last executing test programs: 1.335799711s ago: executing program 4 (id=5): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000182300", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x40}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x4c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000000906010200000000000000000200ffff200007800c0001c008000140e000000208000a400000000205000300020000140900020073797a31000000000500010007"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r5, &(0x7f0000007fc0), 0x2d, 0x0) 1.197364401s ago: executing program 3 (id=10): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000b80)={0x1, {{0xa, 0x3, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x4e22, 0x4, @local, 0x40}}, {{0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fff}}]}, 0x190) add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="ae", 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0xbed}, 0x18) r5 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r5, &(0x7f0000000000)=ANY=[], 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x20, 0x3fa, 0x400, 0x70bd2c, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4004}, 0x24000000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 1.156094794s ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="19000000040000000800000008", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000340)=0x0, &(0x7f0000000540)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000006740)=[0xffffffffffffffff], 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x9, 0x0, 0xffffffff}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0xda72ed5a9dc29567, 0x2000) msgsnd(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="03000a00000000004ec6967266b644e7041c8ac15d4988d6c1a5d56f968fb34b56bb3e954d35a582bafe60c07714e72b33e9d2f4f6a0e97a7f15fec11c348aacedfc580676e9a97925c0cdf7cb8e9c2e0dcb3e11335d03f92e2e230d366770505e639bb045e07055a876b6923c0a2131a24d57d0d70c2c29b29ee316c8c5c6268dc107118950fa18e6e4d1a1319d53c05f5f6d59aba832871961df798676154bc438492aa9ab1062b6d851a391399a5d0c0a6b62876b9fb02de3e24658b109249f4ebcb7d447104c62304e3b5a9cdb4eb45d590e1b83ec7c8bfedff1af8f5c846a326a4daf943fb36f"], 0x8, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x30, 0x0, 0x3196aee33d918dfd, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d6163"], 0x5c}}, 0x40000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000200)=0x400, 0x9e3b, 0x1) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000240)={0x0, 0xffac, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}}, 0x0) 1.149360414s ago: executing program 0 (id=12): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r4}, 0x18) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x1) 906.199513ms ago: executing program 3 (id=14): socket(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r0) getsockname$packet(r0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000d00)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x4, 0x2, 0x0, 0x0, 0x7, 0x8}, {0x12, 0x3, 0x0, 0x401, 0x8001, 0x400}, 0xa5, 0x4, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) socket$packet(0x11, 0x2, 0x300) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x705, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x1, 0xfff1}, {0x10, 0x8}, {0x4, 0x7}}}, 0x24}, 0x1, 0x0, 0x0, 0x4c88b}, 0x0) 895.788304ms ago: executing program 0 (id=15): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000050d45882606f0913a3b412dcda5c5bc2f8a2a6ee0f3a50d33e4803895981d8a431aec8d2efa99af4c0ecac553a84b9d5ceb3c681df7b77839bb0c0843377c275c854e9726cc9c123d333297e2131a33fb3610d7d157066e1681e69fc62b8130282bc0ec02efb69fb47c716f5dfd80e00800000000000aee61dd0144196"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000a80)=ANY=[@ANYBLOB="92b20f0005000000184a0000faffffff00000000000000000196d9", @ANYRES32=r2, @ANYBLOB="67040cf9a2d647b29270fcf781476c8985d27b817e1136aa864b00000000000000000d2bffff100000000c705000f0ffffff185900000000000000000000000000004022060008000000"], &(0x7f0000000680)='GPL\x00', 0x6, 0xb7, &(0x7f00000006c0)=""/183, 0x41100, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0xc, 0x7fffffff, 0x6}, 0x10, 0x2f3b1, r1, 0x2, &(0x7f00000007c0)=[r2, r2, r2, r2, r2, r2, r2], &(0x7f0000000800)=[{0x0, 0x5, 0xf, 0x5}, {0x3, 0x1, 0x0, 0x5}], 0x10, 0x20, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r3}, &(0x7f00000005c0), &(0x7f0000000900)=r4}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000780), 0x4, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x358, 0x25, 0x148, 0x0, 0x60, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0xffffff00, 0x0, 'macvtap0\x00', 'wg1\x00', {}, {}, 0x2, 0x1, 0x10}, 0x0, 0x2f8, 0x358, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x4, [0x1, 0x6, 0x4, 0x4, 0x1, 0x2], 0x6, 0x6}, {0x1, [0x5, 0x3, 0x2, 0x1, 0x1, 0x1], 0x6, 0x5}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x2}}, @common=@unspec=@connlabel={{0x28}, {0x62f, 0x2}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x538) 750.016605ms ago: executing program 2 (id=16): syz_emit_ethernet(0x76, &(0x7f00000004c0)=ANY=[], 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000440)={@local, @random='\x00 \x00\x00\x00\b', @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x2a}, {[@lsrr={0x83, 0x7, 0xd7, [@multicast2]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x9, 0x91aa622106fb7081, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x18, 0x2, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x9}, [@CTA_SEQ_ADJ_ORIG={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x44, r5, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syz_tun\x00'}]}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x70) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x11c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400000069fa0000ff03000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000200000000010000009fabe3b469a608f3f5add4630000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@ifindex, 0x33, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='file_check_and_advance_wb_err\x00', r1, 0x0, 0x5}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB="190000004300000000000000", @ANYRES32, @ANYRES64=r6], 0x20) 729.562936ms ago: executing program 3 (id=18): socket$nl_generic(0x10, 0x3, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000640)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0x20}}}}}}, 0x0) 712.986577ms ago: executing program 3 (id=19): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0xbed}, 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) 683.79541ms ago: executing program 3 (id=20): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r4, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x2e, &(0x7f0000000040)={@random="6ea88d319b8c", @random, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x43, 0x4e24, 0x8}}}}}, 0x0) 676.14972ms ago: executing program 0 (id=21): syz_emit_ethernet(0x7b, &(0x7f0000000d80)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f53a04", 0x45, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x500, {0x0, 0x6, "000100", 0x0, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x2}, @remote, [@hopopts={0x3a}], "df56d55afb0de3af04cfb8847c"}}}}}}}, 0x0) 656.357292ms ago: executing program 3 (id=22): syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000080), 0x10) syz_usb_connect$cdc_ecm(0x6, 0x4d, 0x0, 0x0) sendmsg$can_bcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x48850}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$sndseq(0xffffff9c, &(0x7f00000000c0), 0xc000) timerfd_create(0x1, 0x0) sendmsg$can_bcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r2}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x3, 0x2, 0x0, 0x0, "b68c52d2be3c0d90"}}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x6, 0xfffffe00) bind$inet6(r4, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @empty, 0xc}, 0x1c) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) close_range(r5, 0xffffffffffffffff, 0x0) 644.305513ms ago: executing program 0 (id=23): r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x40000) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000380)="851666ce20db", 0x0, 0x12, 0x39, 0x0, 0x0}) 618.365924ms ago: executing program 2 (id=24): syz_emit_ethernet(0x2a, &(0x7f0000000780)=ANY=[@ANYBLOB="ffffffffffff05009211d49c08004500001c00000000008890780a010101ffffffff110090780000007e66d3f48d06c8a521090f1e2c0ac05a049d66efc9aa8a39ddf2380b63616838fbac65d79c600b9d8a5fa1a582c09da56cd6d315b33ccd1876"], 0x0) quotactl$Q_GETQUOTA(0xffffffff80000702, &(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x10, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="da2261875f58323cf5704ca92bdcc7e39a892ad9ce2e9482b397d74faa777043c79850203e844203a9e244"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0xac, &(0x7f0000000140)=""/172, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) r0 = getpid() r1 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r1, r1}, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010300000000000000000100fffd0900010073797a300000000040000000030a01020000000000000000010000000900030073797a3200000000140004800800024032658aeb08000140000000010900010073797a300000000044000000060a010400000000000001040100000008000b40000000000900010073797a30000000001c000480180001800d00010073796e70726f7879000000000400028014000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r5 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r5, &(0x7f0000000280)={0x10, 0x0, 0x1, 0x2ffffffff}, 0xc) r6 = socket$inet(0x2, 0x2, 0x1) bind$inet(r6, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r6, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb58", 0x6}], 0x2}, 0x0) 613.127995ms ago: executing program 4 (id=25): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r0, &(0x7f0000000280)='7', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) 534.588481ms ago: executing program 1 (id=27): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000f00)=ANY=[@ANYBLOB="0002020100000008ff"], 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000b80)={0x1, {{0xa, 0x3, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x4e22, 0x4, @local, 0x40}}, {{0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fff}}]}, 0x190) add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="ae", 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0xbed}, 0x18) r5 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r5, &(0x7f0000000000)=ANY=[], 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x20, 0x3fa, 0x400, 0x70bd2c, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4004}, 0x24000000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 534.098161ms ago: executing program 4 (id=28): socket$inet6_sctp(0xa, 0x5, 0x84) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) sendto$packet(r4, &(0x7f0000000080)="020000ffffffba000040000086dd", 0xe, 0x0, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="6d6eb1f60783"}, 0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c000000130001000000000000edfc05b2000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) r6 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000080)={'dummy0\x00'}) 495.892064ms ago: executing program 0 (id=29): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x7, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000f00)=ANY=[@ANYBLOB="0002020100000008ff"], 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r4, &(0x7f0000000000)=ANY=[], 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x20, 0x3fa, 0x400, 0x70bd2c, 0x25dfdbfb, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4004}, 0x24000000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 442.962167ms ago: executing program 0 (id=30): r0 = io_uring_setup(0x79bb, &(0x7f0000000400)) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) bind$llc(r1, &(0x7f0000000080), 0x10) listen(r1, 0x0) accept4$llc(r1, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) 425.460079ms ago: executing program 1 (id=31): sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) syz_emit_ethernet(0x7b, &(0x7f0000000d80)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f53a04", 0x45, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x500, {0x0, 0x6, "000100", 0x0, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x2}, @remote, [@hopopts={0x3a}], "df56d55afb0de3af04cfb8847c"}}}}}}}, 0x0) 408.89532ms ago: executing program 1 (id=32): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x10) close(r0) r1 = socket(0x1d, 0x2, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r3, 0x3}, 0x18) sendmmsg$inet(r1, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)="d1", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 385.358492ms ago: executing program 1 (id=33): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x10) close(r0) r1 = socket(0x1d, 0x2, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@can_newroute={0x3c, 0x18, 0x1, 0x0, 0x25dfdbfd, {0x1d, 0x1, 0x2}, [@CGW_DST_IF={0x8, 0xa, r5}, @CGW_SRC_IF={0x8, 0x9, r6}, @CGW_MOD_SET={0x15, 0x4, {{{0x3}, 0x0, 0x3, 0x0, 0x0, "4505a8b9e859abc0"}, 0x1}}]}, 0x3c}}, 0x0) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r3, 0x3}, 0x18) sendmmsg$inet(r1, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)="d1", 0x1}], 0x1}}], 0x1, 0x0) io_setup(0x7f, &(0x7f0000000100)=0x0) io_submit(r7, 0x1, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080)="7f", 0x1}]) 27.128618ms ago: executing program 1 (id=34): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000240), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r4, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x2e, &(0x7f0000000040)={@random="6ea88d319b8c", @random, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x43, 0x4e24, 0x8}}}}}, 0x0) 0s ago: executing program 1 (id=35): r0 = creat(&(0x7f0000000300)='./bus\x00', 0x10) close(r0) r1 = socket(0x1d, 0x2, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r3, 0x3}, 0x18) sendmmsg$inet(r1, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)="d1", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) kernel console output (not intermixed with test programs): [ 22.124639][ T29] audit: type=1400 audit(1739749108.042:81): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.172' (ED25519) to the list of known hosts. [ 26.153246][ T29] audit: type=1400 audit(1739749112.072:82): avc: denied { mounton } for pid=3288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.154222][ T3288] cgroup: Unknown subsys name 'net' [ 26.175997][ T29] audit: type=1400 audit(1739749112.072:83): avc: denied { mount } for pid=3288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.205031][ T29] audit: type=1400 audit(1739749112.102:84): avc: denied { unmount } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.319709][ T3288] cgroup: Unknown subsys name 'cpuset' [ 26.325878][ T3288] cgroup: Unknown subsys name 'rlimit' [ 26.447901][ T29] audit: type=1400 audit(1739749112.362:85): avc: denied { setattr } for pid=3288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.475430][ T29] audit: type=1400 audit(1739749112.372:86): avc: denied { create } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.495975][ T29] audit: type=1400 audit(1739749112.372:87): avc: denied { write } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.516345][ T29] audit: type=1400 audit(1739749112.372:88): avc: denied { read } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.525466][ T3291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.536619][ T29] audit: type=1400 audit(1739749112.392:89): avc: denied { mounton } for pid=3288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.566693][ T3288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.569921][ T29] audit: type=1400 audit(1739749112.392:90): avc: denied { mount } for pid=3288 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.601985][ T29] audit: type=1400 audit(1739749112.462:91): avc: denied { relabelto } for pid=3291 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.755825][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 27.770178][ T3298] chnl_net:caif_netlink_parms(): no params data found [ 27.803838][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 27.846762][ T3299] chnl_net:caif_netlink_parms(): no params data found [ 27.866641][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.873795][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.881064][ T3304] bridge_slave_0: entered allmulticast mode [ 27.887471][ T3304] bridge_slave_0: entered promiscuous mode [ 27.915895][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.923076][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.930267][ T3304] bridge_slave_1: entered allmulticast mode [ 27.936717][ T3304] bridge_slave_1: entered promiscuous mode [ 27.970872][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.977986][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.985252][ T3306] bridge_slave_0: entered allmulticast mode [ 27.991878][ T3306] bridge_slave_0: entered promiscuous mode [ 28.000355][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.007455][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.014588][ T3306] bridge_slave_1: entered allmulticast mode [ 28.021075][ T3306] bridge_slave_1: entered promiscuous mode [ 28.038216][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.045366][ T3298] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.052484][ T3298] bridge_slave_0: entered allmulticast mode [ 28.059078][ T3298] bridge_slave_0: entered promiscuous mode [ 28.065583][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 28.084827][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.099382][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.106451][ T3298] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.113696][ T3298] bridge_slave_1: entered allmulticast mode [ 28.120187][ T3298] bridge_slave_1: entered promiscuous mode [ 28.132442][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.142447][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.166362][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.180677][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.187797][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.195026][ T3299] bridge_slave_0: entered allmulticast mode [ 28.201542][ T3299] bridge_slave_0: entered promiscuous mode [ 28.224520][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.231714][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.239144][ T3299] bridge_slave_1: entered allmulticast mode [ 28.245777][ T3299] bridge_slave_1: entered promiscuous mode [ 28.253545][ T3298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.270276][ T3304] team0: Port device team_slave_0 added [ 28.281773][ T3298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.293575][ T3306] team0: Port device team_slave_0 added [ 28.300585][ T3306] team0: Port device team_slave_1 added [ 28.306868][ T3304] team0: Port device team_slave_1 added [ 28.335864][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.350758][ T3298] team0: Port device team_slave_0 added [ 28.371376][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.380848][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.387871][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.413801][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.425212][ T3298] team0: Port device team_slave_1 added [ 28.435620][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.442760][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.449960][ T3305] bridge_slave_0: entered allmulticast mode [ 28.456271][ T3305] bridge_slave_0: entered promiscuous mode [ 28.462878][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.469936][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.495849][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.507018][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.514040][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.539984][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.555468][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.562472][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.588387][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.606376][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.613504][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.620823][ T3305] bridge_slave_1: entered allmulticast mode [ 28.627292][ T3305] bridge_slave_1: entered promiscuous mode [ 28.641923][ T3299] team0: Port device team_slave_0 added [ 28.648387][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.655353][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.681268][ T3298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.698081][ T3299] team0: Port device team_slave_1 added [ 28.714897][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.722033][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.748011][ T3298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.768028][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.782155][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.789203][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.815152][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.826387][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.833377][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.859334][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.883168][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.905952][ T3304] hsr_slave_0: entered promiscuous mode [ 28.912106][ T3304] hsr_slave_1: entered promiscuous mode [ 28.930473][ T3306] hsr_slave_0: entered promiscuous mode [ 28.936459][ T3306] hsr_slave_1: entered promiscuous mode [ 28.942328][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.949897][ T3306] Cannot create hsr debugfs directory [ 28.972445][ T3305] team0: Port device team_slave_0 added [ 28.995789][ T3299] hsr_slave_0: entered promiscuous mode [ 29.001906][ T3299] hsr_slave_1: entered promiscuous mode [ 29.007648][ T3299] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.015438][ T3299] Cannot create hsr debugfs directory [ 29.022948][ T3298] hsr_slave_0: entered promiscuous mode [ 29.028840][ T3298] hsr_slave_1: entered promiscuous mode [ 29.034783][ T3298] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.042385][ T3298] Cannot create hsr debugfs directory [ 29.048462][ T3305] team0: Port device team_slave_1 added [ 29.063984][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.070997][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.097014][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.108258][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.115254][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.141313][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.236723][ T3305] hsr_slave_0: entered promiscuous mode [ 29.242748][ T3305] hsr_slave_1: entered promiscuous mode [ 29.248615][ T3305] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.256228][ T3305] Cannot create hsr debugfs directory [ 29.364520][ T3306] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.383835][ T3306] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.394525][ T3306] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.410338][ T3306] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.429210][ T3299] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.437996][ T3299] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.449984][ T3299] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.462254][ T3299] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.489609][ T3304] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.505513][ T3304] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.515235][ T3304] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.524599][ T3304] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.555880][ T3298] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.565804][ T3298] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.574863][ T3298] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.587592][ T3298] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.609907][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.638078][ T3305] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.654186][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.661586][ T3305] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.671188][ T3305] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.685529][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.692632][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.700973][ T3305] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.717397][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.724474][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.742263][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.759807][ T3306] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.770359][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.804763][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.820264][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.830773][ T478] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.837864][ T478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.846287][ T478] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.853526][ T478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.875017][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.906972][ T3298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.917089][ T1737] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.924257][ T1737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.936078][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.946094][ T478] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.953226][ T478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.966411][ T3298] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.984733][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.991954][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.017183][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.024273][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.052177][ T3298] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.062649][ T3298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.091424][ T3304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.115041][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.142096][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.154176][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.178690][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.185804][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.210857][ T3306] veth0_vlan: entered promiscuous mode [ 30.217406][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.224508][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.238257][ T3298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.247885][ T3306] veth1_vlan: entered promiscuous mode [ 30.268142][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.290839][ T3306] veth0_macvtap: entered promiscuous mode [ 30.305120][ T3306] veth1_macvtap: entered promiscuous mode [ 30.317476][ T3299] veth0_vlan: entered promiscuous mode [ 30.342453][ T3299] veth1_vlan: entered promiscuous mode [ 30.355519][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.373112][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.390869][ T3306] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.399804][ T3306] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.408511][ T3306] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.417355][ T3306] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.448741][ T3299] veth0_macvtap: entered promiscuous mode [ 30.465237][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.478972][ T3299] veth1_macvtap: entered promiscuous mode [ 30.496330][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.506969][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.525723][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.535978][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.546600][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.557126][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.558487][ T3306] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.572773][ T3304] veth0_vlan: entered promiscuous mode [ 30.593277][ T3299] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.602040][ T3299] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.610862][ T3299] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.619619][ T3299] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.647047][ T3298] veth0_vlan: entered promiscuous mode [ 30.655306][ T3298] veth1_vlan: entered promiscuous mode [ 30.666027][ T3304] veth1_vlan: entered promiscuous mode [ 30.673194][ T3431] Zero length message leads to an empty skb [ 30.705756][ T3298] veth0_macvtap: entered promiscuous mode [ 30.715861][ T3304] veth0_macvtap: entered promiscuous mode [ 30.723490][ T3298] veth1_macvtap: entered promiscuous mode [ 30.756666][ T3304] veth1_macvtap: entered promiscuous mode [ 30.764557][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.775076][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.784977][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.795589][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.834046][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.843646][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.854164][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.864039][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.874544][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.884998][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.916066][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.926652][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.936501][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.946954][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.956862][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.967375][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.007840][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.017536][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.028062][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.037900][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.048345][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.058216][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.068734][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.082961][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.093388][ T3304] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.102228][ T3304] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.111002][ T3304] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.119733][ T3304] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.156661][ T3305] veth0_vlan: entered promiscuous mode [ 31.166127][ T3305] veth1_vlan: entered promiscuous mode [ 31.176222][ T3298] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.185066][ T3298] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.193853][ T3298] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.202685][ T3298] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.252721][ T3305] veth0_macvtap: entered promiscuous mode [ 31.271226][ T3305] veth1_macvtap: entered promiscuous mode [ 31.286186][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 31.286203][ T29] audit: type=1400 audit(1739749117.192:131): avc: denied { create } for pid=3443 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 31.312687][ T29] audit: type=1400 audit(1739749117.202:132): avc: denied { write } for pid=3443 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 31.337156][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.347664][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.357573][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.368239][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.371871][ T3448] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7'. [ 31.378220][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.397161][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.407074][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.417518][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.428129][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.436818][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.447370][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.457266][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.467974][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.477894][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.486789][ T29] audit: type=1400 audit(1739749117.402:133): avc: denied { write } for pid=3450 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 31.488379][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.516975][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.527451][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.538170][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.559937][ T3449] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 31.587617][ T3305] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.597174][ T3305] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.605983][ T3305] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.614857][ T3305] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.644796][ T3458] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9'. [ 31.657592][ T3458] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 31.719405][ T29] audit: type=1400 audit(1739749117.632:134): avc: denied { create } for pid=3461 comm="syz.3.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.818335][ T29] audit: type=1400 audit(1739749117.702:135): avc: denied { setopt } for pid=3461 comm="syz.3.10" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.838690][ T29] audit: type=1400 audit(1739749117.702:136): avc: denied { create } for pid=3461 comm="syz.3.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 31.858163][ T29] audit: type=1400 audit(1739749117.702:137): avc: denied { read } for pid=3461 comm="syz.3.10" dev="sockfs" ino=4430 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 31.879393][ T29] audit: type=1400 audit(1739749117.702:138): avc: denied { connect } for pid=3461 comm="syz.3.10" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.899679][ T29] audit: type=1400 audit(1739749117.702:139): avc: denied { write } for pid=3461 comm="syz.3.10" path="socket:[4426]" dev="sockfs" ino=4426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.922970][ T29] audit: type=1326 audit(1739749117.702:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3467 comm="syz.0.12" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3760d1cde9 code=0x7ffc0000 [ 31.964446][ T3466] syz.1.11 (3466) used greatest stack depth: 10344 bytes left [ 32.035633][ T3465] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3'. [ 32.066832][ T3474] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14'. [ 32.090678][ T3474] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 32.130355][ T3455] Set syz1 is full, maxelem 65536 reached [ 32.136169][ T3476] Cannot find add_set index 4 as target [ 32.325578][ T3493] netlink: 4 bytes leftover after parsing attributes in process `syz.3.22'. [ 32.463831][ T3510] netlink: 20 bytes leftover after parsing attributes in process `syz.4.28'. [ 33.004080][ C0] ================================================================== [ 33.012222][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 33.019467][ C0] [ 33.021806][ C0] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 1: [ 33.029884][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 33.034591][ C0] can_rcv_filter+0xbf/0x4c0 [ 33.039206][ C0] can_receive+0x182/0x1f0 [ 33.043656][ C0] can_rcv+0xe7/0x180 [ 33.047662][ C0] __netif_receive_skb+0x123/0x280 [ 33.052802][ C0] process_backlog+0x22e/0x440 [ 33.057595][ C0] __napi_poll+0x63/0x3c0 [ 33.061947][ C0] net_rx_action+0x3a1/0x7f0 [ 33.066568][ C0] handle_softirqs+0xbf/0x280 [ 33.071271][ C0] run_ksoftirqd+0x1c/0x30 [ 33.075714][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 33.080678][ C0] kthread+0x4ae/0x520 [ 33.084782][ C0] ret_from_fork+0x4b/0x60 [ 33.089236][ C0] ret_from_fork_asm+0x1a/0x30 [ 33.094030][ C0] [ 33.096361][ C0] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 0: [ 33.104441][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 33.109155][ C0] can_rcv_filter+0xbf/0x4c0 [ 33.113764][ C0] can_receive+0x182/0x1f0 [ 33.118192][ C0] can_rcv+0xe7/0x180 [ 33.122189][ C0] __netif_receive_skb+0x123/0x280 [ 33.127331][ C0] process_backlog+0x22e/0x440 [ 33.132122][ C0] __napi_poll+0x63/0x3c0 [ 33.136475][ C0] net_rx_action+0x3a1/0x7f0 [ 33.141099][ C0] handle_softirqs+0xbf/0x280 [ 33.145797][ C0] do_softirq+0x5e/0x90 [ 33.149974][ C0] __local_bh_enable_ip+0x6e/0x70 [ 33.155019][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 33.159990][ C0] nsim_fib_event_work+0x10e/0x2280 [ 33.165223][ C0] process_scheduled_works+0x4db/0xa20 [ 33.170713][ C0] worker_thread+0x51d/0x6f0 [ 33.175348][ C0] kthread+0x4ae/0x520 [ 33.179460][ C0] ret_from_fork+0x4b/0x60 [ 33.183900][ C0] ret_from_fork_asm+0x1a/0x30 [ 33.188691][ C0] [ 33.191025][ C0] value changed: 0x00006239 -> 0x0000623a [ 33.196751][ C0] [ 33.199081][ C0] Reported by Kernel Concurrency Sanitizer on: [ 33.205259][ C0] CPU: 0 UID: 0 PID: 3374 Comm: kworker/0:4 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 33.216036][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 33.226105][ C0] Workqueue: events nsim_fib_event_work [ 33.231687][ C0] ================================================================== [ 36.014094][ C1] ================================================================== [ 36.022227][ C1] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 36.029483][ C1] [ 36.031812][ C1] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 0: [ 36.039890][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 36.044597][ C1] can_rcv_filter+0xbf/0x4c0 [ 36.049207][ C1] can_receive+0x182/0x1f0 [ 36.053638][ C1] can_rcv+0xe7/0x180 [ 36.057635][ C1] __netif_receive_skb+0x123/0x280 [ 36.062794][ C1] process_backlog+0x22e/0x440 [ 36.067579][ C1] __napi_poll+0x63/0x3c0 [ 36.071930][ C1] net_rx_action+0x3a1/0x7f0 [ 36.076555][ C1] handle_softirqs+0xbf/0x280 [ 36.081258][ C1] do_softirq+0x5e/0x90 [ 36.085434][ C1] __local_bh_enable_ip+0x6e/0x70 [ 36.090483][ C1] wg_timers_any_authenticated_packet_traversal+0xe5/0x110 [ 36.097709][ C1] wg_packet_tx_worker+0xe9/0x360 [ 36.102759][ C1] process_scheduled_works+0x4db/0xa20 [ 36.108247][ C1] worker_thread+0x51d/0x6f0 [ 36.112872][ C1] kthread+0x4ae/0x520 [ 36.116976][ C1] ret_from_fork+0x4b/0x60 [ 36.121423][ C1] ret_from_fork_asm+0x1a/0x30 [ 36.126217][ C1] [ 36.128544][ C1] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 1: [ 36.136620][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 36.141327][ C1] can_rcv_filter+0xbf/0x4c0 [ 36.145936][ C1] can_receive+0x182/0x1f0 [ 36.150366][ C1] can_rcv+0xe7/0x180 [ 36.154363][ C1] __netif_receive_skb+0x123/0x280 [ 36.159507][ C1] process_backlog+0x22e/0x440 [ 36.164302][ C1] __napi_poll+0x63/0x3c0 [ 36.168674][ C1] net_rx_action+0x3a1/0x7f0 [ 36.173299][ C1] handle_softirqs+0xbf/0x280 [ 36.178007][ C1] do_softirq+0x5e/0x90 [ 36.182212][ C1] __local_bh_enable_ip+0x6e/0x70 [ 36.187266][ C1] xt_replace_table+0x261/0x460 [ 36.192147][ C1] __do_replace+0xcc/0x570 [ 36.196583][ C1] do_ipt_set_ctl+0x811/0x8b0 [ 36.201271][ C1] nf_setsockopt+0x195/0x1b0 [ 36.205893][ C1] ip_setsockopt+0xea/0x100 [ 36.210431][ C1] tcp_setsockopt+0x93/0xb0 [ 36.214963][ C1] sock_common_setsockopt+0x64/0x80 [ 36.220212][ C1] __sys_setsockopt+0x187/0x200 [ 36.225075][ C1] __x64_sys_setsockopt+0x66/0x80 [ 36.230116][ C1] x64_sys_call+0x282e/0x2dc0 [ 36.234822][ C1] do_syscall_64+0xc9/0x1c0 [ 36.239349][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.245273][ C1] [ 36.247602][ C1] value changed: 0x0006232e -> 0x0006232f [ 36.253325][ C1] [ 36.255653][ C1] Reported by Kernel Concurrency Sanitizer on: [ 36.261809][ C1] CPU: 1 UID: 0 PID: 3306 Comm: syz-executor Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 36.272761][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 36.282916][ C1] ================================================================== [ 39.039378][ C1] ================================================================== [ 39.047518][ C1] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 39.054763][ C1] [ 39.057097][ C1] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 0: [ 39.065174][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 39.069879][ C1] can_rcv_filter+0xbf/0x4c0 [ 39.074483][ C1] can_receive+0x182/0x1f0 [ 39.078913][ C1] can_rcv+0xe7/0x180 [ 39.082914][ C1] __netif_receive_skb+0x123/0x280 [ 39.088049][ C1] process_backlog+0x22e/0x440 [ 39.092842][ C1] __napi_poll+0x63/0x3c0 [ 39.097192][ C1] net_rx_action+0x3a1/0x7f0 [ 39.101807][ C1] handle_softirqs+0xbf/0x280 [ 39.106504][ C1] do_softirq+0x5e/0x90 [ 39.110678][ C1] __local_bh_enable_ip+0x6e/0x70 [ 39.115725][ C1] wg_timers_any_authenticated_packet_traversal+0xe5/0x110 [ 39.122949][ C1] wg_packet_tx_worker+0xe9/0x360 [ 39.128005][ C1] process_scheduled_works+0x4db/0xa20 [ 39.133482][ C1] worker_thread+0x51d/0x6f0 [ 39.138088][ C1] kthread+0x4ae/0x520 [ 39.142178][ C1] ret_from_fork+0x4b/0x60 [ 39.146625][ C1] ret_from_fork_asm+0x1a/0x30 [ 39.151418][ C1] [ 39.153748][ C1] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 1: [ 39.161820][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 39.166525][ C1] can_rcv_filter+0xbf/0x4c0 [ 39.171132][ C1] can_receive+0x182/0x1f0 [ 39.175565][ C1] can_rcv+0xe7/0x180 [ 39.179565][ C1] __netif_receive_skb+0x123/0x280 [ 39.184715][ C1] process_backlog+0x22e/0x440 [ 39.189529][ C1] __napi_poll+0x63/0x3c0 [ 39.193882][ C1] net_rx_action+0x3a1/0x7f0 [ 39.198503][ C1] handle_softirqs+0xbf/0x280 [ 39.203213][ C1] run_ksoftirqd+0x1c/0x30 [ 39.207659][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 39.212622][ C1] kthread+0x4ae/0x520 [ 39.216717][ C1] ret_from_fork+0x4b/0x60 [ 39.221159][ C1] ret_from_fork_asm+0x1a/0x30 [ 39.225952][ C1] [ 39.228285][ C1] value changed: 0x000c24e5 -> 0x000c24e6 [ 39.234018][ C1] [ 39.236352][ C1] Reported by Kernel Concurrency Sanitizer on: [ 39.242510][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 39.253115][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 39.263185][ C1] ================================================================== [ 42.067711][ C1] ================================================================== [ 42.075851][ C1] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 42.083094][ C1] [ 42.085423][ C1] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 0: [ 42.093505][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 42.098214][ C1] can_rcv_filter+0xbf/0x4c0 [ 42.102821][ C1] can_receive+0x182/0x1f0 [ 42.107249][ C1] can_rcv+0xe7/0x180 [ 42.111242][ C1] __netif_receive_skb+0x123/0x280 [ 42.116372][ C1] process_backlog+0x22e/0x440 [ 42.121162][ C1] __napi_poll+0x63/0x3c0 [ 42.125511][ C1] net_rx_action+0x3a1/0x7f0 [ 42.130122][ C1] handle_softirqs+0xbf/0x280 [ 42.134811][ C1] run_ksoftirqd+0x1c/0x30 [ 42.139254][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 42.144211][ C1] kthread+0x4ae/0x520 [ 42.148299][ C1] ret_from_fork+0x4b/0x60 [ 42.152736][ C1] ret_from_fork_asm+0x1a/0x30 [ 42.157523][ C1] [ 42.159855][ C1] read-write to 0xffff888119a70020 of 4 bytes by interrupt on cpu 1: [ 42.167930][ C1] can_can_gw_rcv+0x7cb/0x7e0 [ 42.172631][ C1] can_rcv_filter+0xbf/0x4c0 [ 42.177240][ C1] can_receive+0x182/0x1f0 [ 42.181672][ C1] can_rcv+0xe7/0x180 [ 42.185673][ C1] __netif_receive_skb+0x123/0x280 [ 42.190816][ C1] process_backlog+0x22e/0x440 [ 42.195609][ C1] __napi_poll+0x63/0x3c0 [ 42.199961][ C1] net_rx_action+0x3a1/0x7f0 [ 42.204595][ C1] handle_softirqs+0xbf/0x280 [ 42.209299][ C1] do_softirq+0x5e/0x90 [ 42.213485][ C1] __local_bh_enable_ip+0x6e/0x70 [ 42.218529][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 42.223500][ C1] nsim_dev_trap_report_work+0x522/0x620 [ 42.229151][ C1] process_scheduled_works+0x4db/0xa20 [ 42.234632][ C1] worker_thread+0x51d/0x6f0 [ 42.239242][ C1] kthread+0x4ae/0x520 [ 42.243341][ C1] ret_from_fork+0x4b/0x60 [ 42.247780][ C1] ret_from_fork_asm+0x1a/0x30 [ 42.252577][ C1] [ 42.254911][ C1] value changed: 0x0012473a -> 0x0012473b [ 42.260633][ C1] [ 42.262965][ C1] Reported by Kernel Concurrency Sanitizer on: [ 42.269121][ C1] CPU: 1 UID: 0 PID: 1737 Comm: kworker/u8:6 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 [ 42.279987][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 42.290060][ C1] Workqueue: events_unbound nsim_dev_trap_report_work [ 42.296847][ C1] ==================================================================