}}}, 0x24}}, 0x0) 3.279102425s ago: executing program 4 (id=2056): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/19, 0x13}, 0xfffeffff}], 0x1, 0x60, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 3.066707217s ago: executing program 0 (id=2058): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 2.224112435s ago: executing program 4 (id=2059): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/19, 0x13}, 0xfffeffff}], 0x1, 0x60, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 2.180790563s ago: executing program 1 (id=2060): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="4934542a12b4aa312d00c9ee98314542336d8a0695a0d3125df505e8fa1d4f95f30369389341e89c72193665215a35", 0x2f}, {&(0x7f0000000800)="845ff8861789fc720b92385dd763ea59daca7a91ae61f2df61d034baff16561ac4eb28928ed664e6d1eb3ad872823c70f1679976cd1aad7e58ba298450c000b5c6adaace4e2037872ce878bde4ef7fc5a92022b78d4d7f073005a0", 0x5b}, {&(0x7f0000000880)="42ae2fda31395c3b25f8db713c12902285446aa1a1b782d385404da19ef42cc8e93864039520c66ea8753f0a1c36bbeda74da57c827c17af1f49203b2d835ab803fd9a61ff57eed5b44b5fd9bd968e7c084b8497e308264104541e3cf5be2ddaef74089e3b01101889f1b224722e765a7b8fcc8393ee18a1bb1e13eaffa4ec6b744803043fbc67fd9bde7c5cf73d4542d2b39313384918e6177c247b2513213d7bc0d3652e7beb5ab8d8a4e9c23ecf94684f37a48452adf8f1107480944c2ba49c8a8416743aa304ef6ed33464befe16c34e534c6d14d262b1cacc2665346d1dd486da", 0xe3}, {&(0x7f0000000980)="73b8811a46471c49adc769a70506cf3236941d8586d78af1c3a8581e65fce1c55cfe5daf25179d45f3044650e7a78fb8e75b977004238bfd96c8c1cde1fc49153bf8a7e94f2c683031e3331f19aa740b32ff2aef94365816a334053a43955612cc21973a169503058f3f4e4e925c498f10e480b398a7a0db50c29c0fb4787c77106541047f21860eb45c778cf9a1f7de74ffa679de8df6376c37ed234b376c791b5215bc9dde67e80e0138", 0xab}], 0x4, &(0x7f0000000b40)=[@cred={{0x1c}}], 0x20, 0x4004}}, {{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f00000021c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8, 0x2}}], 0x2, 0x4040001) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010000100000300"/20, @ANYRES32, @ANYRESHEX=r1], 0x44}, 0x1, 0x2}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_QOS_MAP(r3, 0x0, 0x4040) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32, @ANYBLOB="0000000000008000280012800a"], 0x50}}, 0x4000000) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000100001002bbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="010000000000000008000500", @ANYRES32=0x0, @ANYBLOB="05001100000000001400030076657468305f746f5f62617461657600"], 0x44}}, 0x8054) r5 = epoll_create1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1b, 0x3, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x41100, 0x25, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x10002) ioctl$int_in(r7, 0x5452, &(0x7f0000000240)=0x6) sendmmsg$unix(r8, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000700)='E', 0x1}], 0x1, 0x0, 0x0, 0x14008000}}], 0x1, 0x40000) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xe0}}, 0x0) sendmsg$nl_crypto(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="e8000000110001"], 0xe8}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000000040)={0x90000005}) epoll_pwait(r5, &(0x7f0000000100)=[{}], 0x1, 0xfffeffff, 0x0, 0x443c000000000000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x40804) socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r10, 0x103, 0x3, &(0x7f0000000480)=0x3, &(0x7f00000004c0)=0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) 2.053515452s ago: executing program 0 (id=2061): unshare(0x4000600) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28"], 0x7c}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000003c00072301fcffffff00000003"], 0x24}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, 0x0, 0x0) sendmsg$rds(r2, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000fcffffff00000000000000008500000041000000850000000500000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f00000055c0), 0x400023c, 0x300, 0x0) recvmmsg(r1, 0x0, 0x0, 0x120, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000140)=0x4, 0x4) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x9, 0x0, 0xffffffff}, 0x1c) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004400)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x15, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b1109000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_FLUSH(r6, 0x29, 0xd0, &(0x7f0000000240), 0x4) close(0x3) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x1, 'macvlan0\x00', {}, 0x5}) 1.80199998s ago: executing program 1 (id=2062): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c020000", @ANYRES16=r0, @ANYBLOB="01000000000000000000010000001400020077673100000000000000000000000000f40108807000008048000980280000f8060001000a00000014000200fe8000000000000000000300000000aa05000300000000001c000080060001000200000908000200e0000001050003000000000024000100000000000000000000000000000000000000000000000000000000000000000080010080200004000a004e2000000005200100000000000000000000000000000800000006000500b01f00000800030006000000060005000500000008000a000100000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff200004000a034e200000040100000000000000000000ffffac14142a06000000240001000000000000000000000000000000000000000000000000000000000000000000d4000980"], 0x21c}}, 0x0) 1.683439165s ago: executing program 0 (id=2063): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f00008b7000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x1000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)='%-5lx \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 1.563817205s ago: executing program 0 (id=2064): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b00500000000000029"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 1.533847279s ago: executing program 1 (id=2065): socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000500)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r4, 0x1, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000084}, 0x40) 1.378629738s ago: executing program 3 (id=2066): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000022c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="4934542a12b4aa312d00c9ee98314542336d8a0695a0d3125df505e8fa1d4f95f30369389341e89c72193665215a35", 0x2f}, {&(0x7f0000000800)="845ff8861789fc720b92385dd763ea59daca7a91ae61f2df61d034baff16561ac4eb28928ed664e6d1eb3ad872823c70f1679976cd1aad7e58ba298450c000b5c6adaace4e2037872ce878bde4ef7fc5a92022b78d4d7f073005a0", 0x5b}, {&(0x7f0000000880)="42ae2fda31395c3b25f8db713c12902285446aa1a1b782d385404da19ef42cc8e93864039520c66ea8753f0a1c36bbeda74da57c827c17af1f49203b2d835ab803fd9a61ff57eed5b44b5fd9bd968e7c084b8497e308264104541e3cf5be2ddaef74089e3b01101889f1b224722e765a7b8fcc8393ee18a1bb1e13eaffa4ec6b744803043fbc67fd9bde7c5cf73d4542d2b39313384918e6177c247b2513213d7bc0d3652e7beb5ab8d8a4e9c23ecf94684f37a48452adf8f1107480944c2ba49c8a8416743aa304ef6ed33464befe16c34e534c6d14d262b1cacc2665346d1dd486da", 0xe3}, {&(0x7f0000000980)="73b8811a46471c49adc769a70506cf3236941d8586d78af1c3a8581e65fce1c55cfe5daf25179d45f3044650e7a78fb8e75b977004238bfd96c8c1cde1fc49153bf8a7e94f2c683031e3331f19aa740b32ff2aef94365816a334053a43955612cc21973a169503058f3f4e4e925c498f10e480b398a7a0db50c29c0fb4787c77106541047f21860eb45c778cf9a1f7de74ffa679de8df6376c37ed234b376c791b5215bc9dde67e80e0138", 0xab}], 0x4, &(0x7f0000000b40)=[@cred={{0x1c}}], 0x20, 0x4004}}, {{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f00000021c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8, 0x2}}], 0x2, 0x4040001) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010000100000300"/20, @ANYRES32, @ANYRESHEX=r1], 0x44}, 0x1, 0x2}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_QOS_MAP(r3, 0x0, 0x4040) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32, @ANYBLOB="0000000000008000280012800a"], 0x50}}, 0x4000000) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000100001002bbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="010000000000000008000500", @ANYRES32=0x0, @ANYBLOB="05001100000000001400030076657468305f746f5f62617461657600"], 0x44}}, 0x8054) r5 = epoll_create1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1b, 0x3, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x41100, 0x25, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x10002) ioctl$int_in(r7, 0x5452, &(0x7f0000000240)=0x6) sendmmsg$unix(r8, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000700)='E', 0x1}], 0x1, 0x0, 0x0, 0x14008000}}], 0x1, 0x40000) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xe0}}, 0x0) sendmsg$nl_crypto(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="e8000000110001"], 0xe8}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000000040)={0x90000005}) epoll_pwait(r5, &(0x7f0000000100)=[{}], 0x1, 0xfffeffff, 0x0, 0x443c000000000000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x40804) socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_N2(r10, 0x103, 0x3, &(0x7f0000000480)=0x3, &(0x7f00000004c0)=0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) 1.374014389s ago: executing program 2 (id=2067): unshare(0x40000000) r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@deltclass={0x24, 0x29, 0x200, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {}, {0x4, 0xfff2}, {0x1e, 0xc}}}, 0x24}, 0x1, 0x0, 0x0, 0x811}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newqdisc={0x3c, 0x24, 0xd0f, 0x70bd2b, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0x8}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_plug={{0x9}, {0xc, 0x2, {0x1, 0x7ffffffd}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008000}, 0x3000c81c) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000005c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, r4, 0x121, 0x70bd2c, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000004}, 0x4040) getsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000240)=""/75, &(0x7f00000002c0)=0x4b) bind$alg(r5, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="8a", 0x440) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 1.22845299s ago: executing program 4 (id=2068): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/19, 0x13}, 0xfffeffff}], 0x1, 0x60, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 1.016368849s ago: executing program 3 (id=2069): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b00500000000000029"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 554.704334ms ago: executing program 0 (id=2070): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b00500000000000029"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 538.942019ms ago: executing program 1 (id=2071): socket$nl_route(0x10, 0x3, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha20-simd,anubis-generic,nhpoly1305-sse2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="c99b57381801238c09d0ff0f1d0dbd301e5a47b2f3caa73dcd2a6a370554375a", 0x20) r1 = accept4(r0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000500000085000000ba000000a70000000000000018000000000000000000000000000000950000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$nl_route_sched(r1, &(0x7f0000013a40)={0x0, 0x0, 0x0}, 0x0) close(r1) 360.750596ms ago: executing program 1 (id=2072): socket$kcm(0x10, 0x2, 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'hsr0\x00'}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$kcm(0x29, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000000)=@bpq0, 0xfffffffffffffe1d) ioctl$sock_netdev_private(r2, 0x8914, &(0x7f0000000000)) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={0x0, @null, @bpq0, 0x900, 'syz0\x00', @bcast, 0x9, 0x0, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r3}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) close(r5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="18000c4a8784000000181100"/23, @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b7000000000000009500000000000000", @ANYRESDEC=r5], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r7, 0x0, 0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001e40)={r6, &(0x7f0000000300), 0x0}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) write$bt_hci(r5, &(0x7f0000000240)={0x1, @sniff_subrate={{0x811, 0x8}, {0xc9, 0x800, 0x10, 0xfff7}}}, 0xc) 262.166193ms ago: executing program 4 (id=2073): socket$inet(0xa, 0x801, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="540000001000370400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000340012800e0001006970"], 0x54}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000004240)=0x40000006, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000000)=0x7f, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 205.626844ms ago: executing program 2 (id=2074): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/19, 0x13}, 0xfffeffff}], 0x1, 0x60, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 60.765792ms ago: executing program 1 (id=2075): socket$kcm(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x104}}, 0x20008000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r1, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x5b0}, 0x20008001) sendmsg$inet6(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="376cd97cb39285495ddf4bd660c811b4dca74500799dac8f26884d6d4cc781a3b510574bd853ed8eae31de87a5", 0x2d}], 0x1}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x66, 0xfe, 0x4, 0x0, 0x40, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9}, 0xe) shutdown(r2, 0x1) r3 = socket$inet(0xa, 0x801, 0x84) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x891c) shutdown(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)="b970f6aa2bfdc9d7afbfe5c81e0b9b00b49015199ee375d7bd1e9a044aead3faf4a0f39154893e76f7c07b1ef464add3dac1272dfb540106eff5d18585394f8978a2a6e597b9479e904e68cfe4474d047fbd2a138da70c600c760ce32fdd162b9866cd8b1d2908ea2599011aba31a4b1193250944e602609300cbbb8f2bd89acef5fd0471e96cd071c31f8", 0x8b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) shutdown(r3, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x4040850) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) ppoll(&(0x7f00000003c0)=[{r4}], 0x1, 0x0, 0x0, 0xdec059c05cad5f72) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, 0x0, 0x0) 0s ago: executing program 4 (id=2076): socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000500)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) sendmmsg$inet6(r3, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000180)='i', 0x20086}], 0x1}}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r4, 0x1, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000084}, 0x40) kernel console output (not intermixed with test programs): dge0: port 3(team0) entered blocking state [ 185.451464][T10084] bridge0: port 3(team0) entered disabled state [ 185.458281][T10084] team0: entered allmulticast mode [ 185.463425][T10084] team_slave_0: entered allmulticast mode [ 185.469712][T10084] team_slave_1: entered allmulticast mode [ 185.531658][T10097] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.595116][T10097] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.754092][T10097] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.812019][T10113] FAULT_INJECTION: forcing a failure. [ 185.812019][T10113] name failslab, interval 1, probability 0, space 0, times 0 [ 185.840765][T10113] CPU: 0 UID: 0 PID: 10113 Comm: syz.4.1515 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 185.840784][T10113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 185.840790][T10113] Call Trace: [ 185.840794][T10113] [ 185.840799][T10113] dump_stack_lvl+0x241/0x360 [ 185.840819][T10113] ? __pfx_dump_stack_lvl+0x10/0x10 [ 185.840833][T10113] ? __pfx__printk+0x10/0x10 [ 185.840847][T10113] ? __pfx_fib_rules_lookup+0x10/0x10 [ 185.840861][T10113] ? l3mdev_update_flow+0x29/0x5f0 [ 185.840879][T10113] should_fail_ex+0x3b0/0x4e0 [ 185.840891][T10113] should_failslab+0xac/0x100 [ 185.840906][T10113] ? dst_alloc+0x12b/0x190 [ 185.840915][T10113] kmem_cache_alloc_noprof+0x70/0x380 [ 185.840932][T10113] dst_alloc+0x12b/0x190 [ 185.840944][T10113] ip_route_output_key_hash_rcu+0x13cc/0x2390 [ 185.840964][T10113] ip_route_output_key_hash+0x193/0x2b0 [ 185.840976][T10113] ? ip_route_output_key_hash+0xdf/0x2b0 [ 185.840986][T10113] ? __pfx_ip_route_output_key_hash+0x10/0x10 [ 185.840999][T10113] ? __pfx__copy_from_iter+0x10/0x10 [ 185.841011][T10113] ? tomoyo_check_acl+0x37e/0x3f0 [ 185.841031][T10113] ip_route_output_flow+0x29/0x140 [ 185.841042][T10113] raw_sendmsg+0x160c/0x24a0 [ 185.841066][T10113] ? __pfx_raw_sendmsg+0x10/0x10 [ 185.841084][T10113] ? aa_sk_perm+0x96d/0xab0 [ 185.841097][T10113] ? __pfx_aa_sk_perm+0x10/0x10 [ 185.841109][T10113] ? inet_sendmsg+0x330/0x390 [ 185.841123][T10113] __sock_sendmsg+0x1a6/0x270 [ 185.841139][T10113] __sys_sendto+0x363/0x4c0 [ 185.841151][T10113] ? __pfx___sys_sendto+0x10/0x10 [ 185.841168][T10113] ? __fget_files+0x2a/0x410 [ 185.841186][T10113] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 185.841200][T10113] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 185.841215][T10113] __x64_sys_sendto+0xde/0x100 [ 185.841227][T10113] do_syscall_64+0xf3/0x230 [ 185.841239][T10113] ? clear_bhb_loop+0x35/0x90 [ 185.841251][T10113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 185.841261][T10113] RIP: 0033:0x7f2abb18cda9 [ 185.841270][T10113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.841278][T10113] RSP: 002b:00007f2abbf13038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 185.841290][T10113] RAX: ffffffffffffffda RBX: 00007f2abb3a5fa0 RCX: 00007f2abb18cda9 [ 185.841296][T10113] RDX: 000000000000ffec RSI: 0000000020000040 RDI: 0000000000000003 [ 185.841302][T10113] RBP: 00007f2abbf13090 R08: 0000000020000340 R09: 0000000000000010 [ 185.841308][T10113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.841313][T10113] R13: 0000000000000000 R14: 00007f2abb3a5fa0 R15: 00007fff62e93b68 [ 185.841328][T10113] [ 185.843841][T10097] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.193647][T10121] __nla_validate_parse: 8 callbacks suppressed [ 186.193666][T10121] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1517'. [ 186.280732][T10097] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.313330][T10097] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.316723][T10126] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1517'. [ 186.338223][T10124] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1518'. [ 186.397248][T10126] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1517'. [ 186.442204][T10097] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.462373][T10127] lo speed is unknown, defaulting to 1000 [ 186.488298][T10097] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.504505][T10121] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1517'. [ 186.559954][T10132] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1520'. [ 187.056615][T10140] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1523'. [ 187.065528][T10140] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1523'. [ 187.131476][T10142] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1523'. [ 187.220069][T10140] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1523'. [ 187.281505][T10145] bridge7: entered promiscuous mode [ 187.331029][T10145] bridge7: entered allmulticast mode [ 187.365422][T10145] team0: Port device bridge7 added [ 187.710016][T10155] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.786510][T10155] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.934215][T10155] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.975510][T10177] netlink: 'syz.1.1538': attribute type 10 has an invalid length. [ 188.035788][T10155] bridge0: port 5(netdevsim0) entered disabled state [ 188.084197][T10182] xt_ecn: cannot match TCP bits for non-tcp packets [ 188.100178][T10155] netdevsim netdevsim4 netdevsim0 (unregistering): left allmulticast mode [ 188.116369][T10155] netdevsim netdevsim4 netdevsim0 (unregistering): left promiscuous mode [ 188.126639][T10155] bridge0: port 5(netdevsim0) entered disabled state [ 188.160660][T10155] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 188.215508][T10187] bridge4: entered promiscuous mode [ 188.233905][T10187] bridge4: entered allmulticast mode [ 188.307660][T10155] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.322731][T10155] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.338136][T10155] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.352659][T10155] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.597036][T10202] netlink: 'syz.3.1548': attribute type 3 has an invalid length. [ 188.737932][T10205] netlink: 'syz.2.1550': attribute type 10 has an invalid length. [ 188.791706][T10210] netlink: 'syz.0.1551': attribute type 10 has an invalid length. [ 188.800993][T10205] bridge0: port 3(team0) entered disabled state [ 188.808460][T10212] netlink: 'syz.2.1550': attribute type 10 has an invalid length. [ 188.817836][T10205] team0: left allmulticast mode [ 188.822730][T10205] team_slave_0: left allmulticast mode [ 188.836243][T10205] team_slave_1: left allmulticast mode [ 188.842425][T10213] netlink: 'syz.0.1551': attribute type 10 has an invalid length. [ 188.855237][T10205] bridge3: left allmulticast mode [ 188.860685][T10205] bridge4: left allmulticast mode [ 188.866647][T10205] team0: left promiscuous mode [ 188.872678][T10205] team_slave_0: left promiscuous mode [ 188.878848][T10205] team_slave_1: left promiscuous mode [ 188.880585][ T2997] tipc: Subscription rejected, illegal request [ 188.885251][T10205] bridge0: port 3(team0) entered disabled state [ 188.905443][T10205] batman_adv: batadv0: Adding interface: team0 [ 188.914041][T10205] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.996123][T10205] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 189.100899][T10210] bridge0: port 1(team0) entered disabled state [ 189.108081][T10210] team0: left allmulticast mode [ 189.113144][T10210] team0: left promiscuous mode [ 189.118700][T10210] bridge0: port 1(team0) entered disabled state [ 189.129584][T10210] batman_adv: batadv0: Adding interface: team0 [ 189.137814][T10210] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.181407][T10210] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 189.196574][T10212] team0: entered promiscuous mode [ 189.201671][T10212] team_slave_0: entered promiscuous mode [ 189.236419][T10212] team_slave_1: entered promiscuous mode [ 189.245176][T10212] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.252718][T10212] batman_adv: batadv0: Interface activated: team0 [ 189.259729][T10212] batman_adv: batadv0: Interface deactivated: team0 [ 189.267037][T10212] batman_adv: batadv0: Removing interface: team0 [ 189.275076][T10212] bridge0: port 3(team0) entered blocking state [ 189.282068][T10212] bridge0: port 3(team0) entered disabled state [ 189.289236][T10212] team0: entered allmulticast mode [ 189.294491][T10212] team_slave_0: entered allmulticast mode [ 189.300893][T10212] team_slave_1: entered allmulticast mode [ 189.307252][T10212] bridge3: entered allmulticast mode [ 189.312571][T10212] bridge4: entered allmulticast mode [ 189.349739][T10213] team0: entered promiscuous mode [ 189.357791][T10213] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.364635][T10213] batman_adv: batadv0: Interface activated: team0 [ 189.371655][T10213] batman_adv: batadv0: Interface deactivated: team0 [ 189.379022][T10213] batman_adv: batadv0: Removing interface: team0 [ 189.387955][T10213] bridge0: port 1(team0) entered blocking state [ 189.394434][T10213] bridge0: port 1(team0) entered disabled state [ 189.401120][T10213] team0: entered allmulticast mode [ 189.409152][T10235] netlink: 'syz.3.1554': attribute type 2 has an invalid length. [ 189.441036][T10235] netlink: 'syz.3.1554': attribute type 4 has an invalid length. [ 189.679787][T10240] netlink: 'syz.2.1557': attribute type 10 has an invalid length. [ 189.720438][T10240] bridge0: port 3(team0) entered disabled state [ 189.735654][T10240] team0: left allmulticast mode [ 189.751758][T10246] netlink: 'syz.2.1557': attribute type 10 has an invalid length. [ 189.768401][T10240] team_slave_0: left allmulticast mode [ 189.782503][T10240] team_slave_1: left allmulticast mode [ 189.816763][T10240] bridge3: left allmulticast mode [ 189.821856][T10240] bridge4: left allmulticast mode [ 189.827746][T10240] team0: left promiscuous mode [ 189.832550][T10240] team_slave_0: left promiscuous mode [ 189.838740][T10240] team_slave_1: left promiscuous mode [ 189.844864][T10240] bridge0: port 3(team0) entered disabled state [ 189.910789][T10257] FAULT_INJECTION: forcing a failure. [ 189.910789][T10257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 189.925033][T10257] CPU: 0 UID: 0 PID: 10257 Comm: syz.0.1562 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 189.925058][T10257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 189.925068][T10257] Call Trace: [ 189.925074][T10257] [ 189.925082][T10257] dump_stack_lvl+0x241/0x360 [ 189.925111][T10257] ? __pfx_dump_stack_lvl+0x10/0x10 [ 189.925133][T10257] ? __pfx__printk+0x10/0x10 [ 189.925156][T10257] ? __pfx_lock_release+0x10/0x10 [ 189.925191][T10257] should_fail_ex+0x3b0/0x4e0 [ 189.925213][T10257] _copy_from_user+0x2d/0xb0 [ 189.925252][T10257] __sys_bpf+0x1a4/0x810 [ 189.925273][T10257] ? __pfx___sys_bpf+0x10/0x10 [ 189.925302][T10257] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 189.925325][T10257] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 189.925347][T10257] ? do_syscall_64+0x100/0x230 [ 189.925367][T10257] __x64_sys_bpf+0x7c/0x90 [ 189.925383][T10257] do_syscall_64+0xf3/0x230 [ 189.925399][T10257] ? clear_bhb_loop+0x35/0x90 [ 189.925419][T10257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 189.925436][T10257] RIP: 0033:0x7f0a7698cda9 [ 189.925450][T10257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 189.925464][T10257] RSP: 002b:00007f0a777a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 189.925483][T10257] RAX: ffffffffffffffda RBX: 00007f0a76ba5fa0 RCX: 00007f0a7698cda9 [ 189.925495][T10257] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a [ 189.925506][T10257] RBP: 00007f0a777a4090 R08: 0000000000000000 R09: 0000000000000000 [ 189.925516][T10257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 189.925526][T10257] R13: 0000000000000000 R14: 00007f0a76ba5fa0 R15: 00007ffd350f61c8 [ 189.925553][T10257] [ 190.321700][T10240] batman_adv: batadv0: Adding interface: team0 [ 190.352218][T10240] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 190.379004][T10240] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 190.406246][T10246] team0: entered promiscuous mode [ 190.411673][T10246] team_slave_0: entered promiscuous mode [ 190.419316][T10246] team_slave_1: entered promiscuous mode [ 190.452445][T10246] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.472103][T10246] batman_adv: batadv0: Interface activated: team0 [ 190.510208][T10246] batman_adv: batadv0: Interface deactivated: team0 [ 190.526649][T10246] batman_adv: batadv0: Removing interface: team0 [ 190.536969][T10246] bridge0: port 3(team0) entered blocking state [ 190.556609][T10246] bridge0: port 3(team0) entered disabled state [ 190.563332][T10246] team0: entered allmulticast mode [ 190.586070][T10246] team_slave_0: entered allmulticast mode [ 190.592262][T10246] team_slave_1: entered allmulticast mode [ 190.605973][T10246] bridge3: entered allmulticast mode [ 190.611315][T10246] bridge4: entered allmulticast mode [ 190.942069][T10288] team0: entered promiscuous mode [ 190.967417][T10288] team_slave_0: entered promiscuous mode [ 190.977672][T10288] team_slave_1: entered promiscuous mode [ 190.989343][T10288] bridge3: entered promiscuous mode [ 190.998650][T10288] bridge4: entered promiscuous mode [ 191.011553][T10288] bridge5: entered promiscuous mode [ 191.023189][T10288] bridge7: entered promiscuous mode [ 191.069837][T10288] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.084841][T10288] batman_adv: batadv0: Interface activated: team0 [ 191.101683][T10288] batman_adv: batadv0: Interface deactivated: team0 [ 191.175189][T10288] batman_adv: batadv0: Removing interface: team0 [ 191.217133][T10288] bridge0: port 1(team0) entered blocking state [ 191.223499][T10288] bridge0: port 1(team0) entered disabled state [ 191.236635][T10288] team0: entered allmulticast mode [ 191.242157][T10288] team_slave_0: entered allmulticast mode [ 191.250967][T10288] team_slave_1: entered allmulticast mode [ 191.256972][T10288] bridge4: entered allmulticast mode [ 191.264463][T10288] bridge0: port 1(team0) entered blocking state [ 191.270860][T10288] bridge0: port 1(team0) entered forwarding state [ 191.692180][T10304] __nla_validate_parse: 29 callbacks suppressed [ 191.692197][T10304] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1573'. [ 191.772496][T10308] FAULT_INJECTION: forcing a failure. [ 191.772496][T10308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.826825][T10308] CPU: 0 UID: 0 PID: 10308 Comm: syz.0.1576 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 191.826850][T10308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 191.826859][T10308] Call Trace: [ 191.826865][T10308] [ 191.826872][T10308] dump_stack_lvl+0x241/0x360 [ 191.826902][T10308] ? __pfx_dump_stack_lvl+0x10/0x10 [ 191.826923][T10308] ? __pfx__printk+0x10/0x10 [ 191.826945][T10308] ? __pfx_lock_release+0x10/0x10 [ 191.826973][T10308] should_fail_ex+0x3b0/0x4e0 [ 191.826993][T10308] _copy_from_user+0x2d/0xb0 [ 191.827014][T10308] copy_msghdr_from_user+0xae/0x680 [ 191.827041][T10308] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 191.827060][T10308] ? __fget_files+0x2a/0x410 [ 191.827083][T10308] ? __fget_files+0x2a/0x410 [ 191.827113][T10308] __sys_sendmsg+0x209/0x350 [ 191.827136][T10308] ? __pfx___sys_sendmsg+0x10/0x10 [ 191.827166][T10308] ? do_sys_openat2+0x17a/0x1d0 [ 191.827213][T10308] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 191.827233][T10308] ? do_syscall_64+0x100/0x230 [ 191.827252][T10308] ? do_syscall_64+0xb6/0x230 [ 191.827270][T10308] do_syscall_64+0xf3/0x230 [ 191.827285][T10308] ? clear_bhb_loop+0x35/0x90 [ 191.827305][T10308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 191.827322][T10308] RIP: 0033:0x7f0a7698cda9 [ 191.827336][T10308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.827350][T10308] RSP: 002b:00007f0a777a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 191.827368][T10308] RAX: ffffffffffffffda RBX: 00007f0a76ba5fa0 RCX: 00007f0a7698cda9 [ 191.827381][T10308] RDX: 0000000000040000 RSI: 0000000020000240 RDI: 0000000000000003 [ 191.827391][T10308] RBP: 00007f0a777a4090 R08: 0000000000000000 R09: 0000000000000000 [ 191.827401][T10308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.827411][T10308] R13: 0000000000000000 R14: 00007f0a76ba5fa0 R15: 00007ffd350f61c8 [ 191.827437][T10308] [ 192.052990][T10316] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1578'. [ 192.072651][T10316] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1578'. [ 192.160363][T10316] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1578'. [ 192.283587][T10316] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1578'. [ 192.362203][T10335] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1581'. [ 192.372817][T10334] lo speed is unknown, defaulting to 1000 [ 192.826867][T10348] lo speed is unknown, defaulting to 1000 [ 193.095307][T10357] openvswitch: netlink: Unexpected mask (mask=200040, allowed=10048) [ 193.913068][T10394] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 194.007203][T10394] netlink: 25 bytes leftover after parsing attributes in process `syz.1.1595'. [ 194.059368][T10394] infiniband syz0: set active [ 194.064241][ T975] lo speed is unknown, defaulting to 1000 [ 194.082515][ T975] lo speed is unknown, defaulting to 1000 [ 194.460753][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.467371][ T1295] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.578590][T10427] netlink: 187320 bytes leftover after parsing attributes in process `syz.2.1604'. [ 194.610389][T10427] netlink: zone id is out of range [ 194.630352][T10427] netlink: zone id is out of range [ 194.675597][T10427] netlink: zone id is out of range [ 194.727332][T10427] netlink: zone id is out of range [ 194.744775][T10427] netlink: zone id is out of range [ 194.756236][T10427] netlink: zone id is out of range [ 194.761392][T10427] netlink: zone id is out of range [ 194.806227][T10427] netlink: zone id is out of range [ 194.811399][T10427] netlink: zone id is out of range [ 194.844307][T10436] validate_nla: 2 callbacks suppressed [ 194.844323][T10436] netlink: 'syz.3.1607': attribute type 10 has an invalid length. [ 194.886848][T10441] netlink: 'syz.1.1609': attribute type 1 has an invalid length. [ 194.896233][T10440] netlink: 'syz.3.1607': attribute type 10 has an invalid length. [ 194.896597][T10436] bridge0: port 3(team0) entered disabled state [ 194.926086][T10440] netlink: 2 bytes leftover after parsing attributes in process `syz.3.1607'. [ 194.926312][T10436] team0: left allmulticast mode [ 194.956986][T10436] team_slave_0: left allmulticast mode [ 194.963498][T10436] team_slave_1: left allmulticast mode [ 194.964104][T10443] netlink: 'syz.0.1608': attribute type 10 has an invalid length. [ 194.969993][T10436] team0: left promiscuous mode [ 194.982657][T10446] netlink: 104 bytes leftover after parsing attributes in process `syz.4.1610'. [ 195.002697][T10436] team_slave_0: left promiscuous mode [ 195.013686][T10436] team_slave_1: left promiscuous mode [ 195.019505][T10436] bridge1: left promiscuous mode [ 195.025115][T10436] bridge0: port 3(team0) entered disabled state [ 195.043308][T10445] netlink: 'syz.0.1608': attribute type 10 has an invalid length. [ 195.081034][T10441] bond7: entered promiscuous mode [ 195.086330][T10441] bond7: entered allmulticast mode [ 195.092232][T10440] team0: entered promiscuous mode [ 195.100571][T10440] team_slave_0: entered promiscuous mode [ 195.107157][T10440] team_slave_1: entered promiscuous mode [ 195.113525][T10440] bridge1: entered promiscuous mode [ 195.120795][T10440] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.128631][T10440] bridge0: port 3(team0) entered blocking state [ 195.135142][T10440] bridge0: port 3(team0) entered disabled state [ 195.142532][T10440] team0: entered allmulticast mode [ 195.148165][T10440] team_slave_0: entered allmulticast mode [ 195.154382][T10440] team_slave_1: entered allmulticast mode [ 195.166883][T10443] bridge0: port 1(team0) entered disabled state [ 195.173829][T10443] team0: left allmulticast mode [ 195.179012][T10443] team0: left promiscuous mode [ 195.183932][T10443] bridge0: port 1(team0) entered disabled state [ 195.207685][T10443] batman_adv: batadv0: Adding interface: team0 [ 195.213948][T10443] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.260802][T10443] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 195.292973][T10448] batadv7: entered promiscuous mode [ 195.301456][T10448] 8021q: adding VLAN 0 to HW filter on device batadv7 [ 195.314492][T10448] bond7: (slave batadv7): making interface the new active one [ 195.326348][T10448] batadv7: entered allmulticast mode [ 195.333811][T10448] bond7: (slave batadv7): Enslaving as an active interface with an up link [ 195.343084][T10445] team0: entered promiscuous mode [ 195.350149][T10445] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.357414][T10445] batman_adv: batadv0: Interface activated: team0 [ 195.363906][T10445] batman_adv: batadv0: Interface deactivated: team0 [ 195.371873][T10445] batman_adv: batadv0: Removing interface: team0 [ 195.383725][T10445] bridge0: port 1(team0) entered blocking state [ 195.390253][T10445] bridge0: port 1(team0) entered disabled state [ 195.397863][T10445] team0: entered allmulticast mode [ 195.837207][T10471] netlink: 'syz.1.1616': attribute type 10 has an invalid length. [ 195.873959][T10471] bridge0: port 1(team0) entered disabled state [ 195.897159][T10471] team0: left allmulticast mode [ 195.899491][T10478] netlink: 'syz.1.1616': attribute type 10 has an invalid length. [ 195.902238][T10471] team_slave_0: left allmulticast mode [ 195.928086][T10473] netlink: 'syz.4.1618': attribute type 10 has an invalid length. [ 195.946038][T10471] team_slave_1: left allmulticast mode [ 195.952052][T10471] bridge4: left allmulticast mode [ 195.962973][T10471] team0: left promiscuous mode [ 195.968413][T10471] team_slave_0: left promiscuous mode [ 195.975105][T10471] team_slave_1: left promiscuous mode [ 195.981319][T10483] netlink: 'syz.4.1618': attribute type 10 has an invalid length. [ 195.992601][ T5842] block nbd3: Receive control failed (result -107) [ 195.995097][T10471] bridge3: left promiscuous mode [ 196.005515][T10471] bridge4: left promiscuous mode [ 196.011052][T10471] bridge5: left promiscuous mode [ 196.020876][T10471] bridge7: left promiscuous mode [ 196.026479][T10471] bridge0: port 1(team0) entered disabled state [ 196.037029][T10471] batman_adv: batadv0: Adding interface: team0 [ 196.043334][T10471] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.069811][T10471] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 196.083318][T10478] team0: entered promiscuous mode [ 196.089396][T10479] nbd3: detected capacity change from 0 to 256 [ 196.118493][ T5849] block nbd3: Dead connection, failed to find a fallback [ 196.122738][T10478] team_slave_0: entered promiscuous mode [ 196.180826][T10478] team_slave_1: entered promiscuous mode [ 196.196496][T10478] bridge3: entered promiscuous mode [ 196.202285][T10478] bridge4: entered promiscuous mode [ 196.267218][T10478] bridge5: entered promiscuous mode [ 196.272681][T10478] bridge7: entered promiscuous mode [ 196.319170][T10478] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.369855][T10478] batman_adv: batadv0: Interface activated: team0 [ 196.395554][T10478] batman_adv: batadv0: Interface deactivated: team0 [ 196.402990][T10478] batman_adv: batadv0: Removing interface: team0 [ 196.411122][T10478] bridge0: port 1(team0) entered blocking state [ 196.418527][T10478] bridge0: port 1(team0) entered disabled state [ 196.425405][T10478] team0: entered allmulticast mode [ 196.432647][T10478] team_slave_0: entered allmulticast mode [ 196.440337][T10478] team_slave_1: entered allmulticast mode [ 196.446547][T10478] bridge4: entered allmulticast mode [ 196.454772][T10478] bridge0: port 1(team0) entered blocking state [ 196.461150][T10478] bridge0: port 1(team0) entered forwarding state [ 196.490833][T10473] bridge0: port 4(team0) entered disabled state [ 196.499063][T10473] team0: left allmulticast mode [ 196.504196][T10473] team_slave_0: left allmulticast mode [ 196.511713][T10473] team_slave_1: left allmulticast mode [ 196.517810][T10473] team0: left promiscuous mode [ 196.522864][T10473] team_slave_0: left promiscuous mode [ 196.529155][T10473] team_slave_1: left promiscuous mode [ 196.535751][T10473] bridge0: port 4(team0) entered disabled state [ 196.547023][T10483] team0: entered promiscuous mode [ 196.557840][T10483] team_slave_0: entered promiscuous mode [ 196.570600][T10483] team_slave_1: entered promiscuous mode [ 196.581466][T10483] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.588750][T10483] bridge0: port 4(team0) entered blocking state [ 196.636342][T10483] bridge0: port 4(team0) entered disabled state [ 196.643076][T10483] team0: entered allmulticast mode [ 196.663053][T10483] team_slave_0: entered allmulticast mode [ 196.686069][T10483] team_slave_1: entered allmulticast mode [ 196.706535][T10483] bridge0: port 4(team0) entered blocking state [ 196.712893][T10483] bridge0: port 4(team0) entered forwarding state [ 196.746519][T10508] __nla_validate_parse: 14 callbacks suppressed [ 196.746539][T10508] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1624'. [ 196.898784][T10514] netlink: 'syz.1.1627': attribute type 13 has an invalid length. [ 196.919796][T10515] netlink: 104 bytes leftover after parsing attributes in process `syz.0.1626'. [ 197.061821][T10522] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1630'. [ 197.137675][T10526] erspan1: entered promiscuous mode [ 197.142934][T10526] erspan1: entered allmulticast mode [ 197.180690][T10529] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1633'. [ 197.219962][T10529] vlan3: entered promiscuous mode [ 197.326748][T10537] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1635'. [ 197.361846][T10537] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1635'. [ 197.372916][T10537] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1635'. [ 197.435126][T10539] bridge0: port 1(team0) entered disabled state [ 197.448934][T10542] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1639'. [ 197.459516][T10539] team0: left allmulticast mode [ 197.464557][T10542] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1639'. [ 197.474959][T10546] netlink: 2 bytes leftover after parsing attributes in process `syz.0.1638'. [ 197.484670][T10539] team0: left promiscuous mode [ 197.490183][T10539] bridge0: port 1(team0) entered disabled state [ 197.500536][T10539] batman_adv: batadv0: Adding interface: team0 [ 197.507020][T10539] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.535069][T10549] ebt_limit: overflow, try lower: 570423552/2483027968 [ 197.537218][T10539] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 197.614663][T10546] team0: entered promiscuous mode [ 197.621272][T10546] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.634143][T10546] batman_adv: batadv0: Interface activated: team0 [ 197.657798][T10546] batman_adv: batadv0: Interface deactivated: team0 [ 197.664682][T10546] batman_adv: batadv0: Removing interface: team0 [ 197.672616][T10546] bridge0: port 1(team0) entered blocking state [ 197.680153][T10546] bridge0: port 1(team0) entered disabled state [ 197.687431][T10546] team0: entered allmulticast mode [ 198.864356][T10602] bridge0: port 1(team0) entered disabled state [ 198.871619][T10602] team0: left allmulticast mode [ 198.881069][T10602] team0: left promiscuous mode [ 198.891400][T10602] bridge0: port 1(team0) entered disabled state [ 198.903627][T10602] batman_adv: batadv0: Adding interface: team0 [ 198.910989][T10602] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.949515][T10602] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 198.970979][T10609] bridge8: entered promiscuous mode [ 198.987741][T10609] bridge8: entered allmulticast mode [ 199.006841][T10609] team0: Port device bridge8 added [ 199.012955][T10612] FAULT_INJECTION: forcing a failure. [ 199.012955][T10612] name failslab, interval 1, probability 0, space 0, times 0 [ 199.026331][T10607] team0: entered promiscuous mode [ 199.033898][T10607] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.040849][T10612] CPU: 1 UID: 0 PID: 10612 Comm: syz.4.1663 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 199.040871][T10612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 199.040881][T10612] Call Trace: [ 199.040887][T10612] [ 199.040895][T10612] dump_stack_lvl+0x241/0x360 [ 199.040924][T10612] ? __pfx_dump_stack_lvl+0x10/0x10 [ 199.040947][T10612] ? __pfx__printk+0x10/0x10 [ 199.040970][T10612] ? kmem_cache_alloc_node_noprof+0x4f/0x380 [ 199.040993][T10612] ? __pfx___might_resched+0x10/0x10 [ 199.041016][T10612] should_fail_ex+0x3b0/0x4e0 [ 199.041038][T10612] should_failslab+0xac/0x100 [ 199.041061][T10612] kmem_cache_alloc_node_noprof+0x77/0x380 [ 199.041082][T10612] ? __alloc_skb+0x1c3/0x440 [ 199.041103][T10612] __alloc_skb+0x1c3/0x440 [ 199.041125][T10612] ? __pfx___alloc_skb+0x10/0x10 [ 199.041141][T10612] ? reacquire_held_locks+0x630/0x690 [ 199.041165][T10612] ? mark_lock+0x9a/0x360 [ 199.041188][T10612] alloc_skb_with_frags+0xc3/0x820 [ 199.041206][T10612] ? aa_label_sk_perm+0x4f3/0x6c0 [ 199.041240][T10612] sock_alloc_send_pskb+0x91a/0xa60 [ 199.041277][T10612] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 199.041312][T10612] hci_sock_sendmsg+0x22b/0x11c0 [ 199.041341][T10612] ? __pfx_aa_sk_perm+0x10/0x10 [ 199.041357][T10612] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 199.041379][T10612] ? __pfx_aa_file_perm+0x10/0x10 [ 199.041395][T10612] ? aa_sock_msg_perm+0x91/0x160 [ 199.041417][T10612] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 199.041437][T10612] __sock_sendmsg+0x221/0x270 [ 199.041461][T10612] sock_write_iter+0x2d7/0x3f0 [ 199.041484][T10612] ? __pfx_sock_write_iter+0x10/0x10 [ 199.041515][T10612] ? bpf_lsm_file_permission+0x9/0x10 [ 199.041530][T10612] ? security_file_permission+0x74/0x280 [ 199.041559][T10612] vfs_write+0xaeb/0xd30 [ 199.041581][T10612] ? __pfx_sock_write_iter+0x10/0x10 [ 199.041602][T10612] ? __pfx_vfs_write+0x10/0x10 [ 199.041617][T10612] ? do_sys_openat2+0x17a/0x1d0 [ 199.041641][T10612] ? __fget_files+0x2a/0x410 [ 199.041665][T10612] ? __fget_files+0x2a/0x410 [ 199.041695][T10612] ksys_write+0x18f/0x2b0 [ 199.041714][T10612] ? __pfx_ksys_write+0x10/0x10 [ 199.041732][T10612] ? do_syscall_64+0x100/0x230 [ 199.041750][T10612] ? do_syscall_64+0xb6/0x230 [ 199.041769][T10612] do_syscall_64+0xf3/0x230 [ 199.041788][T10612] ? clear_bhb_loop+0x35/0x90 [ 199.041808][T10612] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 199.041824][T10612] RIP: 0033:0x7f2abb18cda9 [ 199.041840][T10612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.041854][T10612] RSP: 002b:00007f2abbf13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 199.041871][T10612] RAX: ffffffffffffffda RBX: 00007f2abb3a5fa0 RCX: 00007f2abb18cda9 [ 199.041884][T10612] RDX: 0000000000000007 RSI: 0000000020000340 RDI: 000000000000000b [ 199.041894][T10612] RBP: 00007f2abbf13090 R08: 0000000000000000 R09: 0000000000000000 [ 199.041904][T10612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.041914][T10612] R13: 0000000000000000 R14: 00007f2abb3a5fa0 R15: 00007fff62e93b68 [ 199.041941][T10612] [ 199.266524][T10607] batman_adv: batadv0: Interface activated: team0 [ 199.359525][T10607] batman_adv: batadv0: Interface deactivated: team0 [ 199.366671][T10607] batman_adv: batadv0: Removing interface: team0 [ 199.374483][T10607] bridge0: port 1(team0) entered blocking state [ 199.381159][T10607] bridge0: port 1(team0) entered disabled state [ 199.388104][T10607] team0: entered allmulticast mode [ 199.531995][T10623] team0: Device syz_tun is up. Set it down before adding it as a team port [ 200.080933][T10642] input: Bluetooth HID Boot Protocol Device as /devices/virtual/bluetooth/hci3/hci3:200/input6 [ 200.410654][T10656] lo speed is unknown, defaulting to 1000 [ 201.003023][T10679] lo speed is unknown, defaulting to 1000 [ 201.382592][T10698] bridge: RTM_NEWNEIGH with invalid state 0x1 [ 201.426340][T10692] validate_nla: 7 callbacks suppressed [ 201.426357][T10692] netlink: 'syz.4.1689': attribute type 10 has an invalid length. [ 201.444314][T10692] bridge0: port 4(team0) entered disabled state [ 201.479779][T10692] team0: left allmulticast mode [ 201.484693][T10692] team_slave_0: left allmulticast mode [ 201.514941][T10699] netlink: 'syz.4.1689': attribute type 10 has an invalid length. [ 201.535943][T10692] team_slave_1: left allmulticast mode [ 201.545581][T10692] team0: left promiscuous mode [ 201.557542][T10692] team_slave_0: left promiscuous mode [ 201.563278][T10692] team_slave_1: left promiscuous mode [ 201.606271][T10692] bridge0: port 4(team0) entered disabled state [ 201.648805][T10699] team0: entered promiscuous mode [ 201.653983][T10699] team_slave_0: entered promiscuous mode [ 201.661150][T10699] team_slave_1: entered promiscuous mode [ 201.669471][T10699] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.676534][T10699] bridge0: port 4(team0) entered blocking state [ 201.683614][T10699] bridge0: port 4(team0) entered disabled state [ 201.699623][T10699] team0: entered allmulticast mode [ 201.706325][T10699] team_slave_0: entered allmulticast mode [ 201.712482][T10699] team_slave_1: entered allmulticast mode [ 201.732664][T10699] bridge0: port 4(team0) entered blocking state [ 201.739062][T10699] bridge0: port 4(team0) entered forwarding state [ 201.780551][T10719] __nla_validate_parse: 31 callbacks suppressed [ 201.780569][T10719] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1697'. [ 201.822355][T10719] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1697'. [ 201.858702][T10720] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1697'. [ 201.949708][T10712] bond3: left promiscuous mode [ 201.955063][T10712] bond3: left allmulticast mode [ 201.977418][T10721] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1697'. [ 201.984096][T10712] batadv3: left allmulticast mode [ 201.997009][T10712] batadv3: left promiscuous mode [ 202.015503][T10708] dvmrp0: entered allmulticast mode [ 202.261433][T10736] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1699'. [ 202.296100][T10736] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1699'. [ 202.316766][T10736] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1699'. [ 202.431024][T10743] ebt_among: wrong size: 2080 against expected 2280, rounded to 2280 [ 202.468880][T10743] netlink: 452 bytes leftover after parsing attributes in process `syz.3.1705'. [ 202.695569][T10752] netlink: 'syz.0.1708': attribute type 10 has an invalid length. [ 202.697712][T10754] bridge9: entered promiscuous mode [ 202.729714][T10754] bridge9: entered allmulticast mode [ 202.754111][T10757] netlink: 'syz.0.1708': attribute type 10 has an invalid length. [ 202.771507][T10757] netlink: 2 bytes leftover after parsing attributes in process `syz.0.1708'. [ 202.782983][T10752] bridge0: port 1(team0) entered disabled state [ 202.790410][T10752] team0: left allmulticast mode [ 202.795455][T10752] team0: left promiscuous mode [ 202.815922][T10752] bridge0: port 1(team0) entered disabled state [ 202.829846][T10752] batman_adv: batadv0: Adding interface: team0 [ 202.836581][T10752] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 202.862303][T10752] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 202.877970][T10757] team0: entered promiscuous mode [ 202.912516][T10757] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.941879][T10757] batman_adv: batadv0: Interface activated: team0 [ 202.978449][T10757] batman_adv: batadv0: Interface deactivated: team0 [ 203.010071][T10763] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1711'. [ 203.013942][T10757] batman_adv: batadv0: Removing interface: team0 [ 203.047683][T10757] bridge0: port 1(team0) entered blocking state [ 203.054220][T10757] bridge0: port 1(team0) entered disabled state [ 203.077410][T10757] team0: entered allmulticast mode [ 203.548355][T10777] bond0: (slave macvlan6): Error -98 calling set_mac_address [ 204.020406][T10806] x_tables: duplicate underflow at hook 1 [ 204.127533][T10807] netlink: 'syz.4.1730': attribute type 10 has an invalid length. [ 204.150399][T10807] bridge0: port 4(team0) entered disabled state [ 204.158015][T10807] team0: left allmulticast mode [ 204.162982][T10807] team_slave_0: left allmulticast mode [ 204.168955][T10807] team_slave_1: left allmulticast mode [ 204.178184][T10807] team0: left promiscuous mode [ 204.191714][T10810] netlink: 'syz.4.1730': attribute type 10 has an invalid length. [ 204.225934][T10807] team_slave_0: left promiscuous mode [ 204.246194][T10807] team_slave_1: left promiscuous mode [ 204.262607][T10807] bridge0: port 4(team0) entered disabled state [ 204.320413][T10810] team0: entered promiscuous mode [ 204.325628][T10810] team_slave_0: entered promiscuous mode [ 204.332727][T10810] team_slave_1: entered promiscuous mode [ 204.346158][T10810] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.368189][T10810] bridge0: port 4(team0) entered blocking state [ 204.380169][T10810] bridge0: port 4(team0) entered disabled state [ 204.387731][T10810] team0: entered allmulticast mode [ 204.393044][T10810] team_slave_0: entered allmulticast mode [ 204.399266][T10810] team_slave_1: entered allmulticast mode [ 204.408355][T10810] bridge0: port 4(team0) entered blocking state [ 204.414764][T10810] bridge0: port 4(team0) entered forwarding state [ 204.780246][T10833] netlink: 'syz.2.1742': attribute type 10 has an invalid length. [ 204.804408][T10833] team0: left allmulticast mode [ 204.821124][T10833] team_slave_0: left allmulticast mode [ 204.844108][T10833] team_slave_1: left allmulticast mode [ 204.864490][T10837] netlink: 'syz.2.1742': attribute type 10 has an invalid length. [ 204.872974][T10833] bridge3: left allmulticast mode [ 204.881710][T10833] bridge4: left allmulticast mode [ 204.908673][T10833] bridge5: left allmulticast mode [ 204.929826][T10833] team0: left promiscuous mode [ 204.934653][T10833] team_slave_0: left promiscuous mode [ 205.016254][T10833] team_slave_1: left promiscuous mode [ 205.021889][T10833] bridge3: left promiscuous mode [ 205.039087][T10833] bridge4: left promiscuous mode [ 205.044349][T10833] bridge5: left promiscuous mode [ 205.086721][T10833] bridge0: port 3(team0) entered disabled state [ 205.115763][T10833] batman_adv: batadv0: Adding interface: team0 [ 205.123835][T10833] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.154702][T10860] netlink: 'syz.4.1748': attribute type 1 has an invalid length. [ 205.163139][T10833] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 205.181639][T10837] team0: entered promiscuous mode [ 205.212565][T10837] team_slave_0: entered promiscuous mode [ 205.236302][T10837] team_slave_1: entered promiscuous mode [ 205.244564][T10837] bridge3: entered promiscuous mode [ 205.250476][T10837] bridge4: entered promiscuous mode [ 205.255942][T10837] bridge5: entered promiscuous mode [ 205.262647][T10837] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.270567][T10837] batman_adv: batadv0: Interface activated: team0 [ 205.282132][T10837] batman_adv: batadv0: Interface deactivated: team0 [ 205.288930][T10837] batman_adv: batadv0: Removing interface: team0 [ 205.306972][T10837] bridge0: port 3(team0) entered blocking state [ 205.313308][T10837] bridge0: port 3(team0) entered disabled state [ 205.336234][T10837] team0: entered allmulticast mode [ 205.341385][T10837] team_slave_0: entered allmulticast mode [ 205.361811][T10837] team_slave_1: entered allmulticast mode [ 205.368458][T10837] bridge3: entered allmulticast mode [ 205.373783][T10837] bridge4: entered allmulticast mode [ 205.379357][T10837] bridge5: entered allmulticast mode [ 205.408643][T10860] 8021q: adding VLAN 0 to HW filter on device bond3 [ 205.452608][T10862] vcan1: entered allmulticast mode [ 205.486689][T10862] 8021q: adding VLAN 0 to HW filter on device bond3 [ 205.499912][T10862] bond3: (slave vcan1): The slave device specified does not support setting the MAC address [ 205.538064][T10862] bond3: (slave vcan1): Error -95 calling set_mac_address [ 205.573788][T10864] tipc: Enabled bearer , priority 2 [ 205.637676][T10856] lo speed is unknown, defaulting to 1000 [ 206.511204][T10906] FAULT_INJECTION: forcing a failure. [ 206.511204][T10906] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.536717][T10906] CPU: 1 UID: 0 PID: 10906 Comm: syz.4.1765 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 206.536743][T10906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 206.536753][T10906] Call Trace: [ 206.536760][T10906] [ 206.536767][T10906] dump_stack_lvl+0x241/0x360 [ 206.536796][T10906] ? __pfx_dump_stack_lvl+0x10/0x10 [ 206.536818][T10906] ? __pfx__printk+0x10/0x10 [ 206.536840][T10906] ? __pfx_lock_release+0x10/0x10 [ 206.536874][T10906] should_fail_ex+0x3b0/0x4e0 [ 206.536895][T10906] _copy_from_iter+0x1e9/0x1c20 [ 206.536916][T10906] ? __virt_addr_valid+0x183/0x530 [ 206.536945][T10906] ? __alloc_skb+0x28f/0x440 [ 206.536962][T10906] ? __pfx__copy_from_iter+0x10/0x10 [ 206.536984][T10906] ? __virt_addr_valid+0x183/0x530 [ 206.537001][T10906] ? __virt_addr_valid+0x183/0x530 [ 206.537018][T10906] ? __virt_addr_valid+0x45f/0x530 [ 206.537038][T10906] ? __phys_addr_symbol+0x2f/0x70 [ 206.537057][T10906] ? __check_object_size+0x47a/0x730 [ 206.537083][T10906] netlink_sendmsg+0x73d/0xcb0 [ 206.537113][T10906] ? __pfx_netlink_sendmsg+0x10/0x10 [ 206.537135][T10906] ? aa_sock_msg_perm+0x91/0x160 [ 206.537158][T10906] ? __pfx_netlink_sendmsg+0x10/0x10 [ 206.537174][T10906] __sock_sendmsg+0x221/0x270 [ 206.537199][T10906] ____sys_sendmsg+0x52a/0x7e0 [ 206.537225][T10906] ? __pfx_____sys_sendmsg+0x10/0x10 [ 206.537241][T10906] ? __fget_files+0x2a/0x410 [ 206.537266][T10906] ? __fget_files+0x2a/0x410 [ 206.537295][T10906] __sys_sendmsg+0x269/0x350 [ 206.537319][T10906] ? __pfx___sys_sendmsg+0x10/0x10 [ 206.537349][T10906] ? do_sys_openat2+0x17a/0x1d0 [ 206.537395][T10906] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 206.537417][T10906] ? do_syscall_64+0x100/0x230 [ 206.537436][T10906] ? do_syscall_64+0xb6/0x230 [ 206.537453][T10906] do_syscall_64+0xf3/0x230 [ 206.537469][T10906] ? clear_bhb_loop+0x35/0x90 [ 206.537488][T10906] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 206.537504][T10906] RIP: 0033:0x7f2abb18cda9 [ 206.537519][T10906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.537533][T10906] RSP: 002b:00007f2abbf13038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 206.537550][T10906] RAX: ffffffffffffffda RBX: 00007f2abb3a5fa0 RCX: 00007f2abb18cda9 [ 206.537562][T10906] RDX: 0000000000040000 RSI: 0000000020000240 RDI: 0000000000000003 [ 206.537573][T10906] RBP: 00007f2abbf13090 R08: 0000000000000000 R09: 0000000000000000 [ 206.537583][T10906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.537592][T10906] R13: 0000000000000000 R14: 00007f2abb3a5fa0 R15: 00007fff62e93b68 [ 206.537618][T10906] [ 206.971205][T10911] __nla_validate_parse: 33 callbacks suppressed [ 206.971225][T10911] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1767'. [ 206.997282][T10911] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1767'. [ 207.019602][T10911] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1767'. [ 207.057348][T10908] netlink: 'syz.1.1766': attribute type 10 has an invalid length. [ 207.068265][T10908] bridge0: port 1(team0) entered disabled state [ 207.075010][T10908] team0: left allmulticast mode [ 207.128923][T10911] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1767'. [ 207.140692][T10908] team_slave_0: left allmulticast mode [ 207.195991][T10908] team_slave_1: left allmulticast mode [ 207.201518][T10908] bridge4: left allmulticast mode [ 207.216472][T10909] netlink: 'syz.1.1766': attribute type 10 has an invalid length. [ 207.225186][T10908] team0: left promiscuous mode [ 207.230138][T10909] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1766'. [ 207.329379][T10908] team_slave_0: left promiscuous mode [ 207.335392][T10908] team_slave_1: left promiscuous mode [ 207.351071][T10908] bridge3: left promiscuous mode [ 207.356789][T10908] bridge4: left promiscuous mode [ 207.362423][T10908] bridge5: left promiscuous mode [ 207.369329][T10908] bridge7: left promiscuous mode [ 207.378434][T10908] bridge0: port 1(team0) entered disabled state [ 207.422386][T10925] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1772'. [ 207.458223][T10908] batman_adv: batadv0: Adding interface: team0 [ 207.464436][T10908] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 207.504044][T10908] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 207.521547][T10909] team0: entered promiscuous mode [ 207.563487][T10909] team_slave_0: entered promiscuous mode [ 207.580291][T10909] team_slave_1: entered promiscuous mode [ 207.591260][T10909] bridge3: entered promiscuous mode [ 207.600793][T10909] bridge4: entered promiscuous mode [ 207.616260][T10909] bridge5: entered promiscuous mode [ 207.633883][T10909] bridge7: entered promiscuous mode [ 207.641871][T10909] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.649173][T10909] batman_adv: batadv0: Interface activated: team0 [ 207.655747][T10909] batman_adv: batadv0: Interface deactivated: team0 [ 207.662594][T10909] batman_adv: batadv0: Removing interface: team0 [ 207.680626][T10909] bridge0: port 1(team0) entered blocking state [ 207.693308][T10909] bridge0: port 1(team0) entered disabled state [ 207.706202][T10909] team0: entered allmulticast mode [ 207.711370][T10909] team_slave_0: entered allmulticast mode [ 207.722946][T10909] team_slave_1: entered allmulticast mode [ 207.728856][T10909] bridge4: entered allmulticast mode [ 207.735852][T10909] bridge0: port 1(team0) entered blocking state [ 207.742276][T10909] bridge0: port 1(team0) entered forwarding state [ 208.100578][T10948] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1778'. [ 208.228039][T10955] netlink: 76 bytes leftover after parsing attributes in process `syz.2.1780'. [ 208.341052][T10959] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1781'. [ 208.369660][T10959] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1781'. [ 208.574549][T10967] lo speed is unknown, defaulting to 1000 [ 209.227682][T10997] netlink: 'syz.2.1794': attribute type 10 has an invalid length. [ 209.263626][T10997] team0: left allmulticast mode [ 209.269821][T10997] team_slave_0: left allmulticast mode [ 209.284255][T11003] netlink: 'syz.2.1794': attribute type 10 has an invalid length. [ 209.299321][T10997] team_slave_1: left allmulticast mode [ 209.313221][T10997] bridge3: left allmulticast mode [ 209.324125][T10997] bridge4: left allmulticast mode [ 209.334349][T10997] bridge5: left allmulticast mode [ 209.347870][T10997] team0: left promiscuous mode [ 209.355060][T10997] team_slave_0: left promiscuous mode [ 209.387567][T10997] team_slave_1: left promiscuous mode [ 209.409988][T10997] bridge3: left promiscuous mode [ 209.415407][T10997] bridge4: left promiscuous mode [ 209.446611][T10997] bridge5: left promiscuous mode [ 209.453413][T10997] bridge0: port 3(team0) entered disabled state [ 209.499110][T10997] batman_adv: batadv0: Adding interface: team0 [ 209.513776][T10997] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.557240][T10997] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 209.572045][T11003] team0: entered promiscuous mode [ 209.589923][T11003] team_slave_0: entered promiscuous mode [ 209.611611][T11003] team_slave_1: entered promiscuous mode [ 209.627999][T11003] bridge3: entered promiscuous mode [ 209.643626][T11003] bridge4: entered promiscuous mode [ 209.659297][T11003] bridge5: entered promiscuous mode [ 209.718296][T11003] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.735031][T11003] batman_adv: batadv0: Interface activated: team0 [ 209.742472][T11003] batman_adv: batadv0: Interface deactivated: team0 [ 209.749371][T11003] batman_adv: batadv0: Removing interface: team0 [ 209.769998][T11003] bridge0: port 3(team0) entered blocking state [ 209.776878][T11003] bridge0: port 3(team0) entered disabled state [ 209.783297][T11003] team0: entered allmulticast mode [ 209.788689][T11003] team_slave_0: entered allmulticast mode [ 209.794424][T11003] team_slave_1: entered allmulticast mode [ 209.801462][T11003] bridge3: entered allmulticast mode [ 209.806855][T11003] bridge4: entered allmulticast mode [ 209.812242][T11003] bridge5: entered allmulticast mode [ 209.830313][T11017] bridge9: entered promiscuous mode [ 209.835674][T11017] bridge9: entered allmulticast mode [ 209.845017][T11017] team0: Port device bridge9 added [ 209.984138][T11027] netlink: 'syz.4.1803': attribute type 10 has an invalid length. [ 210.028891][T11027] syz_tun: entered promiscuous mode [ 210.034287][T11027] syz_tun: entered allmulticast mode [ 210.068627][T11027] team0: Port device syz_tun added [ 210.089575][T11025] bridge6: entered promiscuous mode [ 210.107155][T11025] bridge6: entered allmulticast mode [ 210.183042][T11032] lo speed is unknown, defaulting to 1000 [ 210.823008][T11063] netlink: 'syz.1.1816': attribute type 10 has an invalid length. [ 210.874263][T11067] netlink: 'syz.1.1816': attribute type 10 has an invalid length. [ 210.943607][T11063] bridge0: port 1(team0) entered disabled state [ 211.006068][T11063] team0: left allmulticast mode [ 211.028713][T11063] team_slave_0: left allmulticast mode [ 211.048750][T11063] team_slave_1: left allmulticast mode [ 211.069873][T11063] bridge4: left allmulticast mode [ 211.091132][T11063] team0: left promiscuous mode [ 211.113980][T11063] team_slave_0: left promiscuous mode [ 211.136752][T11063] team_slave_1: left promiscuous mode [ 211.166209][T11063] bridge3: left promiscuous mode [ 211.171444][T11063] bridge4: left promiscuous mode [ 211.192351][T11063] bridge5: left promiscuous mode [ 211.205306][T11063] bridge7: left promiscuous mode [ 211.211336][T11063] bridge0: port 1(team0) entered disabled state [ 211.220873][T11063] batman_adv: batadv0: Adding interface: team0 [ 211.227317][T11063] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.253437][T11063] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 211.264883][T11067] team0: entered promiscuous mode [ 211.271722][T11067] team_slave_0: entered promiscuous mode [ 211.281300][T11067] team_slave_1: entered promiscuous mode [ 211.287594][T11067] bridge3: entered promiscuous mode [ 211.309641][T11067] bridge4: entered promiscuous mode [ 211.315840][T11067] bridge5: entered promiscuous mode [ 211.322049][T11067] bridge7: entered promiscuous mode [ 211.330619][T11067] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.338059][T11067] batman_adv: batadv0: Interface activated: team0 [ 211.344696][T11067] batman_adv: batadv0: Interface deactivated: team0 [ 211.352100][T11067] batman_adv: batadv0: Removing interface: team0 [ 211.362283][T11067] bridge0: port 1(team0) entered blocking state [ 211.385460][T11067] bridge0: port 1(team0) entered disabled state [ 211.394739][T11067] team0: entered allmulticast mode [ 211.401051][T11067] team_slave_0: entered allmulticast mode [ 211.407512][T11067] team_slave_1: entered allmulticast mode [ 211.413429][T11067] bridge4: entered allmulticast mode [ 211.422093][T11067] bridge0: port 1(team0) entered blocking state [ 211.428503][T11067] bridge0: port 1(team0) entered forwarding state [ 211.436898][T11074] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 211.875430][T11103] lo speed is unknown, defaulting to 1000 [ 211.916559][T11101] netlink: 'syz.3.1825': attribute type 10 has an invalid length. [ 211.926737][T11101] bridge0: port 3(team0) entered disabled state [ 211.947311][T11101] team0: left allmulticast mode [ 211.952216][T11101] team_slave_0: left allmulticast mode [ 211.975260][T11101] team_slave_1: left allmulticast mode [ 211.988814][T11101] team0: left promiscuous mode [ 211.989108][T11108] netlink: 'syz.3.1825': attribute type 10 has an invalid length. [ 211.993605][T11101] team_slave_0: left promiscuous mode [ 211.996489][T11110] __nla_validate_parse: 24 callbacks suppressed [ 211.996504][T11110] netlink: 104 bytes leftover after parsing attributes in process `syz.2.1828'. [ 212.016679][T11113] FAULT_INJECTION: forcing a failure. [ 212.016679][T11113] name failslab, interval 1, probability 0, space 0, times 0 [ 212.035655][T11101] team_slave_1: left promiscuous mode [ 212.059974][T11101] bridge1: left promiscuous mode [ 212.063701][T11113] CPU: 1 UID: 0 PID: 11113 Comm: syz.0.1829 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 212.063729][T11113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 212.063739][T11113] Call Trace: [ 212.063745][T11113] [ 212.063752][T11113] dump_stack_lvl+0x241/0x360 [ 212.063782][T11113] ? __pfx_dump_stack_lvl+0x10/0x10 [ 212.063803][T11113] ? __pfx__printk+0x10/0x10 [ 212.063837][T11113] should_fail_ex+0x3b0/0x4e0 [ 212.063857][T11113] should_failslab+0xac/0x100 [ 212.063880][T11113] ? skb_clone+0x20c/0x390 [ 212.063896][T11113] kmem_cache_alloc_noprof+0x70/0x380 [ 212.063923][T11113] skb_clone+0x20c/0x390 [ 212.063944][T11113] __netlink_deliver_tap+0x3cc/0x7f0 [ 212.063972][T11113] ? netlink_deliver_tap+0x2e/0x1b0 [ 212.063988][T11113] netlink_deliver_tap+0x19d/0x1b0 [ 212.064007][T11113] netlink_unicast+0x7c4/0x990 [ 212.064031][T11113] ? __pfx_netlink_unicast+0x10/0x10 [ 212.064045][T11113] ? __virt_addr_valid+0x45f/0x530 [ 212.064064][T11113] ? __phys_addr_symbol+0x2f/0x70 [ 212.064083][T11113] ? __check_object_size+0x47a/0x730 [ 212.064108][T11113] netlink_sendmsg+0x8e4/0xcb0 [ 212.064137][T11113] ? __pfx_netlink_sendmsg+0x10/0x10 [ 212.064158][T11113] ? aa_sock_msg_perm+0x91/0x160 [ 212.064186][T11113] ? __pfx_netlink_sendmsg+0x10/0x10 [ 212.064202][T11113] __sock_sendmsg+0x221/0x270 [ 212.064226][T11113] ____sys_sendmsg+0x52a/0x7e0 [ 212.064251][T11113] ? __pfx_____sys_sendmsg+0x10/0x10 [ 212.064267][T11113] ? __fget_files+0x2a/0x410 [ 212.064291][T11113] ? __fget_files+0x2a/0x410 [ 212.064320][T11113] __sys_sendmsg+0x269/0x350 [ 212.064343][T11113] ? __pfx___sys_sendmsg+0x10/0x10 [ 212.064372][T11113] ? do_sys_openat2+0x17a/0x1d0 [ 212.064418][T11113] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 212.064439][T11113] ? do_syscall_64+0x100/0x230 [ 212.064458][T11113] ? do_syscall_64+0xb6/0x230 [ 212.064475][T11113] do_syscall_64+0xf3/0x230 [ 212.064490][T11113] ? clear_bhb_loop+0x35/0x90 [ 212.064510][T11113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 212.064526][T11113] RIP: 0033:0x7f0a7698cda9 [ 212.064541][T11113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.064554][T11113] RSP: 002b:00007f0a777a4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.064572][T11113] RAX: ffffffffffffffda RBX: 00007f0a76ba5fa0 RCX: 00007f0a7698cda9 [ 212.064584][T11113] RDX: 0000000000040000 RSI: 0000000020000240 RDI: 0000000000000003 [ 212.064594][T11113] RBP: 00007f0a777a4090 R08: 0000000000000000 R09: 0000000000000000 [ 212.064604][T11113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.064614][T11113] R13: 0000000000000000 R14: 00007f0a76ba5fa0 R15: 00007ffd350f61c8 [ 212.064639][T11113] [ 212.067185][T11108] netlink: 2 bytes leftover after parsing attributes in process `syz.3.1825'. [ 212.187437][T11101] bridge0: port 3(team0) entered disabled state [ 212.374079][T11108] team0: entered promiscuous mode [ 212.395127][T11108] team_slave_0: entered promiscuous mode [ 212.420752][T11108] team_slave_1: entered promiscuous mode [ 212.446605][T11108] bridge1: entered promiscuous mode [ 212.457842][T11108] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.465708][T11108] bridge0: port 3(team0) entered blocking state [ 212.472738][T11108] bridge0: port 3(team0) entered disabled state [ 212.479594][T11108] team0: entered allmulticast mode [ 212.484905][T11108] team_slave_0: entered allmulticast mode [ 212.492221][T11108] team_slave_1: entered allmulticast mode [ 212.844724][T11134] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1834'. [ 212.868691][T11134] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1834'. [ 212.887949][T11134] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1834'. [ 212.941573][T11142] tipc: Started in network mode [ 212.947626][T11142] tipc: Node identity , cluster identity 4711 [ 212.953941][T11142] tipc: Failed to set node id, please configure manually [ 212.971838][T11142] tipc: Enabling of bearer rejected, failed to enable media [ 212.983399][T11134] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1834'. [ 213.418512][T11157] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1843'. [ 213.439371][T11158] lo speed is unknown, defaulting to 1000 [ 213.561997][T11154] netlink: 76 bytes leftover after parsing attributes in process `syz.1.1841'. [ 214.071182][T11181] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1851'. [ 214.119867][T11181] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1851'. [ 214.132983][T11182] syzkaller1: entered promiscuous mode [ 214.168515][T11182] syzkaller1: entered allmulticast mode [ 214.247389][T11190] tun0: tun_chr_ioctl cmd 1074025677 [ 214.252849][T11190] tun0: linktype set to 823 [ 214.267787][T11190] netlink: 'syz.0.1854': attribute type 3 has an invalid length. [ 214.566944][T11199] netlink: 'syz.2.1858': attribute type 10 has an invalid length. [ 214.612695][T11199] team0: left allmulticast mode [ 214.627260][T11200] netlink: 'syz.2.1858': attribute type 10 has an invalid length. [ 214.658801][T11199] team_slave_0: left allmulticast mode [ 214.665715][T11199] team_slave_1: left allmulticast mode [ 214.671438][T11199] bridge3: left allmulticast mode [ 214.679111][T11199] bridge4: left allmulticast mode [ 214.684356][T11199] bridge5: left allmulticast mode [ 214.689783][T11199] team0: left promiscuous mode [ 214.702646][T11202] netlink: 'syz.0.1859': attribute type 10 has an invalid length. [ 214.711094][T11199] team_slave_0: left promiscuous mode [ 214.716861][T11199] team_slave_1: left promiscuous mode [ 214.725194][T11199] bridge3: left promiscuous mode [ 214.733706][T11199] bridge4: left promiscuous mode [ 214.743383][T11199] bridge5: left promiscuous mode [ 214.748839][T11199] bridge0: port 3(team0) entered disabled state [ 214.755775][T11207] netlink: 'syz.0.1859': attribute type 10 has an invalid length. [ 214.776041][T11199] batman_adv: batadv0: Adding interface: team0 [ 214.796263][T11199] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.823386][T11199] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 214.842650][T11200] team0: entered promiscuous mode [ 214.861634][T11200] team_slave_0: entered promiscuous mode [ 214.877479][T11200] team_slave_1: entered promiscuous mode [ 214.896138][T11200] bridge3: entered promiscuous mode [ 214.901692][T11200] bridge4: entered promiscuous mode [ 214.907718][T11200] bridge5: entered promiscuous mode [ 214.915260][T11200] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.924490][T11200] batman_adv: batadv0: Interface activated: team0 [ 214.954753][T11200] batman_adv: batadv0: Interface deactivated: team0 [ 214.970271][T11200] batman_adv: batadv0: Removing interface: team0 [ 214.981293][T11200] bridge0: port 3(team0) entered blocking state [ 214.988870][T11200] bridge0: port 3(team0) entered disabled state [ 214.997829][T11200] team0: entered allmulticast mode [ 215.003337][T11200] team_slave_0: entered allmulticast mode [ 215.010482][T11200] team_slave_1: entered allmulticast mode [ 215.018305][T11200] bridge3: entered allmulticast mode [ 215.024706][T11200] bridge4: entered allmulticast mode [ 215.031168][T11200] bridge5: entered allmulticast mode [ 215.044331][T11202] bridge0: port 1(team0) entered disabled state [ 215.055161][T11202] team0: left allmulticast mode [ 215.063059][T11216] netlink: 'syz.3.1872': attribute type 10 has an invalid length. [ 215.071188][T11202] team0: left promiscuous mode [ 215.076985][T11202] bridge0: port 1(team0) entered disabled state [ 215.086724][T11202] batman_adv: batadv0: Adding interface: team0 [ 215.093933][T11202] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 215.119947][T11218] netlink: 'syz.3.1872': attribute type 10 has an invalid length. [ 215.128062][T11202] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 215.141532][T11207] team0: entered promiscuous mode [ 215.149526][T11207] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.166563][T11207] batman_adv: batadv0: Interface activated: team0 [ 215.174488][T11207] batman_adv: batadv0: Interface deactivated: team0 [ 215.181744][T11207] batman_adv: batadv0: Removing interface: team0 [ 215.192709][T11207] bridge0: port 1(team0) entered blocking state [ 215.206210][T11207] bridge0: port 1(team0) entered disabled state [ 215.212879][T11207] team0: entered allmulticast mode [ 215.283853][T11216] bridge0: port 3(team0) entered disabled state [ 215.294850][T11216] team0: left allmulticast mode [ 215.300005][T11216] team_slave_0: left allmulticast mode [ 215.305567][T11216] team_slave_1: left allmulticast mode [ 215.311293][T11216] team0: left promiscuous mode [ 215.316290][T11216] team_slave_0: left promiscuous mode [ 215.322476][T11216] team_slave_1: left promiscuous mode [ 215.336338][T11216] bridge1: left promiscuous mode [ 215.341953][T11216] bridge0: port 3(team0) entered disabled state [ 215.367730][T11218] team0: entered promiscuous mode [ 215.372817][T11218] team_slave_0: entered promiscuous mode [ 215.378976][T11218] team_slave_1: entered promiscuous mode [ 215.384840][T11218] bridge1: entered promiscuous mode [ 215.407460][T11218] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.414555][T11218] bridge0: port 3(team0) entered blocking state [ 215.444113][T11218] bridge0: port 3(team0) entered disabled state [ 215.475543][T11218] team0: entered allmulticast mode [ 215.485493][T11218] team_slave_0: entered allmulticast mode [ 215.506058][T11218] team_slave_1: entered allmulticast mode [ 215.531098][T11226] erspan1: entered promiscuous mode [ 215.541323][T11226] erspan1: entered allmulticast mode [ 215.625375][T11230] netlink: 'syz.1.1864': attribute type 10 has an invalid length. [ 215.850553][T11235] bridge9: entered promiscuous mode [ 215.855807][T11235] bridge9: entered allmulticast mode [ 216.074184][T11247] FAULT_INJECTION: forcing a failure. [ 216.074184][T11247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.126122][T11247] CPU: 1 UID: 0 PID: 11247 Comm: syz.1.1873 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 216.126147][T11247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 216.126157][T11247] Call Trace: [ 216.126162][T11247] [ 216.126168][T11247] dump_stack_lvl+0x241/0x360 [ 216.126195][T11247] ? __pfx_dump_stack_lvl+0x10/0x10 [ 216.126217][T11247] ? __pfx__printk+0x10/0x10 [ 216.126238][T11247] ? __pfx_lock_release+0x10/0x10 [ 216.126264][T11247] should_fail_ex+0x3b0/0x4e0 [ 216.126284][T11247] _copy_from_iter+0x424/0x1c20 [ 216.126315][T11247] ? __pfx__copy_from_iter+0x10/0x10 [ 216.126335][T11247] ? __virt_addr_valid+0x183/0x530 [ 216.126352][T11247] ? __virt_addr_valid+0x183/0x530 [ 216.126368][T11247] ? __virt_addr_valid+0x45f/0x530 [ 216.126387][T11247] ? __phys_addr_symbol+0x2f/0x70 [ 216.126407][T11247] ? __check_object_size+0x47a/0x730 [ 216.126432][T11247] netlink_sendmsg+0x73d/0xcb0 [ 216.126461][T11247] ? __pfx_netlink_sendmsg+0x10/0x10 [ 216.126481][T11247] ? aa_sock_msg_perm+0x91/0x160 [ 216.126502][T11247] ? __pfx_netlink_sendmsg+0x10/0x10 [ 216.126518][T11247] __sock_sendmsg+0x221/0x270 [ 216.126541][T11247] ____sys_sendmsg+0x52a/0x7e0 [ 216.126567][T11247] ? __pfx_____sys_sendmsg+0x10/0x10 [ 216.126583][T11247] ? __fget_files+0x2a/0x410 [ 216.126607][T11247] ? __fget_files+0x2a/0x410 [ 216.126635][T11247] __sys_sendmsg+0x269/0x350 [ 216.126657][T11247] ? __pfx___sys_sendmsg+0x10/0x10 [ 216.126686][T11247] ? do_sys_openat2+0x17a/0x1d0 [ 216.126731][T11247] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 216.126751][T11247] ? do_syscall_64+0x100/0x230 [ 216.126770][T11247] ? do_syscall_64+0xb6/0x230 [ 216.126786][T11247] do_syscall_64+0xf3/0x230 [ 216.126801][T11247] ? clear_bhb_loop+0x35/0x90 [ 216.126820][T11247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 216.126836][T11247] RIP: 0033:0x7f254258cda9 [ 216.126851][T11247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.126864][T11247] RSP: 002b:00007f25433e1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 216.126883][T11247] RAX: ffffffffffffffda RBX: 00007f25427a5fa0 RCX: 00007f254258cda9 [ 216.126894][T11247] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 216.126903][T11247] RBP: 00007f25433e1090 R08: 0000000000000000 R09: 0000000000000000 [ 216.126912][T11247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.126921][T11247] R13: 0000000000000000 R14: 00007f25427a5fa0 R15: 00007fff934ec218 [ 216.126947][T11247] [ 216.774397][T11270] net_ratelimit: 5 callbacks suppressed [ 216.774415][T11270] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 217.016059][T11277] __nla_validate_parse: 25 callbacks suppressed [ 217.016079][T11277] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1885'. [ 217.099685][T11281] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1888'. [ 217.374620][T11297] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1895'. [ 217.406735][T11293] netlink: 'syz.1.1893': attribute type 10 has an invalid length. [ 217.425729][T11301] netlink: 'syz.0.1896': attribute type 1 has an invalid length. [ 217.434658][T11302] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1895'. [ 217.436256][T11297] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1895'. [ 217.466495][T11299] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1893'. [ 217.486797][T11293] bridge0: port 1(team0) entered disabled state [ 217.512163][T11293] team0: left allmulticast mode [ 217.527326][T11293] team_slave_0: left allmulticast mode [ 217.533611][T11302] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1895'. [ 217.548580][T11293] team_slave_1: left allmulticast mode [ 217.554079][T11293] bridge4: left allmulticast mode [ 217.577822][T11293] team0: left promiscuous mode [ 217.588392][T11293] team_slave_0: left promiscuous mode [ 217.605576][T11310] FAULT_INJECTION: forcing a failure. [ 217.605576][T11310] name failslab, interval 1, probability 0, space 0, times 0 [ 217.616298][T11293] team_slave_1: left promiscuous mode [ 217.619163][T11310] CPU: 0 UID: 0 PID: 11310 Comm: syz.4.1898 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 217.619184][T11310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 217.619193][T11310] Call Trace: [ 217.619199][T11310] [ 217.619205][T11310] dump_stack_lvl+0x241/0x360 [ 217.619235][T11310] ? __pfx_dump_stack_lvl+0x10/0x10 [ 217.619256][T11310] ? __pfx__printk+0x10/0x10 [ 217.619278][T11310] ? __kmalloc_noprof+0xb5/0x4c0 [ 217.619300][T11310] ? __pfx___might_resched+0x10/0x10 [ 217.619316][T11310] ? aa_get_newest_label+0xff/0x6f0 [ 217.619338][T11310] should_fail_ex+0x3b0/0x4e0 [ 217.619359][T11310] should_failslab+0xac/0x100 [ 217.619382][T11310] __kmalloc_noprof+0xdd/0x4c0 [ 217.619402][T11310] ? genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 217.619423][T11310] ? apparmor_capable+0x13b/0x1b0 [ 217.619446][T11310] genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 217.619474][T11310] genl_rcv_msg+0x802/0xec0 [ 217.619502][T11310] ? __pfx_genl_rcv_msg+0x10/0x10 [ 217.619548][T11310] ? __pfx_lock_acquire+0x10/0x10 [ 217.619566][T11310] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 217.619591][T11310] ? __pfx_nl80211_remain_on_channel+0x10/0x10 [ 217.619612][T11310] ? __pfx_nl80211_post_doit+0x10/0x10 [ 217.619633][T11310] ? __pfx___might_resched+0x10/0x10 [ 217.619659][T11310] netlink_rcv_skb+0x1e3/0x430 [ 217.619677][T11310] ? __pfx_genl_rcv_msg+0x10/0x10 [ 217.619699][T11310] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 217.619729][T11310] ? __netlink_deliver_tap+0x7aa/0x7f0 [ 217.619760][T11310] genl_rcv+0x28/0x40 [ 217.619778][T11310] netlink_unicast+0x7f6/0x990 [ 217.619803][T11310] ? __pfx_netlink_unicast+0x10/0x10 [ 217.619816][T11310] ? __virt_addr_valid+0x45f/0x530 [ 217.619836][T11310] ? __phys_addr_symbol+0x2f/0x70 [ 217.619855][T11310] ? __check_object_size+0x47a/0x730 [ 217.619880][T11310] netlink_sendmsg+0x8e4/0xcb0 [ 217.619909][T11310] ? __pfx_netlink_sendmsg+0x10/0x10 [ 217.619937][T11310] ? aa_sock_msg_perm+0x91/0x160 [ 217.619959][T11310] ? __pfx_netlink_sendmsg+0x10/0x10 [ 217.619975][T11310] __sock_sendmsg+0x221/0x270 [ 217.620000][T11310] ____sys_sendmsg+0x52a/0x7e0 [ 217.620026][T11310] ? __pfx_____sys_sendmsg+0x10/0x10 [ 217.620041][T11310] ? __fget_files+0x2a/0x410 [ 217.620066][T11310] ? __fget_files+0x2a/0x410 [ 217.620095][T11310] __sys_sendmsg+0x269/0x350 [ 217.620118][T11310] ? __pfx___sys_sendmsg+0x10/0x10 [ 217.620148][T11310] ? do_sys_openat2+0x17a/0x1d0 [ 217.620194][T11310] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 217.620215][T11310] ? do_syscall_64+0x100/0x230 [ 217.620233][T11310] ? do_syscall_64+0xb6/0x230 [ 217.620250][T11310] do_syscall_64+0xf3/0x230 [ 217.620265][T11310] ? clear_bhb_loop+0x35/0x90 [ 217.620285][T11310] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.620302][T11310] RIP: 0033:0x7f2abb18cda9 [ 217.620316][T11310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.620329][T11310] RSP: 002b:00007f2abbf13038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 217.620347][T11310] RAX: ffffffffffffffda RBX: 00007f2abb3a5fa0 RCX: 00007f2abb18cda9 [ 217.620359][T11310] RDX: 0000000000040000 RSI: 0000000020000240 RDI: 0000000000000003 [ 217.620369][T11310] RBP: 00007f2abbf13090 R08: 0000000000000000 R09: 0000000000000000 [ 217.620379][T11310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.620388][T11310] R13: 0000000000000000 R14: 00007f2abb3a5fa0 R15: 00007fff62e93b68 [ 217.620415][T11310] [ 217.973393][T11293] bridge3: left promiscuous mode [ 217.979360][T11293] bridge4: left promiscuous mode [ 217.984654][T11293] bridge5: left promiscuous mode [ 217.989932][T11293] bridge7: left promiscuous mode [ 217.995716][T11293] bridge0: port 1(team0) entered disabled state [ 218.005068][T11293] batman_adv: batadv0: Adding interface: team0 [ 218.011377][T11293] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.038159][T11293] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 218.066412][T11301] bond5: entered promiscuous mode [ 218.071484][T11301] bond5: entered allmulticast mode [ 218.081821][T11299] team0: entered promiscuous mode [ 218.111887][T11317] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1899'. [ 218.120005][T11299] team_slave_0: entered promiscuous mode [ 218.140650][T11299] team_slave_1: entered promiscuous mode [ 218.146051][T11317] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1899'. [ 218.155269][T11317] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1899'. [ 218.168837][T11299] bridge3: entered promiscuous mode [ 218.188800][T11299] bridge4: entered promiscuous mode [ 218.198970][T11299] bridge5: entered promiscuous mode [ 218.204330][T11299] bridge7: entered promiscuous mode [ 218.282587][T11299] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.301678][T11299] batman_adv: batadv0: Interface activated: team0 [ 218.334338][T11299] batman_adv: batadv0: Interface deactivated: team0 [ 218.348700][T11299] batman_adv: batadv0: Removing interface: team0 [ 218.357978][T11299] bridge0: port 1(team0) entered blocking state [ 218.364771][T11299] bridge0: port 1(team0) entered disabled state [ 218.371525][T11299] team0: entered allmulticast mode [ 218.378788][T11299] team_slave_0: entered allmulticast mode [ 218.384775][T11299] team_slave_1: entered allmulticast mode [ 218.390873][T11299] bridge4: entered allmulticast mode [ 218.398320][T11299] bridge0: port 1(team0) entered blocking state [ 218.404685][T11299] bridge0: port 1(team0) entered forwarding state [ 218.416751][T11305] batadv4: entered promiscuous mode [ 218.428183][T11305] 8021q: adding VLAN 0 to HW filter on device batadv4 [ 218.450641][T11305] bond5: (slave batadv4): making interface the new active one [ 218.466187][T11305] batadv4: entered allmulticast mode [ 218.482715][T11305] bond5: (slave batadv4): Enslaving as an active interface with an up link [ 218.500622][T11322] bond0: entered promiscuous mode [ 218.507204][T11322] bond_slave_0: entered promiscuous mode [ 218.513076][T11322] bond_slave_1: entered promiscuous mode [ 218.529616][T11322] batadv_slave_1: entered promiscuous mode [ 218.543112][T11322] hsr1: Slave B (batadv_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.557844][T11330] A link change request failed with some changes committed already. Interface vlan1 may have been left with an inconsistent configuration, please check. [ 218.646461][T11328] syzkaller1: entered promiscuous mode [ 218.658676][T11328] syzkaller1: entered allmulticast mode [ 218.719091][T11333] syz.2.1904[11333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.719189][T11333] syz.2.1904[11333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.756932][T11333] syz.2.1904[11333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.859171][T11337] bridge0: port 4(team0) entered disabled state [ 218.897536][T11337] team0: left allmulticast mode [ 218.909164][T11337] team_slave_0: left allmulticast mode [ 218.924959][T11337] team_slave_1: left allmulticast mode [ 218.935072][T11337] syz_tun: left allmulticast mode [ 218.956408][T11337] team0: left promiscuous mode [ 218.961220][T11337] team_slave_0: left promiscuous mode [ 218.976591][T11337] team_slave_1: left promiscuous mode [ 218.985307][T11337] syz_tun: left promiscuous mode [ 218.998806][T11337] bridge0: port 4(team0) entered disabled state [ 219.029007][T11341] team0: entered promiscuous mode [ 219.034077][T11341] team_slave_0: entered promiscuous mode [ 219.073089][T11341] team_slave_1: entered promiscuous mode [ 219.090004][T11341] syz_tun: entered promiscuous mode [ 219.111381][T11341] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.121247][T11341] bridge0: port 4(team0) entered blocking state [ 219.128123][T11341] bridge0: port 4(team0) entered disabled state [ 219.134929][T11341] team0: entered allmulticast mode [ 219.141281][T11341] team_slave_0: entered allmulticast mode [ 219.148324][T11341] team_slave_1: entered allmulticast mode [ 219.154217][T11341] syz_tun: entered allmulticast mode [ 219.172026][T11341] bridge0: port 4(team0) entered blocking state [ 219.178447][T11341] bridge0: port 4(team0) entered forwarding state [ 219.188324][T11357] bridge0: port 3(team0) entered disabled state [ 219.195186][T11357] team0: left allmulticast mode [ 219.200327][T11357] team_slave_0: left allmulticast mode [ 219.206546][T11357] team_slave_1: left allmulticast mode [ 219.218457][T11357] team0: left promiscuous mode [ 219.227103][T11357] team_slave_0: left promiscuous mode [ 219.235558][T11357] team_slave_1: left promiscuous mode [ 219.241702][T11357] bridge1: left promiscuous mode [ 219.247722][T11357] bridge0: port 3(team0) entered disabled state [ 219.256894][T11361] tipc: Started in network mode [ 219.261802][T11361] tipc: Node identity , cluster identity 4711 [ 219.268547][T11361] tipc: Failed to set node id, please configure manually [ 219.275705][T11361] tipc: Enabling of bearer rejected, failed to enable media [ 219.295704][T11359] team0: entered promiscuous mode [ 219.306242][T11359] team_slave_0: entered promiscuous mode [ 219.316088][T11359] team_slave_1: entered promiscuous mode [ 219.322084][T11359] bridge1: entered promiscuous mode [ 219.330143][T11359] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.349376][T11359] bridge0: port 3(team0) entered blocking state [ 219.357023][T11359] bridge0: port 3(team0) entered disabled state [ 219.373008][T11359] team0: entered allmulticast mode [ 219.379096][T11359] team_slave_0: entered allmulticast mode [ 219.384971][T11359] team_slave_1: entered allmulticast mode [ 219.773907][T11373] validate_nla: 5 callbacks suppressed [ 219.773950][T11373] netlink: 'syz.0.1920': attribute type 10 has an invalid length. [ 219.854170][T11373] bridge0: port 1(team0) entered disabled state [ 219.886605][T11377] netlink: 'syz.0.1920': attribute type 10 has an invalid length. [ 219.913223][T11373] team0: left allmulticast mode [ 219.930345][T11373] team0: left promiscuous mode [ 219.942358][T11373] bridge0: port 1(team0) entered disabled state [ 220.050358][T11373] batman_adv: batadv0: Adding interface: team0 [ 220.057298][T11373] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 220.115056][T11373] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 220.141771][T11377] team0: entered promiscuous mode [ 220.156105][T11377] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.168460][T11377] batman_adv: batadv0: Interface activated: team0 [ 220.175225][T11377] batman_adv: batadv0: Interface deactivated: team0 [ 220.195516][T11377] batman_adv: batadv0: Removing interface: team0 [ 220.216790][T11377] bridge0: port 1(team0) entered blocking state [ 220.228851][T11377] bridge0: port 1(team0) entered disabled state [ 220.251254][T11377] team0: entered allmulticast mode [ 220.319290][T11381] lo speed is unknown, defaulting to 1000 [ 220.680875][T11404] Bluetooth: hci0: Opcode 0x0401 failed: -22 [ 221.047153][T11416] netlink: 'syz.4.1932': attribute type 1 has an invalid length. [ 221.102215][T11416] bond4: entered promiscuous mode [ 221.116256][T11416] bond4: entered allmulticast mode [ 221.146079][T11416] batadv0: entered promiscuous mode [ 221.165469][T11416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.208930][T11416] bond4: (slave batadv0): making interface the new active one [ 221.222120][T11416] batadv0: entered allmulticast mode [ 221.237220][T11416] bond4: (slave batadv0): Enslaving as an active interface with an up link [ 221.353810][T11424] netlink: 'syz.1.1937': attribute type 10 has an invalid length. [ 221.364771][T11424] bridge0: port 1(team0) entered disabled state [ 221.372712][T11424] team0: left allmulticast mode [ 221.378211][T11424] team_slave_0: left allmulticast mode [ 221.383937][T11424] team_slave_1: left allmulticast mode [ 221.390769][T11424] bridge4: left allmulticast mode [ 221.396411][T11424] team0: left promiscuous mode [ 221.402526][T11424] team_slave_0: left promiscuous mode [ 221.458753][T11424] team_slave_1: left promiscuous mode [ 221.461547][T11427] netlink: 'syz.1.1937': attribute type 10 has an invalid length. [ 221.475492][T11424] bridge3: left promiscuous mode [ 221.496136][T11424] bridge4: left promiscuous mode [ 221.507927][T11424] bridge5: left promiscuous mode [ 221.514278][T11424] bridge7: left promiscuous mode [ 221.536537][T11424] bridge0: port 1(team0) entered disabled state [ 221.589262][T11424] batman_adv: batadv0: Adding interface: team0 [ 221.603689][T11424] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 221.629443][T11424] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 221.647185][T11427] team0: entered promiscuous mode [ 221.652250][T11427] team_slave_0: entered promiscuous mode [ 221.679087][T11439] netlink: 'syz.0.1942': attribute type 10 has an invalid length. [ 221.679196][T11427] team_slave_1: entered promiscuous mode [ 221.727488][T11427] bridge3: entered promiscuous mode [ 221.739666][T11427] bridge4: entered promiscuous mode [ 221.747316][T11441] netlink: 'syz.0.1942': attribute type 10 has an invalid length. [ 221.751225][T11427] bridge5: entered promiscuous mode [ 221.761768][T11427] bridge7: entered promiscuous mode [ 221.769200][T11427] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.776728][T11427] batman_adv: batadv0: Interface activated: team0 [ 221.783369][T11427] batman_adv: batadv0: Interface deactivated: team0 [ 221.791202][T11427] batman_adv: batadv0: Removing interface: team0 [ 221.800822][T11427] bridge0: port 1(team0) entered blocking state [ 221.807805][T11427] bridge0: port 1(team0) entered disabled state [ 221.833314][T11427] team0: entered allmulticast mode [ 221.841635][T11427] team_slave_0: entered allmulticast mode [ 221.876462][T11427] team_slave_1: entered allmulticast mode [ 221.892469][T11427] bridge4: entered allmulticast mode [ 221.904488][T11427] bridge0: port 1(team0) entered blocking state [ 221.910869][T11427] bridge0: port 1(team0) entered forwarding state [ 221.977035][T11439] bridge0: port 1(team0) entered disabled state [ 221.988519][T11439] team0: left allmulticast mode [ 221.994111][T11439] team0: left promiscuous mode [ 221.999294][T11439] bridge0: port 1(team0) entered disabled state [ 222.010900][T11439] batman_adv: batadv0: Adding interface: team0 [ 222.017404][T11439] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 222.043091][T11439] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 222.067009][T11441] team0: entered promiscuous mode [ 222.086967][T11441] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.093911][T11441] batman_adv: batadv0: Interface activated: team0 [ 222.100821][T11441] batman_adv: batadv0: Interface deactivated: team0 [ 222.108191][T11441] batman_adv: batadv0: Removing interface: team0 [ 222.117467][T11441] bridge0: port 1(team0) entered blocking state [ 222.124130][T11441] bridge0: port 1(team0) entered disabled state [ 222.130661][T11441] team0: entered allmulticast mode [ 222.402894][T11467] __nla_validate_parse: 15 callbacks suppressed [ 222.402913][T11467] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1948'. [ 222.650248][T11471] lo speed is unknown, defaulting to 1000 [ 222.663975][T11473] A link change request failed with some changes committed already. Interface vlan1 may have been left with an inconsistent configuration, please check. [ 222.687449][ T5842] Bluetooth: hci0: command tx timeout [ 222.883800][T11484] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1958'. [ 222.994250][T11493] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1960'. [ 223.221449][T11498] netlink: 'syz.3.1962': attribute type 10 has an invalid length. [ 223.238851][T11498] bridge0: port 3(team0) entered disabled state [ 223.255348][T11498] team0: left allmulticast mode [ 223.260651][T11498] team_slave_0: left allmulticast mode [ 223.267470][T11498] team_slave_1: left allmulticast mode [ 223.273290][T11502] netlink: 'syz.3.1962': attribute type 10 has an invalid length. [ 223.273720][T11498] team0: left promiscuous mode [ 223.286217][T11498] team_slave_0: left promiscuous mode [ 223.291879][T11498] team_slave_1: left promiscuous mode [ 223.297624][T11498] bridge1: left promiscuous mode [ 223.303134][T11498] bridge0: port 3(team0) entered disabled state [ 223.311300][T11502] netlink: 2 bytes leftover after parsing attributes in process `syz.3.1962'. [ 223.320674][T11500] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 223.352183][T11500] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 223.504472][T11502] team0: entered promiscuous mode [ 223.509920][T11502] team_slave_0: entered promiscuous mode [ 223.515795][T11502] team_slave_1: entered promiscuous mode [ 223.523282][T11502] bridge1: entered promiscuous mode [ 223.530034][T11502] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.538320][T11502] bridge0: port 3(team0) entered blocking state [ 223.545285][T11502] bridge0: port 3(team0) entered disabled state [ 223.555813][T11502] team0: entered allmulticast mode [ 223.563982][T11502] team_slave_0: entered allmulticast mode [ 223.576191][T11502] team_slave_1: entered allmulticast mode [ 223.893206][T11521] xt_limit: Overflow, try lower: 4022/2147483648 [ 223.974031][T11524] A link change request failed with some changes committed already. Interface vlan1 may have been left with an inconsistent configuration, please check. [ 224.289449][T11540] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1975'. [ 224.313832][T11540] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1975'. [ 224.329911][T11534] lo speed is unknown, defaulting to 1000 [ 224.337938][T11540] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1975'. [ 224.443066][T11549] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1976'. [ 224.452747][T11540] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1975'. [ 224.464241][T11549] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1976'. [ 224.670976][T11553] bridge7: entered promiscuous mode [ 224.696197][T11553] bridge7: entered allmulticast mode [ 224.709490][T11553] team0: Port device bridge7 added [ 224.866596][T11555] netlink: 'syz.2.1979': attribute type 10 has an invalid length. [ 224.907587][T11555] team0: left allmulticast mode [ 224.912488][T11555] team_slave_0: left allmulticast mode [ 224.928700][T11555] team_slave_1: left allmulticast mode [ 224.934435][T11555] bridge3: left allmulticast mode [ 224.934717][T11556] netlink: 'syz.2.1979': attribute type 10 has an invalid length. [ 224.942334][T11555] bridge4: left allmulticast mode [ 224.952783][T11555] bridge5: left allmulticast mode [ 224.966331][T11555] team0: left promiscuous mode [ 224.977881][T11555] team_slave_0: left promiscuous mode [ 224.994062][T11555] team_slave_1: left promiscuous mode [ 225.017858][T11555] bridge3: left promiscuous mode [ 225.019049][T11559] netlink: 'syz.3.1981': attribute type 10 has an invalid length. [ 225.033222][T11555] bridge4: left promiscuous mode [ 225.058995][T11555] bridge5: left promiscuous mode [ 225.070277][T11561] netlink: 'syz.3.1981': attribute type 10 has an invalid length. [ 225.076720][T11555] bridge0: port 3(team0) entered disabled state [ 225.103924][T11555] batman_adv: batadv0: Adding interface: team0 [ 225.138820][T11555] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.183509][T11555] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 225.201961][T11556] team0: entered promiscuous mode [ 225.207518][T11556] team_slave_0: entered promiscuous mode [ 225.221136][T11556] team_slave_1: entered promiscuous mode [ 225.233071][T11556] bridge3: entered promiscuous mode [ 225.246149][T11556] bridge4: entered promiscuous mode [ 225.261979][T11556] bridge5: entered promiscuous mode [ 225.272373][T11556] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.279504][T11556] batman_adv: batadv0: Interface activated: team0 [ 225.297176][T11556] batman_adv: batadv0: Interface deactivated: team0 [ 225.303945][T11556] batman_adv: batadv0: Removing interface: team0 [ 225.322156][T11556] bridge0: port 3(team0) entered blocking state [ 225.329853][T11556] bridge0: port 3(team0) entered disabled state [ 225.337603][T11556] team0: entered allmulticast mode [ 225.342893][T11556] team_slave_0: entered allmulticast mode [ 225.349681][T11556] team_slave_1: entered allmulticast mode [ 225.355581][T11556] bridge3: entered allmulticast mode [ 225.361736][T11556] bridge4: entered allmulticast mode [ 225.367852][T11556] bridge5: entered allmulticast mode [ 225.377275][T11559] bridge0: port 3(team0) entered disabled state [ 225.384088][T11559] team0: left allmulticast mode [ 225.389407][T11559] team_slave_0: left allmulticast mode [ 225.394892][T11559] team_slave_1: left allmulticast mode [ 225.400678][T11559] team0: left promiscuous mode [ 225.405460][T11559] team_slave_0: left promiscuous mode [ 225.411362][T11559] team_slave_1: left promiscuous mode [ 225.417197][T11559] bridge1: left promiscuous mode [ 225.423120][T11559] bridge0: port 3(team0) entered disabled state [ 225.434018][T11561] team0: entered promiscuous mode [ 225.445321][T11561] team_slave_0: entered promiscuous mode [ 225.456452][T11561] team_slave_1: entered promiscuous mode [ 225.462656][T11561] bridge1: entered promiscuous mode [ 225.470671][T11561] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.477913][T11561] bridge0: port 3(team0) entered blocking state [ 225.484674][T11561] bridge0: port 3(team0) entered disabled state [ 225.491812][T11561] team0: entered allmulticast mode [ 225.497708][T11561] team_slave_0: entered allmulticast mode [ 225.503455][T11561] team_slave_1: entered allmulticast mode [ 225.781613][T11577] A link change request failed with some changes committed already. Interface vlan1 may have been left with an inconsistent configuration, please check. [ 226.354441][T11597] bridge10: entered promiscuous mode [ 226.386017][T11597] bridge10: entered allmulticast mode [ 226.594640][T11603] FAULT_INJECTION: forcing a failure. [ 226.594640][T11603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.636453][T11603] CPU: 1 UID: 0 PID: 11603 Comm: syz.2.1994 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 226.636478][T11603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 226.636488][T11603] Call Trace: [ 226.636494][T11603] [ 226.636501][T11603] dump_stack_lvl+0x241/0x360 [ 226.636530][T11603] ? __pfx_dump_stack_lvl+0x10/0x10 [ 226.636552][T11603] ? __pfx__printk+0x10/0x10 [ 226.636573][T11603] ? __pfx_lock_release+0x10/0x10 [ 226.636600][T11603] should_fail_ex+0x3b0/0x4e0 [ 226.636620][T11603] _copy_from_iter+0x424/0x1c20 [ 226.636654][T11603] ? __pfx__copy_from_iter+0x10/0x10 [ 226.636676][T11603] ? __virt_addr_valid+0x183/0x530 [ 226.636695][T11603] ? __virt_addr_valid+0x183/0x530 [ 226.636713][T11603] ? __virt_addr_valid+0x45f/0x530 [ 226.636732][T11603] ? __phys_addr_symbol+0x2f/0x70 [ 226.636750][T11603] ? __check_object_size+0x47a/0x730 [ 226.636776][T11603] netlink_sendmsg+0x73d/0xcb0 [ 226.636805][T11603] ? __pfx_netlink_sendmsg+0x10/0x10 [ 226.636827][T11603] ? aa_sock_msg_perm+0x91/0x160 [ 226.636850][T11603] ? __pfx_netlink_sendmsg+0x10/0x10 [ 226.636867][T11603] __sock_sendmsg+0x221/0x270 [ 226.636891][T11603] ____sys_sendmsg+0x52a/0x7e0 [ 226.636915][T11603] ? __pfx_____sys_sendmsg+0x10/0x10 [ 226.636932][T11603] ? __fget_files+0x2a/0x410 [ 226.636956][T11603] ? __fget_files+0x2a/0x410 [ 226.636984][T11603] __sys_sendmsg+0x269/0x350 [ 226.637006][T11603] ? __pfx___sys_sendmsg+0x10/0x10 [ 226.637035][T11603] ? do_sys_openat2+0x17a/0x1d0 [ 226.637078][T11603] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 226.637099][T11603] ? do_syscall_64+0x100/0x230 [ 226.637118][T11603] ? do_syscall_64+0xb6/0x230 [ 226.637133][T11603] do_syscall_64+0xf3/0x230 [ 226.637148][T11603] ? clear_bhb_loop+0x35/0x90 [ 226.637173][T11603] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 226.637189][T11603] RIP: 0033:0x7feefe38cda9 [ 226.637204][T11603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.637216][T11603] RSP: 002b:00007feeff1db038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 226.637233][T11603] RAX: ffffffffffffffda RBX: 00007feefe5a5fa0 RCX: 00007feefe38cda9 [ 226.637243][T11603] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 226.637253][T11603] RBP: 00007feeff1db090 R08: 0000000000000000 R09: 0000000000000000 [ 226.637263][T11603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.637272][T11603] R13: 0000000000000000 R14: 00007feefe5a5fa0 R15: 00007fff2d357cf8 [ 226.637297][T11603] [ 227.201146][ T5842] block nbd4: Receive control failed (result -107) [ 227.255366][T11623] nbd4: detected capacity change from 0 to 256 [ 227.267158][T11635] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 227.285003][ T5855] block nbd4: Dead connection, failed to find a fallback [ 227.434664][T11638] lo speed is unknown, defaulting to 1000 [ 227.916207][T11663] __nla_validate_parse: 11 callbacks suppressed [ 227.916227][T11663] netlink: 104 bytes leftover after parsing attributes in process `syz.4.2009'. [ 231.636040][ T5211] udevd[5211]: worker [7314] /devices/virtual/block/nbd2 is taking a long time [ 231.645081][ T5211] udevd[5211]: worker [7315] /devices/virtual/block/nbd0 is taking a long time [ 255.880187][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.886666][ T1295] ieee802154 phy1 wpan1: encryption failed: -22 [ 258.686086][ T5211] udevd[5211]: worker [5849] /devices/virtual/block/nbd3 is taking a long time [ 270.879091][T11681] syzkaller0: entered promiscuous mode [ 270.893056][T11681] syzkaller0: entered allmulticast mode [ 270.900200][T11683] netlink: 'syz.1.2014': attribute type 4 has an invalid length. [ 270.911267][T11683] netlink: 17 bytes leftover after parsing attributes in process `syz.1.2014'. [ 270.927016][T11686] netlink: 44 bytes leftover after parsing attributes in process `syz.0.2013'. [ 270.981242][T11686] lo: entered allmulticast mode [ 271.118144][T11690] netlink: 'syz.2.2018': attribute type 10 has an invalid length. [ 271.147550][T11690] team0: left allmulticast mode [ 271.152464][T11690] team_slave_0: left allmulticast mode [ 271.159760][T11690] team_slave_1: left allmulticast mode [ 271.176568][T11693] netlink: 'syz.4.2020': attribute type 10 has an invalid length. [ 271.184529][T11690] bridge3: left allmulticast mode [ 271.195128][T11690] bridge4: left allmulticast mode [ 271.201113][T11696] netlink: 'syz.2.2018': attribute type 10 has an invalid length. [ 271.209826][T11690] bridge5: left allmulticast mode [ 271.214979][T11696] netlink: 2 bytes leftover after parsing attributes in process `syz.2.2018'. [ 271.228066][T11700] netlink: 'syz.4.2020': attribute type 10 has an invalid length. [ 271.254126][T11702] netlink: 'syz.1.2019': attribute type 10 has an invalid length. [ 271.266410][T11700] netlink: 2 bytes leftover after parsing attributes in process `syz.4.2020'. [ 271.281665][T11690] team0: left promiscuous mode [ 271.296340][T11690] team_slave_0: left promiscuous mode [ 271.309363][T11690] team_slave_1: left promiscuous mode [ 271.315654][T11695] netlink: 'syz.1.2019': attribute type 10 has an invalid length. [ 271.325050][T11695] netlink: 2 bytes leftover after parsing attributes in process `syz.1.2019'. [ 271.334975][T11690] bridge3: left promiscuous mode [ 271.340607][T11690] bridge4: left promiscuous mode [ 271.346700][T11690] bridge5: left promiscuous mode [ 271.352466][T11690] bridge0: port 3(team0) entered disabled state [ 271.371341][T11690] batman_adv: batadv0: Adding interface: team0 [ 271.394075][T11690] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.429312][T11690] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 271.464168][T11693] bridge0: port 4(team0) entered disabled state [ 271.471571][T11693] team0: left allmulticast mode [ 271.476726][T11693] team_slave_0: left allmulticast mode [ 271.490085][T11693] team_slave_1: left allmulticast mode [ 271.495686][T11693] syz_tun: left allmulticast mode [ 271.501017][T11693] team0: left promiscuous mode [ 271.505966][T11693] team_slave_0: left promiscuous mode [ 271.511662][T11693] team_slave_1: left promiscuous mode [ 271.517510][T11693] syz_tun: left promiscuous mode [ 271.523738][T11693] bridge0: port 4(team0) entered disabled state [ 271.537438][T11702] bridge0: port 1(team0) entered disabled state [ 271.554754][T11702] team0: left allmulticast mode [ 271.565501][T11702] team_slave_0: left allmulticast mode [ 271.588170][T11702] team_slave_1: left allmulticast mode [ 271.598288][T11702] bridge4: left allmulticast mode [ 271.613331][T11702] team0: left promiscuous mode [ 271.627205][T11702] team_slave_0: left promiscuous mode [ 271.643745][T11702] team_slave_1: left promiscuous mode [ 271.658537][T11702] bridge3: left promiscuous mode [ 271.671542][T11702] bridge4: left promiscuous mode [ 271.679418][T11714] netlink: 'syz.3.2023': attribute type 10 has an invalid length. [ 271.684683][T11702] bridge5: left promiscuous mode [ 271.697431][T11702] bridge7: left promiscuous mode [ 271.703261][T11702] bridge0: port 1(team0) entered disabled state [ 271.712832][T11702] batman_adv: batadv0: Adding interface: team0 [ 271.719778][T11702] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.745780][T11716] netlink: 'syz.3.2023': attribute type 10 has an invalid length. [ 271.753904][T11716] netlink: 2 bytes leftover after parsing attributes in process `syz.3.2023'. [ 271.764489][T11702] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 271.775532][T11700] team0: entered promiscuous mode [ 271.780860][T11700] team_slave_0: entered promiscuous mode [ 271.787688][T11700] team_slave_1: entered promiscuous mode [ 271.793853][T11700] syz_tun: entered promiscuous mode [ 271.807027][T11700] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.814196][T11700] bridge0: port 4(team0) entered blocking state [ 271.823005][T11700] bridge0: port 4(team0) entered disabled state [ 271.829967][T11700] team0: entered allmulticast mode [ 271.835262][T11700] team_slave_0: entered allmulticast mode [ 271.841642][T11700] team_slave_1: entered allmulticast mode [ 271.847564][T11700] syz_tun: entered allmulticast mode [ 271.857227][T11700] bridge0: port 4(team0) entered blocking state [ 271.863624][T11700] bridge0: port 4(team0) entered forwarding state [ 271.871441][T11696] team0: entered promiscuous mode [ 271.877807][T11696] team_slave_0: entered promiscuous mode [ 271.883845][T11696] team_slave_1: entered promiscuous mode [ 271.889974][T11696] bridge3: entered promiscuous mode [ 271.895526][T11696] bridge4: entered promiscuous mode [ 271.901978][T11696] bridge5: entered promiscuous mode [ 271.909787][T11696] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.917212][T11696] batman_adv: batadv0: Interface activated: team0 [ 271.931394][T11696] batman_adv: batadv0: Interface deactivated: team0 [ 271.946084][T11696] batman_adv: batadv0: Removing interface: team0 [ 271.954515][T11696] bridge0: port 3(team0) entered blocking state [ 271.963742][T11696] bridge0: port 3(team0) entered disabled state [ 271.985154][T11696] team0: entered allmulticast mode [ 271.999809][T11696] team_slave_0: entered allmulticast mode [ 272.005736][T11696] team_slave_1: entered allmulticast mode [ 272.011752][T11696] bridge3: entered allmulticast mode [ 272.017445][T11696] bridge4: entered allmulticast mode [ 272.022864][T11696] bridge5: entered allmulticast mode [ 272.034841][T11695] team0: entered promiscuous mode [ 272.044037][T11695] team_slave_0: entered promiscuous mode [ 272.059545][T11695] team_slave_1: entered promiscuous mode [ 272.067371][T11695] bridge3: entered promiscuous mode [ 272.073317][T11695] bridge4: entered promiscuous mode [ 272.079076][T11695] bridge5: entered promiscuous mode [ 272.084512][T11695] bridge7: entered promiscuous mode [ 272.094141][T11695] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.104306][T11724] netlink: 'syz.4.2025': attribute type 10 has an invalid length. [ 272.112868][T11695] batman_adv: batadv0: Interface activated: team0 [ 272.120538][T11695] batman_adv: batadv0: Interface deactivated: team0 [ 272.128739][T11695] batman_adv: batadv0: Removing interface: team0 [ 272.136507][T11695] bridge0: port 1(team0) entered blocking state [ 272.142980][T11695] bridge0: port 1(team0) entered disabled state [ 272.155404][T11725] netlink: 2 bytes leftover after parsing attributes in process `syz.4.2025'. [ 272.170226][T11695] team0: entered allmulticast mode [ 272.182183][T11695] team_slave_0: entered allmulticast mode [ 272.188274][T11695] team_slave_1: entered allmulticast mode [ 272.194144][T11695] bridge4: entered allmulticast mode [ 272.201989][T11695] bridge0: port 1(team0) entered blocking state [ 272.208394][T11695] bridge0: port 1(team0) entered forwarding state [ 272.218740][T11714] bridge0: port 3(team0) entered disabled state [ 272.225674][T11714] team0: left allmulticast mode [ 272.241373][T11714] team_slave_0: left allmulticast mode [ 272.248038][T11714] team_slave_1: left allmulticast mode [ 272.254362][T11714] team0: left promiscuous mode [ 272.260793][T11714] team_slave_0: left promiscuous mode [ 272.274527][T11714] team_slave_1: left promiscuous mode [ 272.281021][T11714] bridge1: left promiscuous mode [ 272.287146][T11714] bridge0: port 3(team0) entered disabled state [ 272.300767][T11716] team0: entered promiscuous mode [ 272.316196][T11716] team_slave_0: entered promiscuous mode [ 272.322890][T11716] team_slave_1: entered promiscuous mode [ 272.329317][T11716] bridge1: entered promiscuous mode [ 272.337934][T11716] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.345311][T11716] bridge0: port 3(team0) entered blocking state [ 272.352074][T11716] bridge0: port 3(team0) entered disabled state [ 272.359044][T11716] team0: entered allmulticast mode [ 272.364303][T11716] team_slave_0: entered allmulticast mode [ 272.370824][T11716] team_slave_1: entered allmulticast mode [ 272.397469][T11724] bridge0: port 4(team0) entered disabled state [ 272.413286][T11724] team0: left allmulticast mode [ 272.418387][T11724] team_slave_0: left allmulticast mode [ 272.458335][T11724] team_slave_1: left allmulticast mode [ 272.472374][T11724] syz_tun: left allmulticast mode [ 272.487175][T11724] team0: left promiscuous mode [ 272.498905][T11724] team_slave_0: left promiscuous mode [ 272.504663][T11724] team_slave_1: left promiscuous mode [ 272.510649][T11724] syz_tun: left promiscuous mode [ 272.521503][T11724] bridge0: port 4(team0) entered disabled state [ 272.544138][T11725] team0: entered promiscuous mode [ 272.549510][T11725] team_slave_0: entered promiscuous mode [ 272.555571][T11725] team_slave_1: entered promiscuous mode [ 272.562195][T11725] syz_tun: entered promiscuous mode [ 272.569684][T11725] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.587533][T11725] bridge0: port 4(team0) entered blocking state [ 272.604218][T11725] bridge0: port 4(team0) entered disabled state [ 272.614083][T11725] team0: entered allmulticast mode [ 272.630903][T11725] team_slave_0: entered allmulticast mode [ 272.637994][T11725] team_slave_1: entered allmulticast mode [ 272.643854][T11725] syz_tun: entered allmulticast mode [ 272.651796][T11725] bridge0: port 4(team0) entered blocking state [ 272.658204][T11725] bridge0: port 4(team0) entered forwarding state [ 272.685547][T11740] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2029'. [ 273.042304][T11758] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 273.058138][T11758] netlink: 25 bytes leftover after parsing attributes in process `syz.0.2033'. [ 273.255073][T11767] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 273.278971][T11764] bridge0: port 4(team0) entered disabled state [ 273.290247][T11764] team0: left allmulticast mode [ 273.295152][T11764] team_slave_0: left allmulticast mode [ 273.303387][T11767] netlink: 25 bytes leftover after parsing attributes in process `syz.1.2038'. [ 273.313332][T11764] team_slave_1: left allmulticast mode [ 273.319222][T11764] syz_tun: left allmulticast mode [ 273.324465][T11764] team0: left promiscuous mode [ 273.330072][T11764] team_slave_0: left promiscuous mode [ 273.336583][T11764] team_slave_1: left promiscuous mode [ 273.342504][T11764] syz_tun: left promiscuous mode [ 273.348807][T11764] bridge0: port 4(team0) entered disabled state [ 273.366104][T11769] team0: entered promiscuous mode [ 273.372480][T11769] team_slave_0: entered promiscuous mode [ 273.406162][T11769] team_slave_1: entered promiscuous mode [ 273.422466][T11769] syz_tun: entered promiscuous mode [ 273.452058][T11769] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.476332][T11769] bridge0: port 4(team0) entered blocking state [ 273.483244][T11769] bridge0: port 4(team0) entered disabled state [ 273.491957][T11769] team0: entered allmulticast mode [ 273.499220][T11769] team_slave_0: entered allmulticast mode [ 273.505157][T11769] team_slave_1: entered allmulticast mode [ 273.521936][T11769] syz_tun: entered allmulticast mode [ 273.535636][T11769] bridge0: port 4(team0) entered blocking state [ 273.542091][T11769] bridge0: port 4(team0) entered forwarding state [ 273.681157][T11775] bridge0: port 1(team0) entered disabled state [ 273.696395][T11775] team0: left allmulticast mode [ 273.701310][T11775] team_slave_0: left allmulticast mode [ 273.724959][T11775] team_slave_1: left allmulticast mode [ 273.744819][T11775] bridge4: left allmulticast mode [ 273.766023][T11775] team0: left promiscuous mode [ 273.770997][T11775] team_slave_0: left promiscuous mode [ 273.777000][T11775] team_slave_1: left promiscuous mode [ 273.783694][T11775] bridge3: left promiscuous mode [ 273.791182][T11775] bridge4: left promiscuous mode [ 273.806234][T11775] bridge5: left promiscuous mode [ 273.819378][T11775] bridge7: left promiscuous mode [ 273.831383][T11775] bridge0: port 1(team0) entered disabled state [ 273.878177][T11775] batman_adv: batadv0: Adding interface: team0 [ 273.878465][T11778] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 273.891447][T11775] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.926303][T11775] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 273.977482][T11776] team0: entered promiscuous mode [ 274.016777][T11776] team_slave_0: entered promiscuous mode [ 274.023258][T11776] team_slave_1: entered promiscuous mode [ 274.062636][T11776] bridge3: entered promiscuous mode [ 274.068936][T11776] bridge4: entered promiscuous mode [ 274.109237][T11776] bridge5: entered promiscuous mode [ 274.114619][T11776] bridge7: entered promiscuous mode [ 274.122309][T11776] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.131244][T11776] batman_adv: batadv0: Interface activated: team0 [ 274.156097][T11776] batman_adv: batadv0: Interface deactivated: team0 [ 274.197895][T11776] batman_adv: batadv0: Removing interface: team0 [ 274.213379][T11776] bridge0: port 1(team0) entered blocking state [ 274.221996][T11776] bridge0: port 1(team0) entered disabled state [ 274.228957][T11776] team0: entered allmulticast mode [ 274.234450][T11776] team_slave_0: entered allmulticast mode [ 274.268741][T11776] team_slave_1: entered allmulticast mode [ 274.284800][T11776] bridge4: entered allmulticast mode [ 274.293663][T11776] bridge0: port 1(team0) entered blocking state [ 274.300100][T11776] bridge0: port 1(team0) entered forwarding state [ 274.411023][T11804] xt_cgroup: invalid path, errno=-2 [ 274.464957][T11788] team0: left allmulticast mode [ 274.470249][T11788] team_slave_0: left allmulticast mode [ 274.475899][T11788] team_slave_1: left allmulticast mode [ 274.495943][T11788] bridge3: left allmulticast mode [ 274.502280][T11788] bridge4: left allmulticast mode [ 274.534869][T11788] bridge5: left allmulticast mode [ 274.554015][T11788] team0: left promiscuous mode [ 274.567460][T11788] team_slave_0: left promiscuous mode [ 274.584455][T11788] team_slave_1: left promiscuous mode [ 274.595299][T11788] bridge3: left promiscuous mode [ 274.600990][T11788] bridge4: left promiscuous mode [ 274.606588][T11788] bridge5: left promiscuous mode [ 274.612596][T11788] bridge0: port 3(team0) entered disabled state [ 274.628341][T11788] batman_adv: batadv0: Adding interface: team0 [ 274.667491][T11788] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.724987][T11788] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 275.136538][T11815] bridge0: port 1(team0) entered disabled state [ 275.153439][T11815] team0: left allmulticast mode [ 275.173920][T11815] team0: left promiscuous mode [ 275.193882][T11815] bridge0: port 1(team0) entered disabled state [ 275.247647][T11815] batman_adv: batadv0: Adding interface: team0 [ 275.254551][T11815] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.345952][T11815] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 275.394751][T11818] lo speed is unknown, defaulting to 1000 [ 275.397106][T11820] team0: entered promiscuous mode [ 275.407462][T11820] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.414756][T11820] batman_adv: batadv0: Interface activated: team0 [ 275.421960][T11820] batman_adv: batadv0: Interface deactivated: team0 [ 275.428768][T11820] batman_adv: batadv0: Removing interface: team0 [ 275.441598][T11820] bridge0: port 1(team0) entered blocking state [ 275.448129][T11820] bridge0: port 1(team0) entered disabled state [ 275.454690][T11820] team0: entered allmulticast mode [ 275.795017][T11829] lo speed is unknown, defaulting to 1000 [ 275.843338][T11837] bridge0: port 4(team0) entered disabled state [ 275.868287][T11837] team0: left allmulticast mode [ 275.889587][T11837] team_slave_0: left allmulticast mode [ 275.920443][T11837] team_slave_1: left allmulticast mode [ 275.940920][T11839] validate_nla: 13 callbacks suppressed [ 275.940939][T11839] netlink: 'syz.4.2056': attribute type 10 has an invalid length. [ 275.987327][T11837] syz_tun: left allmulticast mode [ 276.002562][T11823] __nla_validate_parse: 9 callbacks suppressed [ 276.002580][T11823] netlink: 165 bytes leftover after parsing attributes in process `syz.2.2050'. [ 276.009836][T11837] team0: left promiscuous mode [ 276.026583][T11839] netlink: 2 bytes leftover after parsing attributes in process `syz.4.2056'. [ 276.046051][T11837] team_slave_0: left promiscuous mode [ 276.051694][T11837] team_slave_1: left promiscuous mode [ 276.057922][T11837] syz_tun: left promiscuous mode [ 276.074724][T11837] bridge0: port 4(team0) entered disabled state [ 276.087252][T11845] netlink: 'syz.0.2058': attribute type 10 has an invalid length. [ 276.120506][T11839] team0: entered promiscuous mode [ 276.125997][T11839] team_slave_0: entered promiscuous mode [ 276.132337][T11839] team_slave_1: entered promiscuous mode [ 276.138832][T11839] syz_tun: entered promiscuous mode [ 276.155455][T11847] netlink: 'syz.0.2058': attribute type 10 has an invalid length. [ 276.163565][T11847] netlink: 2 bytes leftover after parsing attributes in process `syz.0.2058'. [ 276.165210][T11839] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.180494][T11839] bridge0: port 4(team0) entered blocking state [ 276.187248][T11839] bridge0: port 4(team0) entered disabled state [ 276.193933][T11839] team0: entered allmulticast mode [ 276.199891][T11839] team_slave_0: entered allmulticast mode [ 276.243255][T11839] team_slave_1: entered allmulticast mode [ 276.255980][T11839] syz_tun: entered allmulticast mode [ 276.274863][T11839] bridge0: port 4(team0) entered blocking state [ 276.281321][T11839] bridge0: port 4(team0) entered forwarding state [ 276.308967][T11845] bridge0: port 1(team0) entered disabled state [ 276.318849][T11845] team0: left allmulticast mode [ 276.323740][T11845] team0: left promiscuous mode [ 276.334731][T11845] bridge0: port 1(team0) entered disabled state [ 276.365759][T11845] batman_adv: batadv0: Adding interface: team0 [ 276.372724][T11845] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 276.398494][T11845] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 276.409927][T11847] team0: entered promiscuous mode [ 276.417928][T11847] 8021q: adding VLAN 0 to HW filter on device team0 [ 276.434527][T11847] batman_adv: batadv0: Interface activated: team0 [ 276.442092][T11847] batman_adv: batadv0: Interface deactivated: team0 [ 276.449303][T11847] batman_adv: batadv0: Removing interface: team0 [ 276.457408][T11847] bridge0: port 1(team0) entered blocking state [ 276.463814][T11847] bridge0: port 1(team0) entered disabled state [ 276.470924][T11847] team0: entered allmulticast mode [ 276.858922][T11856] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2060'. [ 276.886257][T11856] netlink: 36 bytes leftover after parsing attributes in process `syz.1.2060'. [ 276.937654][T11854] netlink: 'syz.4.2059': attribute type 10 has an invalid length. [ 276.948115][T11854] bridge0: port 4(team0) entered disabled state [ 276.955051][T11854] team0: left allmulticast mode [ 276.963133][T11854] team_slave_0: left allmulticast mode [ 276.974217][T11854] team_slave_1: left allmulticast mode [ 276.980984][T11854] syz_tun: left allmulticast mode [ 277.019890][T11854] team0: left promiscuous mode [ 277.024724][T11854] team_slave_0: left promiscuous mode [ 277.030864][T11858] netlink: 'syz.4.2059': attribute type 10 has an invalid length. [ 277.039820][T11858] netlink: 2 bytes leftover after parsing attributes in process `syz.4.2059'. [ 277.049428][T11860] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2060'. [ 277.064931][T11854] team_slave_1: left promiscuous mode [ 277.071085][T11854] syz_tun: left promiscuous mode [ 277.077998][T11854] bridge0: port 4(team0) entered disabled state [ 277.165571][T11858] team0: entered promiscuous mode [ 277.170869][T11858] team_slave_0: entered promiscuous mode [ 277.191360][T11858] team_slave_1: entered promiscuous mode [ 277.226120][T11858] syz_tun: entered promiscuous mode [ 277.244388][T11858] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.266486][T11858] bridge0: port 4(team0) entered blocking state [ 277.273751][T11858] bridge0: port 4(team0) entered disabled state [ 277.283310][T11858] team0: entered allmulticast mode [ 277.290022][T11858] team_slave_0: entered allmulticast mode [ 277.296253][T11858] team_slave_1: entered allmulticast mode [ 277.302105][T11858] syz_tun: entered allmulticast mode [ 277.310202][T11858] bridge0: port 4(team0) entered blocking state [ 277.316612][T11858] bridge0: port 4(team0) entered forwarding state [ 277.513943][T11871] netlink: 'syz.0.2064': attribute type 10 has an invalid length. [ 277.530599][T11871] bridge0: port 1(team0) entered disabled state [ 277.538541][T11871] team0: left allmulticast mode [ 277.576406][T11871] team0: left promiscuous mode [ 277.588642][T11871] bridge0: port 1(team0) entered disabled state [ 277.606776][T11873] netlink: 'syz.0.2064': attribute type 10 has an invalid length. [ 277.625132][T11873] netlink: 2 bytes leftover after parsing attributes in process `syz.0.2064'. [ 277.635781][T11871] batman_adv: batadv0: Adding interface: team0 [ 277.650108][T11879] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2066'. [ 277.659931][T11871] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.686578][T11879] netlink: 36 bytes leftover after parsing attributes in process `syz.3.2066'. [ 277.697237][T11871] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 277.710496][T11873] team0: entered promiscuous mode [ 277.717794][T11873] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.724985][T11873] batman_adv: batadv0: Interface activated: team0 [ 277.732009][T11873] batman_adv: batadv0: Interface deactivated: team0 [ 277.740374][T11873] batman_adv: batadv0: Removing interface: team0 [ 277.758513][T11873] bridge0: port 1(team0) entered blocking state [ 277.771308][T11873] bridge0: port 1(team0) entered disabled state [ 277.781613][T11873] team0: entered allmulticast mode [ 277.794244][T11878] lo speed is unknown, defaulting to 1000 [ 277.827607][T11884] netlink: 'syz.4.2068': attribute type 10 has an invalid length. [ 277.863332][T11884] bridge0: port 4(team0) entered disabled state [ 277.871063][T11884] team0: left allmulticast mode [ 277.893598][T11886] netlink: 'syz.4.2068': attribute type 10 has an invalid length. [ 277.908507][T11884] team_slave_0: left allmulticast mode [ 277.921820][T11884] team_slave_1: left allmulticast mode [ 277.933409][T11884] syz_tun: left allmulticast mode [ 277.946556][T11884] team0: left promiscuous mode [ 277.957035][T11884] team_slave_0: left promiscuous mode [ 277.969941][T11884] team_slave_1: left promiscuous mode [ 277.986800][T11884] syz_tun: left promiscuous mode [ 278.010905][T11884] bridge0: port 4(team0) entered disabled state [ 278.029891][T11886] team0: entered promiscuous mode [ 278.037800][T11886] team_slave_0: entered promiscuous mode [ 278.044021][T11886] team_slave_1: entered promiscuous mode [ 278.050724][T11886] syz_tun: entered promiscuous mode [ 278.058658][T11886] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.076540][T11891] netlink: 'syz.3.2069': attribute type 10 has an invalid length. [ 278.086584][T11886] bridge0: port 4(team0) entered blocking state [ 278.099806][T11886] bridge0: port 4(team0) entered disabled state [ 278.111195][T11886] team0: entered allmulticast mode [ 278.117267][T11886] team_slave_0: entered allmulticast mode [ 278.123207][T11886] team_slave_1: entered allmulticast mode [ 278.129599][T11886] syz_tun: entered allmulticast mode [ 278.138086][T11886] bridge0: port 4(team0) entered blocking state [ 278.144480][T11886] bridge0: port 4(team0) entered forwarding state [ 278.158170][T11891] bridge0: port 3(team0) entered disabled state [ 278.176398][T11891] team0: left allmulticast mode [ 278.181464][T11891] team_slave_0: left allmulticast mode [ 278.188739][T11891] team_slave_1: left allmulticast mode [ 278.195334][T11891] team0: left promiscuous mode [ 278.200644][T11891] team_slave_0: left promiscuous mode [ 278.206694][T11891] team_slave_1: left promiscuous mode [ 278.212619][T11891] bridge1: left promiscuous mode [ 278.218426][T11891] bridge0: port 3(team0) entered disabled state [ 278.229059][T11893] team0: entered promiscuous mode [ 278.234466][T11893] team_slave_0: entered promiscuous mode [ 278.248811][T11893] team_slave_1: entered promiscuous mode [ 278.257822][T11893] bridge1: entered promiscuous mode [ 278.265809][T11893] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.273019][T11893] bridge0: port 3(team0) entered blocking state [ 278.280768][T11893] bridge0: port 3(team0) entered disabled state [ 278.302183][T11893] team0: entered allmulticast mode [ 278.317912][T11893] team_slave_0: entered allmulticast mode [ 278.323906][T11893] team_slave_1: entered allmulticast mode [ 278.500397][T11898] bridge0: port 1(team0) entered disabled state [ 278.512629][T11898] team0: left allmulticast mode [ 278.517977][T11898] team0: left promiscuous mode [ 278.524479][T11898] bridge0: port 1(team0) entered disabled state [ 278.545579][T11898] batman_adv: batadv0: Adding interface: team0 [ 278.579797][T11898] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.639727][T11898] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 278.682309][T11901] team0: entered promiscuous mode [ 278.699077][T11901] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.724136][T11901] batman_adv: batadv0: Interface activated: team0 [ 278.752674][T11901] batman_adv: batadv0: Interface deactivated: team0 [ 278.761029][T11901] batman_adv: batadv0: Removing interface: team0 [ 278.777164][T11901] bridge0: port 1(team0) entered blocking state [ 278.787044][T11901] bridge0: port 1(team0) entered disabled state [ 278.793705][T11901] team0: entered allmulticast mode [ 278.943116][ T30] INFO: task udevd:7315 blocked for more than 143 seconds. [ 278.969658][ T30] Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 278.978771][T11910] team0: entered promiscuous mode [ 278.986198][T11910] team_slave_0: entered promiscuous mode [ 278.993127][T11910] team_slave_1: entered promiscuous mode [ 278.999706][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 279.009393][T11910] bridge3: entered promiscuous mode [ 279.014797][ T30] task:udevd state:D stack:21752 pid:7315 tgid:7315 ppid:5211 flags:0x00004002 [ 279.026256][T11910] bridge4: entered promiscuous mode [ 279.031662][ T30] Call Trace: [ 279.035652][T11910] bridge5: entered promiscuous mode [ 279.041261][ T30] [ 279.044338][ T30] __schedule+0x186c/0x4be0 [ 279.049606][ T30] ? _raw_spin_unlock_irqrestore+0x8f/0x140 [ 279.057599][T11910] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.064436][ T30] ? __pfx___schedule+0x10/0x10 [ 279.069779][ T30] ? __blk_flush_plug+0x449/0x500 [ 279.075354][T11910] batman_adv: batadv0: Interface activated: team0 [ 279.082610][ T30] ? __pfx_lock_release+0x10/0x10 [ 279.088847][ T30] ? __pfx___mod_timer+0x10/0x10 [ 279.094040][T11910] batman_adv: batadv0: Interface deactivated: team0 [ 279.101243][ T30] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 279.108000][ T30] ? schedule+0x90/0x320 [ 279.112506][T11910] batman_adv: batadv0: Removing interface: team0 [ 279.119378][ T30] schedule+0x14b/0x320 [ 279.123765][ T30] schedule_timeout+0x15a/0x290 [ 279.131074][ T30] ? __pfx_schedule_timeout+0x10/0x10 [ 279.136928][ T30] ? __pfx_process_timeout+0x10/0x10 [ 279.151895][ T30] ? prepare_to_wait_event+0x3bd/0x400 [ 279.157990][ T30] nbd_queue_rq+0x6dd/0xef0 [ 279.162736][ T30] ? __pfx_nbd_queue_rq+0x10/0x10 [ 279.168591][ T30] ? __pfx_autoremove_wake_function+0x10/0x10 [ 279.174910][ T30] blk_mq_dispatch_rq_list+0xad3/0x19d0 [ 279.180995][ T30] ? sbitmap_get+0x289/0x3f0 [ 279.186365][ T30] ? __pfx_blk_mq_dispatch_rq_list+0x10/0x10 [ 279.199933][ T30] ? __blk_mq_alloc_driver_tag+0x32d/0x730 [ 279.206222][ T30] __blk_mq_sched_dispatch_requests+0xb8a/0x1840 [ 279.212800][ T30] ? __pfx___blk_mq_sched_dispatch_requests+0x10/0x10 [ 279.225684][ T30] ? __pfx_lock_acquire+0x10/0x10 [ 279.231188][ T30] ? __pfx___might_resched+0x10/0x10 [ 279.237139][ T30] ? sbitmap_any_bit_set+0x155/0x190 [ 279.242650][ T30] ? blk_mq_hw_queue_need_run+0x14d/0x6d0 [ 279.248853][ T30] blk_mq_sched_dispatch_requests+0xd6/0x190 [ 279.255088][ T30] ? blk_mq_run_hw_queue+0x32b/0x500 [ 279.274672][ T30] blk_mq_run_hw_queue+0x354/0x500 [ 279.280418][ T30] blk_mq_flush_plug_list+0x118e/0x1870 [ 279.286376][ T30] ? __pfx_blk_mq_flush_plug_list+0x10/0x10 [ 279.292495][ T30] ? blk_mq_submit_bio+0xfb9/0x25a0 [ 279.298366][ T30] ? blk_mq_submit_bio+0x494/0x25a0 [ 279.303819][ T30] __blk_flush_plug+0x420/0x500 [ 279.309288][ T30] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 279.315541][ T30] ? __pfx___blk_flush_plug+0x10/0x10 [ 279.321759][ T30] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 279.340522][ T30] __submit_bio+0x54a/0x6a0 [ 279.347423][ T30] ? __pfx___submit_bio+0x10/0x10 [ 279.356293][ T30] submit_bio_noacct_nocheck+0x4d3/0xe30 [ 279.365443][ T30] ? bio_associate_blkg_from_css+0x182/0xc70 [ 279.376094][ T30] ? __pfx___might_resched+0x10/0x10 [ 279.384911][ T30] ? __pfx_submit_bio_noacct_nocheck+0x10/0x10 [ 279.395806][ T30] block_read_full_folio+0x9b3/0xae0 [ 279.406058][ T30] ? __pfx_blkdev_get_block+0x10/0x10 [ 279.416251][ T30] ? __pfx_block_read_full_folio+0x10/0x10 [ 279.424825][ T30] filemap_read_folio+0x148/0x3b0 [ 279.430272][ T30] ? __pfx_blkdev_read_folio+0x10/0x10 [ 279.436265][ T30] ? __pfx_filemap_read_folio+0x10/0x10 [ 279.441996][ T30] ? __filemap_get_folio+0x848/0x940 [ 279.447811][ T30] do_read_cache_folio+0x373/0x5b0 [ 279.453150][ T30] ? __pfx_blkdev_read_folio+0x10/0x10 [ 279.459193][ T30] read_part_sector+0xb3/0x260 [ 279.464143][ T30] adfspart_check_ICS+0xd9/0x9a0 [ 279.469584][ T30] ? __pfx_vsnprintf+0x10/0x10 [ 279.474569][ T30] ? __pfx_adfspart_check_ICS+0x10/0x10 [ 279.480883][ T30] ? snprintf+0xda/0x120 [ 279.485307][ T30] ? alloc_pages_mpol_noprof+0x58e/0x780 [ 279.491406][ T30] ? vsnprintf+0x1148/0x1220 [ 279.496490][ T30] ? vsnprintf+0x18e/0x1220 [ 279.501246][ T30] ? __pfx_snprintf+0x10/0x10 [ 279.507126][ T30] ? __kasan_kmalloc+0x98/0xb0 [ 279.512151][ T30] bdev_disk_changed+0x72c/0x13f0 [ 279.517722][ T30] ? __pfx_bdev_disk_changed+0x10/0x10 [ 279.523431][ T30] ? wait_on_inode+0xc1/0x230 [ 279.528571][ T30] blkdev_get_whole+0x2d2/0x450 [ 279.533674][ T30] bdev_open+0x2d4/0xc50 [ 279.538454][ T30] blkdev_open+0x38e/0x4e0 [ 279.543056][ T30] ? __pfx_blkdev_open+0x10/0x10 [ 279.548517][ T30] do_dentry_open+0xbe1/0x1b70 [ 279.555247][ T30] vfs_open+0x3e/0x330 [ 279.560022][ T30] path_openat+0x2c84/0x3590 [ 279.564832][ T30] ? __pfx_path_openat+0x10/0x10 [ 279.570296][ T30] do_filp_open+0x27f/0x4e0 [ 279.575016][ T30] ? __pfx_do_filp_open+0x10/0x10 [ 279.580581][ T30] ? do_raw_spin_lock+0x14f/0x370 [ 279.586048][ T30] do_sys_openat2+0x13e/0x1d0 [ 279.590989][ T30] ? __pfx_do_sys_openat2+0x10/0x10 [ 279.596818][ T30] __x64_sys_openat+0x247/0x2a0 [ 279.601933][ T30] ? __pfx___x64_sys_openat+0x10/0x10 [ 279.607786][ T30] ? do_syscall_64+0x100/0x230 [ 279.621423][ T30] ? do_syscall_64+0xb6/0x230 [ 279.626585][ T30] do_syscall_64+0xf3/0x230 [ 279.631237][ T30] ? clear_bhb_loop+0x35/0x90 [ 279.636135][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.642176][ T30] RIP: 0033:0x7feddd1169a4 [ 279.646746][ T30] RSP: 002b:00007ffff54a19e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 279.655318][ T30] RAX: ffffffffffffffda RBX: 000055a7b04389d0 RCX: 00007feddd1169a4 [ 279.663481][ T30] RDX: 00000000000a0800 RSI: 000055a7b03ffe00 RDI: 00000000ffffff9c [ 279.671699][ T30] RBP: 000055a7b03ffe00 R08: 0000000000000001 R09: 7fffffffffffffff [ 279.679862][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a0800 [ 279.688074][ T30] R13: 000055a7b03fb8a0 R14: 0000000000000001 R15: 000055a7b03f2910 [ 279.696256][ T30] [ 279.699512][ T30] [ 279.699512][ T30] Showing all locks held in the system: [ 279.707460][ T30] 1 lock held by pool_workqueue_/3: [ 279.721030][T11910] bridge0: port 3(team0) entered blocking state [ 279.746152][T11910] bridge0: port 3(team0) entered disabled state [ 279.757785][T11910] team0: entered allmulticast mode [ 279.760890][ T30] #0: ffffffff8e93f8b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x451/0x830 [ 279.768761][T11910] team_slave_0: entered allmulticast mode [ 279.774203][ T30] 1 lock held by khungtaskd/30: [ 279.780590][T11910] team_slave_1: entered allmulticast mode [ 279.784740][ T30] #0: ffffffff8e93a3e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x55/0x2a0 [ 279.793927][T11910] bridge3: entered allmulticast mode [ 279.800674][ T30] 3 locks held by kworker/1:1/57: [ 279.800692][ T30] #0: ffff88801ac80d48 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 [ 279.822396][T11910] bridge4: entered allmulticast mode [ 279.827968][T11910] bridge5: entered allmulticast mode [ 279.838358][T11917] bridge0: port 1(team0) entered disabled state [ 279.845373][T11917] team0: left allmulticast mode [ 279.850545][T11917] team_slave_0: left allmulticast mode [ 279.856280][T11917] team_slave_1: left allmulticast mode [ 279.861953][T11917] bridge4: left allmulticast mode [ 279.867220][ T30] #1: ffffc9000101fc60 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 [ 279.884733][T11917] team0: left promiscuous mode [ 279.889833][ T30] #2: ffffffff8fcc5a88 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20 [ 279.900529][T11917] team_slave_0: left promiscuous mode [ 279.906322][T11917] team_slave_1: left promiscuous mode [ 279.911873][ T30] 2 locks held by kworker/u8:4/61: [ 279.917316][T11917] bridge3: left promiscuous mode [ 279.922449][ T30] 4 locks held by kworker/u8:6/2997: [ 279.934380][T11917] bridge4: left promiscuous mode [ 279.939605][ T30] #0: ffff88801baf5948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 [ 279.951099][T11917] bridge5: left promiscuous mode [ 279.964527][T11917] bridge7: left promiscuous mode [ 279.970477][T11917] bridge0: port 1(team0) entered disabled state [ 279.974453][ T30] #1: ffffc9000c4a7c60 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 [ 279.988705][ T30] #2: ffffffff8fcb94d0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0x17a/0xd60 [ 279.998538][ T30] #3: ffffffff8e93f8b8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x381/0x830 [ 280.009900][ T30] 3 locks held by kworker/u8:12/3659: [ 280.015287][ T30] #0: ffff88803101b148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 [ 280.027580][ T30] #1: ffffc9000d4b7c60 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 [ 280.041292][ T30] #2: ffffffff8fcc5a88 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_dad_work+0x10e/0x16a0 [ 280.051309][ T30] 2 locks held by getty/5597: [ 280.056368][ T30] #0: ffff88803597a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 280.066564][ T30] #1: ffffc90002fde2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x6a6/0x1e00 [ 280.077108][ T30] 3 locks held by udevd/5849: [ 280.081793][ T30] #0: ffff88802585f4c8 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0xf0/0xc50 [ 280.091518][ T30] #1: ffff888024c4cc10 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x32b/0x500 [ 280.101844][ T30] #2: ffff8880259f51f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xcf/0xef0 [ 280.111210][ T30] 3 locks held by udevd/5855: [ 280.116974][ T30] #0: ffff8880259894c8 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0xf0/0xc50 [ 280.126637][ T30] #1: ffff888141fca610 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x32b/0x500 [ 280.136712][ T30] #2: ffff888025a551f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xcf/0xef0 [ 280.145662][ T30] 3 locks held by udevd/7314: [ 280.151150][ T30] #0: ffff88802573d4c8 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0xf0/0xc50 [ 280.160983][ T30] #1: ffff888141fb0f90 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x32b/0x500 [ 280.170908][ T30] #2: ffff8880259b7178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xcf/0xef0 [ 280.184958][ T30] 3 locks held by udevd/7315: [ 280.190021][ T30] #0: ffff8880257394c8 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0xf0/0xc50 [ 280.200256][ T30] #1: ffff888141fb0910 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x32b/0x500 [ 280.210192][ T30] #2: ffff88802589e178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xcf/0xef0 [ 280.219433][ T30] 1 lock held by syz.1.2075/11917: [ 280.224566][ T30] #0: ffffffff8fcc5a88 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0xce2/0x2210 [ 280.234230][ T30] 1 lock held by syz.1.2075/11920: [ 280.239763][ T30] #0: ffffffff8fcc5a88 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0xce2/0x2210 [ 280.249440][ T30] [ 280.276189][ T30] ============================================= [ 280.276189][ T30] [ 280.284786][ T30] NMI backtrace for cpu 1 [ 280.284800][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 280.284818][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 280.284827][ T30] Call Trace: [ 280.284833][ T30] [ 280.284841][ T30] dump_stack_lvl+0x241/0x360 [ 280.284876][ T30] ? __pfx_dump_stack_lvl+0x10/0x10 [ 280.284899][ T30] ? __pfx__printk+0x10/0x10 [ 280.284930][ T30] nmi_cpu_backtrace+0x49c/0x4d0 [ 280.284957][ T30] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 280.284975][ T30] ? _printk+0xd5/0x120 [ 280.284993][ T30] ? __pfx__printk+0x10/0x10 [ 280.285012][ T30] ? __wake_up_klogd+0xcc/0x110 [ 280.285030][ T30] ? __pfx__printk+0x10/0x10 [ 280.285052][ T30] ? __rcu_read_unlock+0xa1/0x110 [ 280.285071][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 280.285089][ T30] nmi_trigger_cpumask_backtrace+0x198/0x320 [ 280.285113][ T30] watchdog+0xff6/0x1040 [ 280.285133][ T30] ? watchdog+0x1ea/0x1040 [ 280.285157][ T30] ? __pfx_watchdog+0x10/0x10 [ 280.285176][ T30] kthread+0x7a9/0x920 [ 280.285194][ T30] ? __pfx_kthread+0x10/0x10 [ 280.285215][ T30] ? __pfx_watchdog+0x10/0x10 [ 280.285233][ T30] ? __pfx_kthread+0x10/0x10 [ 280.285251][ T30] ? __pfx_kthread+0x10/0x10 [ 280.285273][ T30] ? __pfx_kthread+0x10/0x10 [ 280.285291][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 280.285310][ T30] ? lockdep_hardirqs_on+0x99/0x150 [ 280.285330][ T30] ? __pfx_kthread+0x10/0x10 [ 280.285351][ T30] ret_from_fork+0x4b/0x80 [ 280.285367][ T30] ? __pfx_kthread+0x10/0x10 [ 280.285387][ T30] ret_from_fork_asm+0x1a/0x30 [ 280.285417][ T30] [ 280.285423][ T30] Sending NMI from CPU 1 to CPUs 0: [ 280.302753][T11917] batman_adv: batadv0: Adding interface: team0 [ 280.310847][ C0] NMI backtrace for cpu 0 [ 280.310861][ C0] CPU: 0 UID: 0 PID: 11917 Comm: syz.1.2075 Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 280.310878][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 280.310888][ C0] RIP: 0010:io_serial_in+0x76/0xb0 [ 280.310911][ C0] Code: 20 f2 49 fc 89 e9 41 d3 e6 48 83 c3 40 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 01 78 b0 fc 44 03 33 44 89 f2 ec <0f> b6 c0 5b 41 5e 41 5f 5d c3 cc cc cc cc 89 e9 80 e1 07 38 c1 7c [ 280.310925][ C0] RSP: 0018:ffffc9001c07e538 EFLAGS: 00000002 [ 280.310940][ C0] RAX: 1ffffffff34e8500 RBX: ffffffff9a742940 RCX: 0000000000000000 [ 280.310952][ C0] RDX: 00000000000003fd RSI: 0000000000069348 RDI: 0000000000069349 [ 280.310962][ C0] RBP: 0000000000000000 R08: ffffffff85558996 R09: 1ffff110049c6046 [ 280.310973][ C0] R10: dffffc0000000000 R11: ffffffff85558950 R12: dffffc0000000000 [ 280.310985][ C0] R13: ffffffff9a43cf30 R14: 00000000000003fd R15: dffffc0000000000 [ 280.310996][ C0] FS: 00007f25433c06c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 280.311009][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 280.311019][ C0] CR2: 00007f2abb378ab8 CR3: 0000000078236000 CR4: 00000000003526f0 [ 280.311033][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 280.311042][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 280.311052][ C0] Call Trace: [ 280.311058][ C0] [ 280.311064][ C0] ? nmi_cpu_backtrace+0x3c2/0x4d0 [ 280.311084][ C0] ? __pfx_lock_acquire+0x10/0x10 [ 280.311106][ C0] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 280.311125][ C0] ? nmi_handle+0x2a/0x5a0 [ 280.311152][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 280.311168][ C0] ? nmi_handle+0x14f/0x5a0 [ 280.311186][ C0] ? nmi_handle+0x2a/0x5a0 [ 280.311206][ C0] ? io_serial_in+0x76/0xb0 [ 280.311221][ C0] ? default_do_nmi+0x63/0x160 [ 280.311240][ C0] ? exc_nmi+0x123/0x1f0 [ 280.311257][ C0] ? end_repeat_nmi+0xf/0x53 [ 280.311276][ C0] ? __pfx_io_serial_in+0x10/0x10 [ 280.311291][ C0] ? io_serial_in+0x46/0xb0 [ 280.311308][ C0] ? io_serial_in+0x76/0xb0 [ 280.311324][ C0] ? io_serial_in+0x76/0xb0 [ 280.311340][ C0] ? io_serial_in+0x76/0xb0 [ 280.311356][ C0] [ 280.311361][ C0] [ 280.311367][ C0] serial8250_console_write+0x1373/0x1ed0 [ 280.311393][ C0] ? __pfx_serial8250_console_write+0x10/0x10 [ 280.311409][ C0] ? __pfx_lock_release+0x10/0x10 [ 280.311427][ C0] ? do_raw_spin_lock+0x14f/0x370 [ 280.311447][ C0] ? do_raw_spin_unlock+0x13c/0x8b0 [ 280.311465][ C0] ? console_flush_all+0x1a3/0xeb0 [ 280.311480][ C0] ? __pfx_univ8250_console_write+0x10/0x10 [ 280.311502][ C0] console_flush_all+0x869/0xeb0 [ 280.311517][ C0] ? mark_lock+0x9a/0x360 [ 280.311538][ C0] ? console_flush_all+0x1a3/0xeb0 [ 280.311557][ C0] ? __pfx_console_flush_all+0x10/0x10 [ 280.311580][ C0] ? is_printk_cpu_sync_owner+0x32/0x40 [ 280.311605][ C0] ? printk_get_console_flush_type+0x1fe/0x4f0 [ 280.311630][ C0] console_unlock+0x14f/0x3b0 [ 280.311645][ C0] ? __pfx_console_unlock+0x10/0x10 [ 280.311658][ C0] ? vprintk_emit+0x450/0xa10 [ 280.311674][ C0] ? vprintk_emit+0x6f5/0xa10 [ 280.311689][ C0] ? vprintk_emit+0x530/0xa10 [ 280.311702][ C0] vprintk_emit+0x730/0xa10 [ 280.311717][ C0] ? __pfx_vprintk_emit+0x10/0x10 [ 280.311740][ C0] _printk+0xd5/0x120 [ 280.311760][ C0] ? batadv_hardif_enable_interface+0x566/0x9f0 [ 280.311785][ C0] ? __pfx__printk+0x10/0x10 [ 280.311806][ C0] ? do_raw_spin_unlock+0x13c/0x8b0 [ 280.311826][ C0] batadv_hardif_enable_interface+0x5ba/0x9f0 [ 280.311852][ C0] batadv_softif_slave_add+0x79/0x100 [ 280.311870][ C0] do_setlink+0xe40/0x4210 [ 280.311900][ C0] ? mark_lock+0x9a/0x360 [ 280.311920][ C0] ? __pfx_do_setlink+0x10/0x10 [ 280.311941][ C0] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 280.311961][ C0] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 280.311983][ C0] ? _raw_spin_unlock_irqrestore+0x8f/0x140 [ 280.312004][ C0] ? lockdep_hardirqs_on+0x99/0x150 [ 280.312025][ C0] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 280.312046][ C0] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 280.312069][ C0] ? rcu_is_watching+0x15/0xb0 [ 280.312093][ C0] ? __mutex_lock+0xba3/0x1010 [ 280.312116][ C0] ? __mutex_lock+0x602/0x1010 [ 280.312141][ C0] ? rtnl_newlink+0xce2/0x2210 [ 280.312161][ C0] ? __pfx___mutex_lock+0x10/0x10 [ 280.312188][ C0] ? ns_capable+0x8a/0xf0 [ 280.312203][ C0] ? rtnl_link_get_net_capable+0x168/0x340 [ 280.312227][ C0] rtnl_newlink+0x1bb6/0x2210 [ 280.312253][ C0] ? __pfx_rtnl_newlink+0x10/0x10 [ 280.312272][ C0] ? __netlink_deliver_tap+0x56b/0x7f0 [ 280.312289][ C0] ? __pfx_validate_chain+0x10/0x10 [ 280.312311][ C0] ? __pfx_validate_chain+0x10/0x10 [ 280.312335][ C0] ? __pfx___schedule+0x10/0x10 [ 280.312361][ C0] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 280.312382][ C0] ? preempt_schedule+0xe1/0xf0 [ 280.312402][ C0] ? preempt_schedule_common+0x84/0xd0 [ 280.312425][ C0] ? mark_lock+0x9a/0x360 [ 280.312447][ C0] ? __lock_acquire+0x1397/0x2100 [ 280.312481][ C0] ? __pfx_lock_release+0x10/0x10 [ 280.312507][ C0] ? __pfx_rtnl_newlink+0x10/0x10 [ 280.312528][ C0] rtnetlink_rcv_msg+0x791/0xcf0 [ 280.312546][ C0] ? rtnetlink_rcv_msg+0x1a7/0xcf0 [ 280.312567][ C0] ? rcu_preempt_deferred_qs_irqrestore+0x8c4/0xca0 [ 280.312587][ C0] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 280.312620][ C0] netlink_rcv_skb+0x1e3/0x430 [ 280.312637][ C0] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 280.312658][ C0] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 280.312685][ C0] ? __rcu_read_unlock+0xa1/0x110 [ 280.312705][ C0] netlink_unicast+0x7f6/0x990 [ 280.312723][ C0] ? __pfx_netlink_unicast+0x10/0x10 [ 280.312737][ C0] ? __virt_addr_valid+0x45f/0x530 [ 280.312757][ C0] ? __phys_addr_symbol+0x2f/0x70 [ 280.312776][ C0] ? __check_object_size+0x47a/0x730 [ 280.312799][ C0] netlink_sendmsg+0x8e4/0xcb0 [ 280.312822][ C0] ? __pfx_netlink_sendmsg+0x10/0x10 [ 280.312842][ C0] ? aa_sock_msg_perm+0x91/0x160 [ 280.312861][ C0] ? __pfx_netlink_sendmsg+0x10/0x10 [ 280.312877][ C0] __sock_sendmsg+0x221/0x270 [ 280.312900][ C0] ____sys_sendmsg+0x52a/0x7e0 [ 280.312921][ C0] ? __pfx_____sys_sendmsg+0x10/0x10 [ 280.312938][ C0] ? __fget_files+0x2a/0x410 [ 280.312960][ C0] ? __fget_files+0x2a/0x410 [ 280.312986][ C0] __sys_sendmsg+0x269/0x350 [ 280.313002][ C0] ? __pfx_futex_wake+0x10/0x10 [ 280.313023][ C0] ? __pfx___sys_sendmsg+0x10/0x10 [ 280.313060][ C0] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 280.313081][ C0] ? do_syscall_64+0x100/0x230 [ 280.313097][ C0] ? do_syscall_64+0xb6/0x230 [ 280.313112][ C0] do_syscall_64+0xf3/0x230 [ 280.313126][ C0] ? clear_bhb_loop+0x35/0x90 [ 280.313143][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.313160][ C0] RIP: 0033:0x7f254258cda9 [ 280.313173][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.313185][ C0] RSP: 002b:00007f25433c0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.313201][ C0] RAX: ffffffffffffffda RBX: 00007f25427a6080 RCX: 00007f254258cda9 [ 280.313212][ C0] RDX: 0000000004040850 RSI: 0000000020000000 RDI: 000000000000000d [ 280.313222][ C0] RBP: 00007f254260e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 280.313232][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 280.313241][ C0] R13: 0000000000000000 R14: 00007f25427a6080 R15: 00007fff934ec218 [ 280.313260][ C0] [ 280.343642][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 280.343660][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-syzkaller-04046-g0ad9617c78ac #0 [ 280.343679][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 280.343689][ T30] Call Trace: [ 280.343697][ T30] [ 280.343706][ T30] dump_stack_lvl+0x241/0x360 [ 280.343735][ T30] ? __pfx_dump_stack_lvl+0x10/0x10 [ 280.343758][ T30] ? __pfx__printk+0x10/0x10 [ 280.343776][ T30] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 280.343804][ T30] ? vscnprintf+0x5d/0x90 [ 280.343826][ T30] panic+0x349/0x880 [ 280.343853][ T30] ? nmi_trigger_cpumask_backtrace+0x244/0x320 [ 280.343874][ T30] ? __pfx_panic+0x10/0x10 [ 280.343892][ T30] ? tick_nohz_tick_stopped+0x82/0xb0 [ 280.343916][ T30] ? __irq_work_queue_local+0x137/0x410 [ 280.343938][ T30] ? preempt_schedule_thunk+0x1a/0x30 [ 280.343957][ T30] ? nmi_trigger_cpumask_backtrace+0x244/0x320 [ 280.343976][ T30] ? nmi_trigger_cpumask_backtrace+0x2d4/0x320 [ 280.343998][ T30] ? nmi_trigger_cpumask_backtrace+0x2d9/0x320 [ 280.344022][ T30] watchdog+0x1035/0x1040 [ 280.344043][ T30] ? watchdog+0x1ea/0x1040 [ 280.344066][ T30] ? __pfx_watchdog+0x10/0x10 [ 280.344084][ T30] kthread+0x7a9/0x920 [ 280.344103][ T30] ? __pfx_kthread+0x10/0x10 [ 280.344125][ T30] ? __pfx_watchdog+0x10/0x10 [ 280.344144][ T30] ? __pfx_kthread+0x10/0x10 [ 280.344163][ T30] ? __pfx_kthread+0x10/0x10 [ 280.344185][ T30] ? __pfx_kthread+0x10/0x10 [ 280.344203][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 280.344224][ T30] ? lockdep_hardirqs_on+0x99/0x150 [ 280.344244][ T30] ? __pfx_kthread+0x10/0x10 [ 280.344265][ T30] ret_from_fork+0x4b/0x80 [ 280.344281][ T30] ? __pfx_kthread+0x10/0x10 [ 280.344302][ T30] ret_from_fork_asm+0x1a/0x30 [ 280.344330][ T30] [ 280.347717][ T30] Kernel Offset: disabled