last executing test programs: 1.435997498s ago: executing program 0 (id=1): syz_open_pts(0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xe, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x10, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x5, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unshare(0x8000000) semget$private(0x0, 0x4000, 0x555) semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) unshare(0x2c000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) clock_nanosleep(0x8, 0x0, 0x0, 0x0) io_uring_setup(0x59d, &(0x7f00000000c0)={0x0, 0xfb4c}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000011000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="000000000000000014001a80100004800c000280"], 0x34}}, 0x0) inotify_init() 787.464699ms ago: executing program 3 (id=4): removexattr(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002680)=@newqdisc={0x138, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x6}}, [@TCA_STAB={0x114, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x0, 0x5, 0x2000000, 0x2, 0x46, 0x5, 0x1}}, {0x6, 0x2, [0x7]}}, {{0x1c, 0x1, {0x96, 0x6, 0x200, 0x10, 0x2, 0xb, 0x8000, 0x4}}, {0xc, 0x2, [0x7d, 0x800, 0x5, 0x8]}}, {{0x1c, 0x1, {0xa8, 0x9, 0x7, 0x2, 0x2, 0x0, 0x8, 0x3}}, {0xa, 0x2, [0x1, 0x4, 0xcd4]}}, {{0x1c, 0x1, {0x0, 0x71, 0x8, 0x9, 0x2, 0x5, 0x4, 0x6}}, {0x10, 0x2, [0x9, 0x7, 0x2, 0x3, 0xb2a, 0x200]}}, {{0x1c, 0x1, {0x4, 0x5, 0x7, 0x3, 0x0, 0x40, 0xeec0, 0x1}}, {0x6, 0x2, [0x4]}}, {{0x1c, 0x1, {0x7, 0xf, 0xfff7, 0xfffff08d, 0x0, 0xedde, 0x4, 0x3}}, {0xa, 0x2, [0x1000, 0x7, 0x400]}}, {{0x1c, 0x1, {0xfe, 0xe, 0x87, 0x4, 0x0, 0xd, 0x28, 0x1}}, {0x6, 0x2, [0xb]}}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x2}, 0x2000400c) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) r4 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x141341) syz_emit_ethernet(0x76, &(0x7f00000027c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60e400ff00403a00fe800000000000000000000000000037fe8000000000000000000000000000aa01059078027ee89fb6ca43d14001330100000000000000000000000000000001fe80fffd0000000000030000000000000000040001300200f1a96e3d0ef083d7cc507906f2873f1924c9ba2510849dbda60edde59d4c1e5dc069b76146fba8c27cdc3d1b4d5abdaabe59627cdaaa50a710aafe3844c3985c10f638140b8fcdd8f369f5386ed55a60e00ecb45de47c4f0f2e2118ff32d83404e9362463cc13a75809372c24b6506b7c7f79bb397b9bc018d52f9cc429562657ec0d213"], 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43fffffc, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000060a0b0400000000000000000200005e1800048014000180090001006d61737100000000040002800900010073797a30000000000900020073797a32"], 0x6c}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x2f9, 0xffffca88, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632f77fb7f0200017f020001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007800000080000000800000005"], 0x48) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r3}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmmsg$inet(r0, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002640)="ef0ba6e0d60508dbbb", 0x9}], 0x1}}], 0x1, 0x20000010) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/189}, {&(0x7f00000002c0)=""/182}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/198}, {&(0x7f0000001480)=""/169}, {&(0x7f0000001540)=""/4096}], 0x10, &(0x7f0000002540)=""/216}}], 0x2, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000180)='sys_enter\x00', r10}, 0x10) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb80, &(0x7f0000000c40)="$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") 710.142204ms ago: executing program 2 (id=3): sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400000bb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) close(r2) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0xc) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r5 = accept(r3, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$unix(r5, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') syz_usb_connect(0x6, 0x36, &(0x7f00000005c0)=ANY=[], 0x0) close_range(r6, 0xffffffffffffffff, 0x0) quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f00000002c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)={0xe, 0x0, 0x0, 0xb4, 0xffffffff7fffffff, 0x20042, 0x0, 0xfffffffffffffffd, 0x64e7}) 496.184858ms ago: executing program 0 (id=6): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x1000}, 0x1320, 0xffffffff, 0x20000, 0x7, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r4, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r7, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r7], 0x40}, 0x1, 0x0, 0x0, 0x4014}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x36, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYRESDEC=r7, @ANYRES32=r0, @ANYRES16=r4], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x844) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x19, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) socket(0x15, 0xa, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) r10 = open(&(0x7f0000000000)='./bus\x00', 0x40, 0x0) fgetxattr(r10, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r12}, 0x10) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) chmod(&(0x7f0000000200)='./file0\x00', 0x8) sendmsg$NFT_BATCH(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x25}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}], {0x14, 0x10}}, 0xa4}, 0x1, 0x0, 0x0, 0x20040880}, 0x4) ioctl$HIDIOCGDEVINFO(r13, 0x801c4803, &(0x7f0000000280)=""/220) 356.284517ms ago: executing program 1 (id=2): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x7e, &(0x7f0000000300)={@random="2f5b02cb75db", @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "008100", 0x48, 0x11, 0x0, @remote, @mcast2, {[], {0x4e20, 0xe22, 0x48, 0x0, @wg=@cookie={0x3, 0x2, "881c00fbbb43f09c700000000000008000", "e13808ca72381f41e5fff9620915b6f78670dfaf9a2038083179cf6b7931c9b4"}}}}}}}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) 318.642829ms ago: executing program 3 (id=7): capset(&(0x7f0000000180)={0x20080522}, &(0x7f0000000240)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8a00fe00000000bfa200000000000007020000f8ffffffb703000008000000b704000002ec00008500000082000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 306.61589ms ago: executing program 1 (id=8): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r0) sendmsg$NFC_CMD_LLC_SET_PARAMS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_LLC_PARAM_RW={0x5, 0x10, 0x6b}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000d0}, 0x44080) 251.827384ms ago: executing program 3 (id=9): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r0) sendmsg$NFC_CMD_LLC_SET_PARAMS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000d0}, 0x44080) 204.979197ms ago: executing program 1 (id=10): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, @void, @value}, 0xa0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='module_request\x00', r0, 0x0, 0x7fff}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000240)=ANY=[@ANYRESHEX=r1], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x5, &(0x7f0000000140)=0x2, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000980), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000a80)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x1c, 0x2, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5}}}, 0xa0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_es_remove_extent\x00', r2, 0x0, 0x8}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x21081e, &(0x7f00000001c0), 0x1, 0x504, &(0x7f0000000ac0)="$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") 195.798617ms ago: executing program 3 (id=11): r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000100)=@id={0x1e, 0x3, 0x2, {0x4e22}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x14ba82, 0x18) write$cgroup_int(r5, &(0x7f0000000000)=0xfe8e, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1a08403, &(0x7f0000000940), 0x2, 0x5c9, &(0x7f0000001000)="$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") r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCDELRT(r7, 0x890c, &(0x7f0000000300)={0x0, @llc={0x1a, 0x30b, 0x10, 0x6, 0x1, 0x4, @local}, @l2={0x1f, 0x965d, @any, 0x200, 0x2}, @ethernet={0x306, @broadcast}, 0x8, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)='caif0\x00', 0x6348, 0x6, 0x9}) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff00000000"]}, 0x108) sendmsg$NFULNL_MSG_CONFIG(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000008}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000001040103000000000000000002002d0a0000000000004000"], 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x400c081) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r9, 0x402, 0x4) fcntl$notify(r3, 0x402, 0x18) socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x0, 0x3}, 0x10) socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x6, 0x20}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f0000000340)={r10, 0x80, 0x7, 0x5, 0x2, 0x7}, 0x14) 189.780567ms ago: executing program 4 (id=5): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0xfffd, 0x0, 0x11, 0x0, @empty, @rand_addr=0x64010101}, {0x0, 0x4e20, 0x18, 0x0, @wg=@data={0x4, 0xe, 0xc}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0x1, 0x0, &(0x7f0000000000)="fa", 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) capset(&(0x7f0000000340)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x20000000}) setrlimit(0x40000000000008, &(0x7f0000000380)) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r6, 0x1, 0x3c, &(0x7f00000003c0)={0x200000000000001}, 0x8) sendto$inet6(r6, 0x0, 0x0, 0x4c881, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="01", 0x1}], 0x1}}], 0x1, 0x400c404) 63.640506ms ago: executing program 4 (id=12): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x2, &(0x7f0000000140)=[{0x2}, {0x16, 0x0, 0x3, 0x3}]}) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000040)=r1) 29.256128ms ago: executing program 3 (id=13): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000240)={[{@nogrpid}, {@resuid}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@jqfmt_vfsold}, {@nombcache}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) 0s ago: executing program 1 (id=14): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x34, r0, 0x1, 0x70bd62, 0x25dfdbfb, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c090}, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r4 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000300)={'vxcan1\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r6, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r6, &(0x7f0000000200)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f9"], 0x20000600}}, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r8, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f086dd6fe7f9c7", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) sendmsg$can_bcm(r6, &(0x7f0000000080)={&(0x7f0000000340)={0x1d, r3, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[], 0x4640}, 0x2}, 0x0) r9 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r9, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @remote, 0x9}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0x4e, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 21.875101][ T29] audit: type=1400 audit(1740457487.089:81): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.100' (ED25519) to the list of known hosts. [ 27.151762][ T29] audit: type=1400 audit(1740457492.369:82): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.152769][ T3285] cgroup: Unknown subsys name 'net' [ 27.174496][ T29] audit: type=1400 audit(1740457492.369:83): avc: denied { mount } for pid=3285 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.202013][ T29] audit: type=1400 audit(1740457492.389:84): avc: denied { unmount } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.361610][ T3285] cgroup: Unknown subsys name 'cpuset' [ 27.367800][ T3285] cgroup: Unknown subsys name 'rlimit' [ 27.558789][ T29] audit: type=1400 audit(1740457492.769:85): avc: denied { setattr } for pid=3285 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.582078][ T29] audit: type=1400 audit(1740457492.769:86): avc: denied { create } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.602750][ T29] audit: type=1400 audit(1740457492.769:87): avc: denied { write } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.610408][ T3290] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.623095][ T29] audit: type=1400 audit(1740457492.769:88): avc: denied { read } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.651920][ T29] audit: type=1400 audit(1740457492.779:89): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.676793][ T29] audit: type=1400 audit(1740457492.779:90): avc: denied { mount } for pid=3285 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.700065][ T29] audit: type=1400 audit(1740457492.849:91): avc: denied { relabelto } for pid=3290 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.730098][ T3285] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.873565][ T3299] chnl_net:caif_netlink_parms(): no params data found [ 28.913750][ T3297] chnl_net:caif_netlink_parms(): no params data found [ 28.940102][ T3298] chnl_net:caif_netlink_parms(): no params data found [ 28.982596][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.989673][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.996861][ T3299] bridge_slave_0: entered allmulticast mode [ 29.003227][ T3299] bridge_slave_0: entered promiscuous mode [ 29.011801][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.018884][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.026055][ T3299] bridge_slave_1: entered allmulticast mode [ 29.032450][ T3299] bridge_slave_1: entered promiscuous mode [ 29.044992][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 29.080296][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.107715][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.124248][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.131342][ T3298] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.138458][ T3298] bridge_slave_0: entered allmulticast mode [ 29.145277][ T3298] bridge_slave_0: entered promiscuous mode [ 29.166530][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.173710][ T3298] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.181092][ T3298] bridge_slave_1: entered allmulticast mode [ 29.187725][ T3298] bridge_slave_1: entered promiscuous mode [ 29.198856][ T3297] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.206031][ T3297] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.213329][ T3297] bridge_slave_0: entered allmulticast mode [ 29.219644][ T3297] bridge_slave_0: entered promiscuous mode [ 29.230477][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 29.248681][ T3297] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.255784][ T3297] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.263178][ T3297] bridge_slave_1: entered allmulticast mode [ 29.269856][ T3297] bridge_slave_1: entered promiscuous mode [ 29.276821][ T3299] team0: Port device team_slave_0 added [ 29.283482][ T3299] team0: Port device team_slave_1 added [ 29.298048][ T3298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.308500][ T3298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.329439][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.336684][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.344000][ T3304] bridge_slave_0: entered allmulticast mode [ 29.350480][ T3304] bridge_slave_0: entered promiscuous mode [ 29.376157][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.383308][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.390556][ T3304] bridge_slave_1: entered allmulticast mode [ 29.397006][ T3304] bridge_slave_1: entered promiscuous mode [ 29.408735][ T3297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.422274][ T3297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.431678][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.438631][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.464572][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.480628][ T3298] team0: Port device team_slave_0 added [ 29.489264][ T3298] team0: Port device team_slave_1 added [ 29.504391][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.511371][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.537602][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.565267][ T3297] team0: Port device team_slave_0 added [ 29.571750][ T3297] team0: Port device team_slave_1 added [ 29.586213][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.604812][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.611959][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.637993][ T3298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.649782][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.656830][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.682895][ T3298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.694785][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.708788][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.715825][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.741737][ T3297] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.769562][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.776547][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.802553][ T3297] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.813584][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.820641][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.827931][ T3310] bridge_slave_0: entered allmulticast mode [ 29.834394][ T3310] bridge_slave_0: entered promiscuous mode [ 29.847368][ T3304] team0: Port device team_slave_0 added [ 29.856088][ T3304] team0: Port device team_slave_1 added [ 29.861979][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.869074][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.876640][ T3310] bridge_slave_1: entered allmulticast mode [ 29.883124][ T3310] bridge_slave_1: entered promiscuous mode [ 29.897044][ T3299] hsr_slave_0: entered promiscuous mode [ 29.903038][ T3299] hsr_slave_1: entered promiscuous mode [ 29.953027][ T3297] hsr_slave_0: entered promiscuous mode [ 29.959252][ T3297] hsr_slave_1: entered promiscuous mode [ 29.967030][ T3297] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.974727][ T3297] Cannot create hsr debugfs directory [ 29.980561][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.987590][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.013600][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.030023][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.053695][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.060671][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.086622][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.099371][ T3298] hsr_slave_0: entered promiscuous mode [ 30.105504][ T3298] hsr_slave_1: entered promiscuous mode [ 30.111322][ T3298] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.118869][ T3298] Cannot create hsr debugfs directory [ 30.125818][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.174812][ T3310] team0: Port device team_slave_0 added [ 30.198010][ T3310] team0: Port device team_slave_1 added [ 30.211679][ T3304] hsr_slave_0: entered promiscuous mode [ 30.217754][ T3304] hsr_slave_1: entered promiscuous mode [ 30.223561][ T3304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.231161][ T3304] Cannot create hsr debugfs directory [ 30.267133][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.274157][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.300307][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.324995][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.332012][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.358043][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.439502][ T3299] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.461598][ T3310] hsr_slave_0: entered promiscuous mode [ 30.467627][ T3310] hsr_slave_1: entered promiscuous mode [ 30.473710][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.481386][ T3310] Cannot create hsr debugfs directory [ 30.486993][ T3299] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.497699][ T3299] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.506737][ T3299] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.540136][ T3297] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.553668][ T3297] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.571011][ T3297] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.591579][ T3297] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.623491][ T3304] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.632667][ T3304] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.642591][ T3304] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.652947][ T3304] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.690304][ T3298] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.699677][ T3298] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.717324][ T3298] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.726904][ T3298] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.764049][ T3310] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.778025][ T3310] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.788032][ T3310] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.796687][ T3310] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.811755][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.824196][ T3297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.840074][ T3297] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.853702][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.869820][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.876926][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.885921][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.892995][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.901844][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.909393][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.939765][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.946860][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.989862][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.007641][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.028162][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.035291][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.052619][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.072954][ T3298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.082678][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.089831][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.107694][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.126221][ T3298] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.142494][ T3297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.153939][ T3304] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.164364][ T3304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.177666][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.184753][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.200524][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.207679][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.216427][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.223607][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.243260][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.257272][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.264394][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.328864][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.347925][ T3298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.405510][ T3297] veth0_vlan: entered promiscuous mode [ 31.423187][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.443610][ T3297] veth1_vlan: entered promiscuous mode [ 31.458313][ T3299] veth0_vlan: entered promiscuous mode [ 31.474378][ T3298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.485278][ T3297] veth0_macvtap: entered promiscuous mode [ 31.497449][ T3299] veth1_vlan: entered promiscuous mode [ 31.513366][ T3297] veth1_macvtap: entered promiscuous mode [ 31.539184][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.560059][ T3299] veth0_macvtap: entered promiscuous mode [ 31.579315][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.592669][ T3304] veth0_vlan: entered promiscuous mode [ 31.601165][ T3297] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.609981][ T3297] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.618861][ T3297] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.627636][ T3297] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.641442][ T3299] veth1_macvtap: entered promiscuous mode [ 31.653428][ T3310] veth0_vlan: entered promiscuous mode [ 31.662903][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.673514][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.684126][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.694131][ T3310] veth1_vlan: entered promiscuous mode [ 31.700694][ T3304] veth1_vlan: entered promiscuous mode [ 31.717757][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.728274][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.739092][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.755628][ T3299] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.764461][ T3299] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.773346][ T3299] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.782085][ T3299] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.804818][ T3297] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.810240][ T3310] veth0_macvtap: entered promiscuous mode [ 31.834508][ T3310] veth1_macvtap: entered promiscuous mode [ 31.863534][ T3304] veth0_macvtap: entered promiscuous mode [ 31.871229][ T3304] veth1_macvtap: entered promiscuous mode [ 31.881757][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.892243][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.902156][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.912759][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.923774][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.939820][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.950387][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.960287][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.970829][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.981629][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.995783][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.006321][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.016235][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.026809][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.036713][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.047181][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.058419][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.067238][ T3304] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.076024][ T3304] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.084856][ T3304] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.093647][ T3304] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.156364][ T3298] veth0_vlan: entered promiscuous mode [ 32.202820][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 32.202855][ T29] audit: type=1400 audit(1740457497.379:123): avc: denied { prog_load } for pid=3434 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.227678][ T29] audit: type=1400 audit(1740457497.379:124): avc: denied { bpf } for pid=3434 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.247880][ T29] audit: type=1400 audit(1740457497.379:125): avc: denied { perfmon } for pid=3434 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.268515][ T29] audit: type=1400 audit(1740457497.379:126): avc: denied { create } for pid=3434 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.287860][ T29] audit: type=1400 audit(1740457497.409:127): avc: denied { create } for pid=3434 comm="syz.0.1" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 32.308816][ T29] audit: type=1400 audit(1740457497.419:128): avc: denied { ioctl } for pid=3434 comm="syz.0.1" path="socket:[3784]" dev="sockfs" ino=3784 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.374368][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.384899][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.394897][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.405344][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.415167][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.425651][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.439839][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.461495][ T3298] veth1_vlan: entered promiscuous mode [ 32.474227][ T3310] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.483110][ T3310] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.491920][ T3310] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.496752][ T29] audit: type=1400 audit(1740457497.709:129): avc: denied { create } for pid=3443 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 32.500661][ T3310] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.533361][ T29] audit: type=1400 audit(1740457497.749:130): avc: denied { ioctl } for pid=3443 comm="syz.3.4" path="socket:[4438]" dev="sockfs" ino=4438 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 32.554091][ T3298] veth0_macvtap: entered promiscuous mode [ 32.557600][ T29] audit: type=1400 audit(1740457497.749:131): avc: denied { write } for pid=3443 comm="syz.3.4" name="001" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 32.588185][ T29] audit: type=1400 audit(1740457497.749:132): avc: denied { map_create } for pid=3443 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.612077][ T3298] veth1_macvtap: entered promiscuous mode [ 32.618936][ T3446] loop2: detected capacity change from 0 to 512 [ 32.632725][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.643351][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.653215][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.663705][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.673563][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.684035][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.693869][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.704322][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.726579][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.762094][ T3444] loop3: detected capacity change from 0 to 4096 [ 32.777912][ T3446] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.796480][ T3446] ext4 filesystem being mounted at /0/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 32.799103][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.817306][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.827183][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.837628][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.847655][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.858136][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.868015][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.878571][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.900988][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.916490][ T3444] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.943534][ T3453] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 32.956278][ T3304] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.969389][ T3298] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.978169][ T3298] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.986999][ T3298] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.995765][ T3298] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.011567][ T3461] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6'. [ 33.114244][ T3467] loop1: detected capacity change from 0 to 512 [ 33.118906][ T3469] capability: warning: `syz.4.5' uses deprecated v2 capabilities in a way that may be insecure [ 33.138739][ T3471] loop3: detected capacity change from 0 to 1024 [ 33.147464][ T3471] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 33.158478][ T3471] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 33.170545][ T3467] EXT4-fs warning (device loop1): ext4_enable_quotas:7145: Failed to enable quota tracking (type=1, err=-22, ino=4). Please run e2fsck to fix. [ 33.170734][ T3471] JBD2: no valid journal superblock found [ 33.191041][ T3471] EXT4-fs (loop3): Could not load journal inode [ 33.216551][ T3467] EXT4-fs (loop1): mount failed [ 33.306303][ T3479] Driver unsupported XDP return value 0 on prog (id 14) dev N/A, expect packet loss! [ 33.332573][ T3481] loop3: detected capacity change from 0 to 512 [ 33.339696][ T3481] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 33.352822][ T3481] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 33.374917][ C0] ================================================================== [ 33.383054][ C0] BUG: KCSAN: data-race in can_receive / can_receive [ 33.389765][ C0] [ 33.392105][ C0] read-write to 0xffff88811771ed08 of 8 bytes by interrupt on cpu 1: [ 33.400200][ C0] can_receive+0x4e/0x1f0 [ 33.404561][ C0] canfd_rcv+0xe7/0x180 [ 33.408840][ C0] __netif_receive_skb+0x123/0x280 [ 33.413992][ C0] process_backlog+0x22e/0x440 [ 33.418795][ C0] __napi_poll+0x63/0x3c0 [ 33.423157][ C0] net_rx_action+0x3a1/0x7f0 [ 33.427789][ C0] handle_softirqs+0xbf/0x280 [ 33.432493][ C0] run_ksoftirqd+0x1c/0x30 [ 33.436951][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 33.441920][ C0] kthread+0x4ae/0x520 [ 33.446087][ C0] ret_from_fork+0x4b/0x60 [ 33.450511][ C0] ret_from_fork_asm+0x1a/0x30 [ 33.455288][ C0] [ 33.457616][ C0] read-write to 0xffff88811771ed08 of 8 bytes by interrupt on cpu 0: [ 33.465680][ C0] can_receive+0x4e/0x1f0 [ 33.470013][ C0] canfd_rcv+0xe7/0x180 [ 33.474172][ C0] __netif_receive_skb+0x123/0x280 [ 33.479377][ C0] process_backlog+0x22e/0x440 [ 33.484149][ C0] __napi_poll+0x63/0x3c0 [ 33.488486][ C0] net_rx_action+0x3a1/0x7f0 [ 33.493094][ C0] handle_softirqs+0xbf/0x280 [ 33.497781][ C0] do_softirq+0x5e/0x90 [ 33.501940][ C0] __local_bh_enable_ip+0x6e/0x70 [ 33.506971][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 33.511920][ C0] batadv_nc_purge_paths+0x220/0x270 [ 33.517223][ C0] batadv_nc_worker+0x3db/0xad0 [ 33.522086][ C0] process_scheduled_works+0x4db/0xa20 [ 33.527553][ C0] worker_thread+0x51d/0x6f0 [ 33.532149][ C0] kthread+0x4ae/0x520 [ 33.536230][ C0] ret_from_fork+0x4b/0x60 [ 33.540657][ C0] ret_from_fork_asm+0x1a/0x30 [ 33.545430][ C0] [ 33.547763][ C0] value changed: 0x0000000000000f67 -> 0x0000000000000f68 [ 33.554874][ C0] [ 33.557199][ C0] Reported by Kernel Concurrency Sanitizer on: [ 33.563363][ C0] CPU: 0 UID: 0 PID: 28 Comm: kworker/u8:1 Not tainted 6.14.0-rc4-syzkaller #0 [ 33.572306][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 33.582378][ C0] Workqueue: bat_events batadv_nc_worker [ 33.588060][ C0] ================================================================== [ 33.615225][ C1] ================================================================== [ 33.623348][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 33.630051][ C1] [ 33.632391][ C1] read-write to 0xffff88811771ed68 of 8 bytes by interrupt on cpu 0: [ 33.640480][ C1] can_receive+0x62/0x1f0 [ 33.644836][ C1] canfd_rcv+0xe7/0x180 [ 33.649108][ C1] __netif_receive_skb+0x123/0x280 [ 33.654254][ C1] process_backlog+0x22e/0x440 [ 33.659049][ C1] __napi_poll+0x63/0x3c0 [ 33.663409][ C1] net_rx_action+0x3a1/0x7f0 [ 33.668028][ C1] handle_softirqs+0xbf/0x280 [ 33.672734][ C1] do_softirq+0x5e/0x90 [ 33.676954][ C1] __local_bh_enable_ip+0x6e/0x70 [ 33.682011][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 33.686969][ C1] batadv_nc_purge_paths+0x220/0x270 [ 33.692291][ C1] batadv_nc_worker+0x402/0xad0 [ 33.697178][ C1] process_scheduled_works+0x4db/0xa20 [ 33.702691][ C1] worker_thread+0x51d/0x6f0 [ 33.707320][ C1] kthread+0x4ae/0x520 [ 33.711424][ C1] ret_from_fork+0x4b/0x60 [ 33.715871][ C1] ret_from_fork_asm+0x1a/0x30 [ 33.720666][ C1] [ 33.722997][ C1] read-write to 0xffff88811771ed68 of 8 bytes by interrupt on cpu 1: [ 33.731078][ C1] can_receive+0x62/0x1f0 [ 33.735430][ C1] canfd_rcv+0xe7/0x180 [ 33.739599][ C1] __netif_receive_skb+0x123/0x280 [ 33.744773][ C1] process_backlog+0x22e/0x440 [ 33.749572][ C1] __napi_poll+0x63/0x3c0 [ 33.753933][ C1] net_rx_action+0x3a1/0x7f0 [ 33.758551][ C1] handle_softirqs+0xbf/0x280 [ 33.763255][ C1] run_ksoftirqd+0x1c/0x30 [ 33.767702][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 33.772670][ C1] kthread+0x4ae/0x520 [ 33.776767][ C1] ret_from_fork+0x4b/0x60 [ 33.781212][ C1] ret_from_fork_asm+0x1a/0x30 [ 33.786013][ C1] [ 33.788350][ C1] value changed: 0x0000000000001977 -> 0x0000000000001978 [ 33.795474][ C1] [ 33.797803][ C1] Reported by Kernel Concurrency Sanitizer on: [ 33.803973][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc4-syzkaller #0 [ 33.812849][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 33.823009][ C1] ================================================================== [ 33.874269][ T3446] syz.2.3 (3446) used greatest stack depth: 10768 bytes left [ 33.882595][ C1] ================================================================== [ 33.890715][ C1] BUG: KCSAN: data-race in can_send / can_send [ 33.896939][ C1] [ 33.899284][ C1] read-write to 0xffff88811771ed70 of 8 bytes by interrupt on cpu 0: [ 33.907367][ C1] can_send+0x5b6/0x6d0 [ 33.911553][ C1] bcm_can_tx+0x314/0x420 [ 33.915913][ C1] bcm_tx_timeout_handler+0xea/0x280 [ 33.921245][ C1] __hrtimer_run_queues+0x20d/0x5e0 [ 33.926466][ C1] hrtimer_run_softirq+0xe4/0x2c0 [ 33.931526][ C1] handle_softirqs+0xbf/0x280 [ 33.936228][ C1] do_softirq+0x5e/0x90 [ 33.940400][ C1] __local_bh_enable_ip+0x6e/0x70 [ 33.945436][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 33.950379][ C1] icmp6_dst_alloc+0x2c4/0x320 [ 33.955154][ C1] mld_sendpack+0x2f6/0x6d0 [ 33.959668][ C1] mld_ifc_work+0x51a/0x7e0 [ 33.964180][ C1] process_scheduled_works+0x4db/0xa20 [ 33.969650][ C1] worker_thread+0x51d/0x6f0 [ 33.974246][ C1] kthread+0x4ae/0x520 [ 33.978323][ C1] ret_from_fork+0x4b/0x60 [ 33.982750][ C1] ret_from_fork_asm+0x1a/0x30 [ 33.987562][ C1] [ 33.989887][ C1] read-write to 0xffff88811771ed70 of 8 bytes by interrupt on cpu 1: [ 33.997955][ C1] can_send+0x5b6/0x6d0 [ 34.002120][ C1] bcm_can_tx+0x314/0x420 [ 34.006460][ C1] bcm_tx_timeout_handler+0xea/0x280 [ 34.011761][ C1] __hrtimer_run_queues+0x20d/0x5e0 [ 34.016965][ C1] hrtimer_run_softirq+0xe4/0x2c0 [ 34.021997][ C1] handle_softirqs+0xbf/0x280 [ 34.026679][ C1] do_softirq+0x5e/0x90 [ 34.030844][ C1] __local_bh_enable_ip+0x6e/0x70 [ 34.035885][ C1] _raw_write_unlock_bh+0x1f/0x30 [ 34.040922][ C1] addrconf_dad_work+0x98f/0xbe0 [ 34.045878][ C1] process_scheduled_works+0x4db/0xa20 [ 34.051345][ C1] worker_thread+0x51d/0x6f0 [ 34.055969][ C1] kthread+0x4ae/0x520 [ 34.060052][ C1] ret_from_fork+0x4b/0x60 [ 34.064480][ C1] ret_from_fork_asm+0x1a/0x30 [ 34.069255][ C1] [ 34.071576][ C1] value changed: 0x0000000000001041 -> 0x0000000000001042 [ 34.078680][ C1] [ 34.081004][ C1] Reported by Kernel Concurrency Sanitizer on: [ 34.087153][ C1] CPU: 1 UID: 0 PID: 50 Comm: kworker/u8:3 Not tainted 6.14.0-rc4-syzkaller #0 [ 34.096102][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.106164][ C1] Workqueue: ipv6_addrconf addrconf_dad_work [ 34.112165][ C1] ================================================================== [ 34.121540][ C0] ================================================================== [ 34.129649][ C0] BUG: KCSAN: data-race in can_send / can_send [ 34.135827][ C0] [ 34.138172][ C0] read-write to 0xffff88811771ed10 of 8 bytes by interrupt on cpu 1: [ 34.146599][ C0] can_send+0x5a2/0x6d0 [ 34.150777][ C0] bcm_can_tx+0x314/0x420 [ 34.155189][ C0] bcm_tx_timeout_handler+0xea/0x280 [ 34.160509][ C0] __hrtimer_run_queues+0x20d/0x5e0 [ 34.165763][ C0] hrtimer_run_softirq+0xe4/0x2c0 [ 34.170812][ C0] handle_softirqs+0xbf/0x280 [ 34.175525][ C0] do_softirq+0x5e/0x90 [ 34.179709][ C0] __local_bh_enable_ip+0x6e/0x70 [ 34.184762][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 34.189729][ C0] icmp6_dst_alloc+0x2c4/0x320 [ 34.194527][ C0] mld_sendpack+0x2f6/0x6d0 [ 34.199053][ C0] mld_send_initial_cr+0x12f/0x1e0 [ 34.204197][ C0] mld_dad_work+0x34/0x300 [ 34.208646][ C0] process_scheduled_works+0x4db/0xa20 [ 34.214134][ C0] worker_thread+0x51d/0x6f0 [ 34.218755][ C0] kthread+0x4ae/0x520 [ 34.222862][ C0] ret_from_fork+0x4b/0x60 [ 34.227314][ C0] ret_from_fork_asm+0x1a/0x30 [ 34.232108][ C0] [ 34.234447][ C0] read-write to 0xffff88811771ed10 of 8 bytes by interrupt on cpu 0: [ 34.242525][ C0] can_send+0x5a2/0x6d0 [ 34.246720][ C0] bcm_can_tx+0x314/0x420 [ 34.251080][ C0] bcm_tx_timeout_handler+0xea/0x280 [ 34.256422][ C0] __hrtimer_run_queues+0x20d/0x5e0 [ 34.261646][ C0] hrtimer_run_softirq+0xe4/0x2c0 [ 34.266781][ C0] handle_softirqs+0xbf/0x280 [ 34.271480][ C0] do_softirq+0x5e/0x90 [ 34.275646][ C0] __local_bh_enable_ip+0x6e/0x70 [ 34.280681][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 34.285629][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 34.291275][ C0] process_scheduled_works+0x4db/0xa20 [ 34.296743][ C0] worker_thread+0x51d/0x6f0 [ 34.301340][ C0] kthread+0x4ae/0x520 [ 34.305417][ C0] ret_from_fork+0x4b/0x60 [ 34.309846][ C0] ret_from_fork_asm+0x1a/0x30 [ 34.314624][ C0] [ 34.316944][ C0] value changed: 0x00000000000027c0 -> 0x00000000000027c1 [ 34.324049][ C0] [ 34.326370][ C0] Reported by Kernel Concurrency Sanitizer on: [ 34.332519][ C0] CPU: 0 UID: 0 PID: 1027 Comm: kworker/u8:6 Not tainted 6.14.0-rc4-syzkaller #0 [ 34.341633][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.351694][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 34.358471][ C0] ================================================================== [ 34.401668][ T3299] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.463554][ T3481] EXT4-fs (loop3): 1 truncate cleaned up [ 34.509921][ T3481] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.546559][ T3304] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.623348][ T3453] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.814104][ T3453] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.854414][ T3453] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.908389][ T3453] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.919550][ T3453] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.931223][ T3453] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.942820][ T3453] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0