Warning: Permanently added '10.128.0.159' (ED25519) to the list of known hosts. 2024/05/01 06:30:35 fuzzer started 2024/05/01 06:30:35 dialing manager at 10.128.0.169:30009 [ 58.675343][ T5081] cgroup: Unknown subsys name 'net' [ 58.792766][ T5081] cgroup: Unknown subsys name 'rlimit' 2024/05/01 06:30:37 code coverage: enabled 2024/05/01 06:30:37 comparison tracing: enabled 2024/05/01 06:30:37 extra coverage: enabled 2024/05/01 06:30:37 delay kcov mmap: enabled 2024/05/01 06:30:37 setuid sandbox: enabled 2024/05/01 06:30:37 namespace sandbox: enabled 2024/05/01 06:30:37 Android sandbox: /sys/fs/selinux/policy does not exist 2024/05/01 06:30:37 fault injection: enabled 2024/05/01 06:30:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/05/01 06:30:37 net packet injection: enabled 2024/05/01 06:30:37 net device setup: enabled 2024/05/01 06:30:37 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/05/01 06:30:37 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/05/01 06:30:37 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/05/01 06:30:37 USB emulation: enabled 2024/05/01 06:30:37 hci packet injection: enabled 2024/05/01 06:30:37 wifi device emulation: enabled 2024/05/01 06:30:37 802.15.4 emulation: enabled 2024/05/01 06:30:37 swap file: enabled 2024/05/01 06:30:37 starting 5 executor processes [ 60.127739][ T5081] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.244043][ T52] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 66.253135][ T52] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 66.273251][ T5098] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 66.292398][ T5103] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 66.300574][ T5103] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 66.312096][ T5103] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 66.320080][ T5113] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 66.329917][ T5112] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 66.330626][ T5103] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 66.339713][ T5113] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 66.344932][ T5103] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 66.352104][ T5112] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 66.360670][ T5103] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 66.367305][ T5112] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 66.380983][ T5115] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 66.389419][ T5115] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 66.397615][ T5115] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 66.400985][ T5113] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 66.412618][ T5113] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 66.420090][ T5113] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 66.424925][ T5115] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 66.436403][ T5113] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 66.436886][ T5115] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 66.443748][ T5113] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 66.458505][ T5113] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 66.466065][ T5115] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 66.469936][ T5113] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 66.480886][ T5113] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 66.488256][ T5115] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 66.509065][ T5109] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 66.802278][ T5095] chnl_net:caif_netlink_parms(): no params data found [ 67.036763][ T5095] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.044750][ T5095] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.052258][ T5095] bridge_slave_0: entered allmulticast mode [ 67.059821][ T5095] bridge_slave_0: entered promiscuous mode [ 67.069246][ T5095] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.077487][ T5095] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.085052][ T5095] bridge_slave_1: entered allmulticast mode [ 67.092591][ T5095] bridge_slave_1: entered promiscuous mode [ 67.147093][ T5100] chnl_net:caif_netlink_parms(): no params data found [ 67.205609][ T5108] chnl_net:caif_netlink_parms(): no params data found [ 67.218966][ T5095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.228636][ T5099] chnl_net:caif_netlink_parms(): no params data found [ 67.287449][ T5095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.405925][ T5095] team0: Port device team_slave_0 added [ 67.452917][ T5100] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.460058][ T5100] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.467643][ T5100] bridge_slave_0: entered allmulticast mode [ 67.475503][ T5100] bridge_slave_0: entered promiscuous mode [ 67.487320][ T5100] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.495000][ T5100] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.502346][ T5100] bridge_slave_1: entered allmulticast mode [ 67.509595][ T5100] bridge_slave_1: entered promiscuous mode [ 67.518551][ T5095] team0: Port device team_slave_1 added [ 67.562224][ T5104] chnl_net:caif_netlink_parms(): no params data found [ 67.617477][ T5099] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.624953][ T5099] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.632754][ T5099] bridge_slave_0: entered allmulticast mode [ 67.639467][ T5099] bridge_slave_0: entered promiscuous mode [ 67.647832][ T5108] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.655182][ T5108] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.662648][ T5108] bridge_slave_0: entered allmulticast mode [ 67.669290][ T5108] bridge_slave_0: entered promiscuous mode [ 67.697171][ T5100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.712215][ T5100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.722392][ T5095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.729362][ T5095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.756089][ T5095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.768780][ T5099] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.778236][ T5099] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.785729][ T5099] bridge_slave_1: entered allmulticast mode [ 67.793201][ T5099] bridge_slave_1: entered promiscuous mode [ 67.799645][ T5108] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.806961][ T5108] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.814309][ T5108] bridge_slave_1: entered allmulticast mode [ 67.820954][ T5108] bridge_slave_1: entered promiscuous mode [ 67.855907][ T5095] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.863046][ T5095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.889660][ T5095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.963021][ T5100] team0: Port device team_slave_0 added [ 67.982186][ T5095] hsr_slave_0: entered promiscuous mode [ 67.988536][ T5095] hsr_slave_1: entered promiscuous mode [ 67.997971][ T5099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.010739][ T5099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.050788][ T5100] team0: Port device team_slave_1 added [ 68.079464][ T5108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.092673][ T5108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.102086][ T5104] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.109233][ T5104] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.116645][ T5104] bridge_slave_0: entered allmulticast mode [ 68.123470][ T5104] bridge_slave_0: entered promiscuous mode [ 68.143795][ T5100] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.150785][ T5100] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.176763][ T5100] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.212777][ T5099] team0: Port device team_slave_0 added [ 68.241249][ T5104] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.248570][ T5104] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.257401][ T5104] bridge_slave_1: entered allmulticast mode [ 68.264929][ T5104] bridge_slave_1: entered promiscuous mode [ 68.284361][ T5100] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.291369][ T5100] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.317878][ T5100] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.351088][ T5099] team0: Port device team_slave_1 added [ 68.371222][ T5108] team0: Port device team_slave_0 added [ 68.412674][ T5108] team0: Port device team_slave_1 added [ 68.432219][ T5104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.459047][ T5099] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.466113][ T5099] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.493341][ T5109] Bluetooth: hci0: command tx timeout [ 68.499033][ T5099] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.509880][ T5109] Bluetooth: hci1: command tx timeout [ 68.527396][ T5108] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.534450][ T5108] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.560671][ T5108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.561862][ T5098] Bluetooth: hci2: command tx timeout [ 68.571282][ T5113] Bluetooth: hci4: command tx timeout [ 68.576739][ T5109] Bluetooth: hci3: command tx timeout [ 68.586895][ T5104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.619134][ T5100] hsr_slave_0: entered promiscuous mode [ 68.626839][ T5100] hsr_slave_1: entered promiscuous mode [ 68.633100][ T5100] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 68.640889][ T5100] Cannot create hsr debugfs directory [ 68.653736][ T5099] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.660708][ T5099] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.687110][ T5099] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.714334][ T5108] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.721288][ T5108] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.748527][ T5108] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.775858][ T5104] team0: Port device team_slave_0 added [ 68.806439][ T5099] hsr_slave_0: entered promiscuous mode [ 68.812804][ T5099] hsr_slave_1: entered promiscuous mode [ 68.818844][ T5099] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 68.826887][ T5099] Cannot create hsr debugfs directory [ 68.850847][ T5104] team0: Port device team_slave_1 added [ 68.914118][ T5104] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.921087][ T5104] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.950574][ T5104] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.996718][ T5104] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.003840][ T5104] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 69.029836][ T5104] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.076423][ T5108] hsr_slave_0: entered promiscuous mode [ 69.083185][ T5108] hsr_slave_1: entered promiscuous mode [ 69.089322][ T5108] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 69.097232][ T5108] Cannot create hsr debugfs directory [ 69.175394][ T5104] hsr_slave_0: entered promiscuous mode [ 69.182714][ T5104] hsr_slave_1: entered promiscuous mode [ 69.188827][ T5104] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 69.197229][ T5104] Cannot create hsr debugfs directory [ 69.356842][ T5095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 69.373773][ T5095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 69.415215][ T5095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 69.427957][ T5095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 69.593171][ T5100] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 69.603738][ T5100] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 69.615973][ T5100] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 69.625430][ T5100] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 69.727173][ T5099] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 69.751230][ T5099] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 69.787429][ T5099] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 69.830446][ T5099] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 69.841289][ T5104] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 69.875487][ T5104] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 69.884796][ T5104] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 69.913966][ T5095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.930253][ T5104] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 69.983724][ T5108] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 69.993536][ T5108] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 70.008798][ T5108] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 70.019702][ T5108] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 70.075123][ T5095] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.115101][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.122508][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.134216][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.141887][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.161165][ T5100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.284145][ T5100] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.343735][ T5151] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.350895][ T5151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.363974][ T5151] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.371180][ T5151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.402875][ T5104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.440232][ T5104] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.467806][ T5108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.492832][ T5099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.506184][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.513402][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.552085][ T5109] Bluetooth: hci1: command tx timeout [ 70.557534][ T5109] Bluetooth: hci0: command tx timeout [ 70.564047][ T5108] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.577725][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.584854][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.611748][ T5099] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.632071][ T5098] Bluetooth: hci3: command tx timeout [ 70.632077][ T5113] Bluetooth: hci2: command tx timeout [ 70.632156][ T5109] Bluetooth: hci4: command tx timeout [ 70.659843][ T5100] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.681033][ T5151] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.688181][ T5151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.715990][ T5095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.748034][ T5151] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.755170][ T5151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.771033][ T5151] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.778244][ T5151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.840009][ T5151] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.847230][ T5151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.967991][ T5099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.998598][ T5100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.036628][ T5095] veth0_vlan: entered promiscuous mode [ 71.078476][ T5095] veth1_vlan: entered promiscuous mode [ 71.246687][ T5100] veth0_vlan: entered promiscuous mode [ 71.296439][ T5095] veth0_macvtap: entered promiscuous mode [ 71.306850][ T5100] veth1_vlan: entered promiscuous mode [ 71.349038][ T5104] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.360511][ T5099] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.374378][ T5095] veth1_macvtap: entered promiscuous mode [ 71.427693][ T5100] veth0_macvtap: entered promiscuous mode [ 71.466787][ T5095] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.479281][ T5100] veth1_macvtap: entered promiscuous mode [ 71.504351][ T5108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.546129][ T5095] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.596704][ T5095] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.609790][ T5095] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.623090][ T5095] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.633066][ T5095] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.648534][ T5104] veth0_vlan: entered promiscuous mode [ 71.660043][ T5104] veth1_vlan: entered promiscuous mode [ 71.678381][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.695804][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.709989][ T5100] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.764820][ T5099] veth0_vlan: entered promiscuous mode [ 71.777209][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 71.788102][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.800910][ T5100] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.835741][ T5100] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.845790][ T5100] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.855321][ T5100] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.864241][ T5100] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.899324][ T5099] veth1_vlan: entered promiscuous mode [ 72.017394][ T5104] veth0_macvtap: entered promiscuous mode [ 72.034384][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.051701][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.055231][ T5108] veth0_vlan: entered promiscuous mode [ 72.076739][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 72.090183][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 [ 72.102455][ T5104] veth1_macvtap: entered promiscuous mode [ 72.125975][ T5099] veth0_macvtap: entered promiscuous mode [ 72.162612][ T5108] veth1_vlan: entered promiscuous mode [ 72.178809][ T5104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.191925][ T5104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.204007][ T5104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.214699][ T5104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.227081][ T5104] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.237223][ T5099] veth1_macvtap: entered promiscuous mode [ 72.268496][ T34] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.269064][ T5104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.279329][ T34] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.292835][ T5155] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.304655][ T5104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.313691][ T5155] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.316665][ T5104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.333329][ T5104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.345275][ T5104] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.399174][ T5099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.412110][ T5099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.422295][ T5099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.436390][ T5099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.446786][ T5099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.457593][ T5099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.469054][ T5099] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.481074][ T5099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.493014][ T5099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.503517][ T5099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.514230][ T5099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.525558][ T5099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.536835][ T5099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.553316][ T5099] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.580004][ T5104] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.588905][ T5104] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.600263][ T5104] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.609081][ T5104] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.619842][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.628081][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.643597][ T5109] Bluetooth: hci0: command tx timeout executing program 0: r0 = socket(0x22, 0x2, 0x3) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000240)=""/1, &(0x7f0000002180)=0x1) [ 72.643605][ T5113] Bluetooth: hci1: command tx timeout [ 72.658792][ T5099] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.668179][ T5099] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.677156][ T5099] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.686041][ T5099] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.713790][ T5113] Bluetooth: hci4: command tx timeout [ 72.715961][ T5109] Bluetooth: hci3: command tx timeout [ 72.719199][ T5113] Bluetooth: hci2: command tx timeout [ 72.738613][ T5108] veth0_macvtap: entered promiscuous mode executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x2, 0x2, 0x3, 0x1, 0x0, 0x35}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000072000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) [ 72.832610][ T5108] veth1_macvtap: entered promiscuous mode executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000400000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000780)=@newqdisc={0x38, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8}, {0x4}}, @TCA_INGRESS_BLOCK={0x8}]}, 0x38}}, 0x0) executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet(r0, &(0x7f0000003a80)=[{{&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002240)=[{&(0x7f0000000080)="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", 0xa91}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002300)="04", 0x1}], 0x1}}], 0x2, 0x400c855) [ 72.981142][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.019689][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f00000000c0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x14, 0x2, [@TCA_FQ_CODEL_FLOWS={0x8, 0x5, 0x4}, @TCA_FQ_CODEL_QUANTUM={0x8, 0x6, 0xffffff01}]}}]}, 0x48}}, 0x0) [ 73.047265][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.060118][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.075529][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.086698][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.100494][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.112690][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.124794][ T5108] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.166002][ T5189] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 73.204195][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a", 0x440) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0xfffffdef}}, 0x0) [ 73.222768][ T5149] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.223097][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.230601][ T5149] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.254676][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000ffffffff7a0af0fff8ffff5979a4f0ff00000000b7060000ffffffff2d6405000000000065040400014741001404000001007d60b7030000000000006a0a00fe40000900850000001f000000b70000000004000095000000000000006623848adf1dc9a764ab51a064e0ff0c9b27a26293fddf0180000071ff31f1622271d5518193e09483c5a020c334f8c76334d8ce8303b01ddaa52e8756ad60a07d6f27c125e16d024098f755d8583da60f27c162dbba0700002ac9170f50f2568836077b7f711a18ebf608d87b885297b6a79819782748b376358c33c9f53bfd989b1ca58949a54d5827df14feecea46408a05d572077f1252fbb72c3d099c501bc4ded6fca17a3447222c95edb47b77aafa63b9dd5fa5c53e9c37251709f1ff7f0000f07bf7f53ce129a9ecd3b4dd15100f2b450f98526a0d8cac7c97fc2f64015306a1bd7e43fe1ca8345710fb6379b4c53cf55eefb4c0974486a8d25a363adbd83b49e13fbd1777b27020bd9b8cff3f48c9411670c34f23ab8caf7851b290feb3045a1b622f20c4383a0280f040de7667f8b1d08428353b1c358ebe73af41e5b5b924275cb1749289b44e9728e7a73f148ac8206afe120c1437490d99000000110000fdffffffffffffffaf580278e1342aabd1b623f6c4f128858e4eb6b42f2173184c2b99b645f6ec0e14e5d7c95a0008000000f30f6c0000000000ff0000b8f5001a1d2a34dc0973ec302bc23211d3e3b6e6dad65a51e5497a3419cecec38126247b27113ad4c7915c8f82c333a7b350802f0311807010d1ed50c18411aa6900daccc02f4ba4b078f07e41f781eee222c7d071d5a94d82ca9a0846c1af59cee16639b4970f8f0a82c6a712fd5722d637d406160ffaffffffb4e0bde6749aa52c408b74251914c5d3255fd88a42e7ebb69ebcd8eee623e51dbb1f1b548c91a6825c0686fdc16be1cbb72c217fda18bd746253ca66093daf35923300b600000013887ad6d2d440fedce51a3aa57b00ac376e0a4649a8a84e1d293a6b109c5e59b366bca5cc3d936c53d4a48c05099e6fc36d5aa23bff8cce0600fcff00000300a568a8532623d12b40b50ac26f2e8255470a04bfbe7acb581b90991d965a01d1f84cb6b973558e1e3f8118c77ccf0b3c6eb6443870004da10c75723b65f83769ad1f0e4ef6b9ef1cec23264fd8fdac6264af1cb467020bdc12b797b6c156c439105829d2ae1c45f7cfa40df68fd36a03353a55e68ec7c01bd5a2028a8fc107007f3deb1f200abe1f753754678dae8b4e3ba3d086d4b95dfc5817e3dafae2d38b522f942cc750399d90296171fdb1e05882f8a4b8fbd219ccac3a895828b4f22b6527ce31ceb02b7b2b44925129677b7b3d2f8e7792c7827862eae80134552f0b076b168394f8417f25cc82ae04007193cbe69de8bf35e4bebd15412426b2e20ab1f05fc44ae9ae094c1b81d3ef947692b44d2afb09c7498d357836f03e8a7c392e535694a3ead2de11e6b1781e2a018c0ada7bc7f0eb2d678f23c07ac341fda2e563ee95085742f5fee9f95f4741b226e428d20b00bc140000e4b2f5efd0a0b1ceba000830ba8634b5aa26bdbe91614e92fae3c7349531df9bf4c01ebf5d8eb7d53e5f30647661623fbdb3f60033fc32f68ea86a2df1e76fe27dfdff1cf9194849c4cc0da9533e5983693e526a7dc0d8728f3b573ca4427bdb44df9341e9b8050e896598a156c935c800436a312e7ae3c011e46851ac599f0427729ab9c55ae0ab4c0000000000000000000000000000c87bcc2ac5aed9247b51d92e0993af4beaf1f3f47dcdfab9165f98155d93e383d6b85158b54675c1585037508c1e9461a1c3d1a6e2402045cae150a7016f1a90716eebbdf6afc4414d900be0bdf19f4a273f44f4357380b4387f1c8b104f0e406b2f04e5ed88631be6411f9927fe9f83412b7c5a676ceec8b454ebf6481c98e86b6933a02daea0b4ec0be5b3d916bd70208b4588626c277648475002e2c62681bd07331422a6e47bbd40857d52c4894944fae5c500000000000000ff00000000de784314b8fd419216b48d0f353c11ae185749fa9ac7dfa16bc5c23a23f74b17a7f1b2d799480f33faa3537a910d6ca02f48b0e69beb1119f106ea59195dbc72e17a5dc8c3d131d82f067e29dc39665dff39fb6347b374aaaf6e65efde3fc6202bf29ccfcb08caf18d668a462493aa82e76affba9c9af31d1c23237aa6eccfadfaf794bb1004c07b21ac36f8859c7d5444c12bd05fea3561b86b2838a8de5b4f91d6aba95dc9f4464a024be4d0d8d04f5023e7e19e503624d39a43c7b310de519b40738ff9a623065c06d69d16d4a46ff300022fee47803989b7e916254e0fb9e1c8b07d8a4b8b692a75a32e6ed2caeaa7c258c47fe6143cd9e90b801eff78cd4e402374e0e4ca07b7f17254e3d2f0a2a1bac6fde8a15e3ef3588065524d41966fb3915e804c53201efee751ec294584d23d9008bdf046f55c030ab941a0b8723412127efb3eac0ccf68133c76770d5e7dabcc48d4768540c540535ed70df75c24660d85f9c9a245185c7da217d1c3743db85db67b9b8a8f00af02367429f6f0b53c169c4356751bf68745dbde055e1722ae256ae53ae637a1431855d16dfa91d82a021a4b2dbb50bf6d59fdd0c9bc84cd7d544de2523b6ce8aaeb94bfba75079f7455204ccca02bd389d8409b2effe9b88e301ac4fe28752386a0678a3f54b2bdf56f927ddd6b0ac98b2b505f668597455ada51ba95ab852b49373a11ff31dcd82474b51498f65e0601bcdd23acb4c01bcd2f3e1ad378d14c07d923087d3518369710b70ffb0b523dc4f00f275c381fe1c091e478b04d5e4a9f75b4072acb005a83c25625ab7a351a68977177e27a1bf112114eb10250c2b9dca234f8967f0439696a2345e747b5f1d8c4bec86d8e8f2eb121ea0159615e7d475d45837921c2c0c3f9e683ac8000214a657c9f0a000000000000009e0b1a8c8f55f30e7c25275ed49b71828b375be03ef903cc8244b1269376d01b674cff9cb82eef0fe55c8b751053004ca6cef28d9a52c3771e9c73d03fdf74f48306560fb6cd86658afa895efa47f3a43e686df5b727ba4ec99620270334fce56c9f86b8a2c8aaede5a48a29b75734fbe1f59e43dc5a39b083848b0ebb14d845df7606e4d58f1a03f2dd337c3a10f3b15d388e43059aa88b42d26d4ccda6d60f996ed444d7f40e0cdbf69e11252a6c0e2d882d93b4f22dc95a191b1e6ff59d7880b4ce587f7ef05c46088268805cf089c4b3cd60cd3fc0c6d81fb2f961abcb0133f3f7a594b8475d6853b2e4fafc52a6851e8cfe1aebe3a4539634a535f8ac496793001c1a4b26216d1cd382c1e6a15697ef0a9b26474e1dbfa422e952b0f742ef52388584673f6333299042099aa073c152e1b61851a4519fe67e47f1446bb7b80b804b1b4503df784c8604bf26578b1fa7dce5313ecdf297cc63bf2b472f8f56bebeec16dc5fa22ee9c3c304d6629db7215eebfbd480c4ac"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x48, 0x0, 0x0, 0x0, 0xffffffffffffff37, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000d00)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xffe4, 0xfffffffffffffda0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x940e, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r4, &(0x7f0000001740), 0x0}, 0x20) [ 73.276673][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.277410][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.298279][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.309745][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.348006][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.367611][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.379315][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.404088][ T5108] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, '\x00', 0xd}, 0x4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a9646", 0x1c, 0x6, 0x0, @empty, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @window={0x3, 0x3, 0x68}]}}}}}}}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 73.448692][ T5108] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.460485][ T5108] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.472882][ T5108] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.482821][ T5108] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000c0000002000058008000100756470001400028008000400ff"], 0x34}}, 0x0) executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0xc}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000080021850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20000010) close(r0) [ 73.561740][ T5202] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 73.571710][ T5202] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 73.711107][ T1094] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.722407][ T1094] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.735900][ T5206] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x43, &(0x7f00000000c0)={@remote={0xfe, 0x80, '\x00', 0xffffffffffffffff}}, 0x20) [ 73.757649][ T1058] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.768148][ T1058] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@ipv4_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@RTA_ENCAP={0x14, 0x9, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, @LWTUNNEL_IP_OPT_ERSPAN_VER={0x8, 0x5}}}}]}, 0x30}}, 0x0) [ 73.882725][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0xa}]}], {0x14}}, 0x64}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000004d40)={0x0, 0x0, &(0x7f0000004d00)={&(0x7f0000004640)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc}]}], {0x14}}, 0x5c}}, 0x0) executing program 2: r0 = socket$inet(0x2, 0x2000080001, 0x84) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) sendto$inet(r0, &(0x7f0000000100)="11", 0x1, 0x0, &(0x7f0000000240)={0x2, 0x0, @rand_addr=0x64010101}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="4800000014001d0d09074beafd0d8c560284606080ffe0064e204e20590000a2bc5603ca00000f7f8907000020008d42188fedc22e47ad8f75edc6d100000101ff0000000309ff5b", 0x48}], 0x1) [ 73.927945][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ppoll(&(0x7f0000000200)=[{r1}], 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1={0xff, 0x2}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000000), 0x4c00}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001540)=""/4111, 0x100f}], 0x10}, 0x0) [ 74.050639][ T5210] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.075906][ T5210] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.088407][ T5214] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a", 0x440) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0xfffffdef}}, 0x0) executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="67a9fde500000000280012800a00010076786c616e"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x5, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000000000)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f00000000c0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x14, 0x2, [@TCA_FQ_CODEL_FLOWS={0x8, 0x5, 0x4}, @TCA_FQ_CODEL_QUANTUM={0x8, 0x6, 0xffffff01}]}}]}, 0x48}}, 0x0) [ 74.474484][ T5231] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xb4400000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x1c}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r2, 0x1, 0x41, &(0x7f00000001c0)=r3, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x25, &(0x7f00000001c0)=r1, 0x1b) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x350e24ebb9f2bffd, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r0) executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x80111500, 0x0) executing program 0: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000f2cff4)={0x775409470d9a1685}) [ 74.711483][ T5113] Bluetooth: hci1: command tx timeout [ 74.712074][ T5109] Bluetooth: hci0: command tx timeout executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x160, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xc58, 0xc58, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@ipv4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'bond0\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @local, [], [], 'ipvlan0\x00', 'ip6gre0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) [ 74.791955][ T5109] Bluetooth: hci2: command tx timeout [ 74.792077][ T5113] Bluetooth: hci3: command tx timeout [ 74.797429][ T5098] Bluetooth: hci4: command tx timeout executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0x1e0, 0x1, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_USERDATA={0xb3, 0x6, "296e746abb1ddf52d9f5d6d359bf142902b58aade3e7f8f4db58cfad1f3077cab232783c845dd7f5599544dd21f1bf63003a02119e81be478779ca2a57c523e0042ed36fba58698f057f132d15e97920b6043babc9d5b6a3d91a0386bede109b945e3a1898ef9bc9ddf964664a1417a169ea545b8f79d7367fc8c18a550897b76f4e4a0eccb041278746eba77d3ac8782bc7d67cd48ed8e8bfd6999fd2013b491a582c72911ce69ffd74a902fc6308"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0xd9, 0x6, "572ede674d482dacbda45148fcd6e10a40437a7a2e55bddd86576ab4081722638a8c7054df3a7d95489bb6addea495d2b617504a29875da003964bd9ce05d84322c2fdb20a5b3a56a5c982ade0d648e8f98b971a083d4e22e993a509fb65b54f6dd681cc9537737fd2969ba99e469954f13e8a06d096760cc73d1d3bb75f5a58f2ba51a903e0b5a41ca9bbb48aa109b75c5bb5b725e0d7edfd3c3272910fbc17659c9a73fa7f13d3ca2ff57bf45a7e86f3482bdac84f1e690b280ae08c9f81e790f38f482feb9cf8d0463aa8b3b3912039c83cfb88"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_buf(r0, 0x0, 0x15, &(0x7f0000000000)='b', 0x1) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv4_delroute={0x30, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_MULTIPATH={0x14, 0x8, {0x8}}, @RTA_FLOW={0x4, 0x10}]}, 0x30}}, 0x0) executing program 1: socket(0x10, 0x3, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x90}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x85, &(0x7f0000000000)={r1, @in={{0x2, 0x0, @empty}}, 0x0, 0x7ffe}, 0x90) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x350e24ebb9f2bffd, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f00000000c0)=0x7, 0x4) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69"], 0x0}, 0x90) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$inet(r0, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}, @ip_retopts={{0x18, 0x110, 0xd, {[@timestamp_addr={0x44, 0x4}]}}}], 0x38}, 0x0) executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) sendto$inet(r0, &(0x7f0000000100)="11", 0x1, 0x0, &(0x7f0000000240)={0x2, 0x0, @rand_addr=0x64010101}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="4800000014001d0d09074beafd0d8c560284606080ffe0064e204e20590000a2bc5603ca00000f7f8907000020008d42188fedc22e47ad8f75edc6d100000101ff0000000309ff5b", 0x48}], 0x1) executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x160, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xc58, 0xc58, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@ipv4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'bond0\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @local, [], [], 'ipvlan0\x00', 'ip6gre0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ppoll(&(0x7f0000000200)=[{r1}], 0x1, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r2, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r2], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="3400000010003904000000000000880000000000", @ANYRES32=r2, @ANYBLOB="000000000000000014001280080001006772650008000280040012"], 0x34}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0x8, 0xa}}}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0x100b, &(0x7f0000001e40)=""/4107}, 0x90) [ 75.480942][ T5269] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89fd, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000340)=@ethtool_regs={0x12}}) executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) getsockopt$inet_tcp_buf(r0, 0x6, 0x15, 0x0, &(0x7f0000000100)) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv4_delroute={0x30, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_MULTIPATH={0x14, 0x8, {0x8}}, @RTA_FLOW={0x4, 0x10}]}, 0x30}}, 0x0) executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum={0x0, 0x0, 0x0, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}]}}, 0x0, 0x32}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x1, 0x2}, 0x48) executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DONE(r0, 0x0, 0x8, 0x0, 0x0) executing program 4: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x2b}, {0x4}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_buf(r0, 0x0, 0x15, &(0x7f0000000000)='b', 0x1) executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@link_local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @multicast1}, @time_exceeded={0x21, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}}}, 0x0) executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {0x4}, {}, {}, {}, {0x7, 0x0, 0xb, 0x2}}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x13, &(0x7f0000000340)=""/222}, 0x21) executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x30d}, 0x14}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) executing program 0: unshare(0x22020600) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000040)=[{}, {}, {}], 0x6a) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x16, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000030400000006000000005dcc0300", @ANYRES32=r2, @ANYBLOB="71e79fd800000000140012800c0001006d616376746170001400028008000500", @ANYRES32=r3], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newtfilter={0x24, 0x10, 0xc27, 0x0, 0x0, {0x0, 0x0, 0x74, r2, {}, {0xffff}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000003c0), &(0x7f0000000480)=0x90) executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x160, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xc58, 0xc58, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@ipv4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'bond0\x00', 'ipvlan1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @local, [], [], 'ipvlan0\x00', 'ip6gre0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) [ 76.177338][ T5302] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 76.192656][ T5302] team0: entered promiscuous mode [ 76.205467][ T5302] team_slave_0: entered promiscuous mode [ 76.226882][ T5302] team_slave_1: entered promiscuous mode executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0xf3a, 0x0) write(r1, &(0x7f0000001100)="94", 0x1) tee(r0, r4, 0x81, 0x0) vmsplice(r4, &(0x7f0000000340)=[{&(0x7f00000000c0)="03", 0x1}], 0x1, 0x0) close(r2) [ 76.257586][ T5302] team0: entered allmulticast mode executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003900000008000300", @ANYRES32=r3, @ANYBLOB="24005a8020000180140003000002000000000200000000000000000004000200040001"], 0x40}}, 0x0) [ 76.291437][ T5302] team_slave_0: entered allmulticast mode [ 76.323732][ T5302] team_slave_1: entered allmulticast mode executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8}]]}}}]}, 0x40}}, 0x0) [ 76.339362][ T5304] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r2, &(0x7f0000005b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="f37481d90eeaead391345b4da9d27e24c9c670da3afc5c00"/50, 0x32}, {&(0x7f0000000140)="ead5e96719a44591801f33", 0xb}, {&(0x7f0000000180)="f3f97053495b072215aee864193557c0dabdd253711d5ed9b131c5abd8796e5759ab1f639211e68e24bf4471b6ab1429b165c7248cded82bfb4a3f48e8d0", 0x3e}], 0x3, &(0x7f0000000240)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x93, 0x1, 0x0, [{@broadcast}, {}, {@private}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast2}}}], 0x50}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="c1ad061c5d914eadd95de7fb63eb7b0306d91c25f3fba6c97eda8ade2420dfe1fe0f5c7a01d724be33a44f1cd52028110d8f7dd4b3421a3fe4b2066d179f938ba15c3956e1aaad35035bcde7b90ed59ee2de06c8a4af3de95bda", 0x5a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000480)="f41fa963edcd5e2a5d", 0x9}, {&(0x7f00000004c0)="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", 0x4c6}], 0x2}}, {{0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000003140)="01", 0x1}], 0x300}}], 0x4, 0xc080) [ 76.418625][ T5304] team0: left promiscuous mode [ 76.451722][ T5304] team_slave_0: left promiscuous mode [ 76.458480][ T5304] team_slave_1: left promiscuous mode [ 76.471648][ T5304] team0: left allmulticast mode [ 76.489114][ T5304] team_slave_0: left allmulticast mode executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@private2}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2, @local}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @private}}]}, 0x80}}, 0x0) [ 76.505737][ T5318] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 76.514780][ T5304] team_slave_1: left allmulticast mode executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000800000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='contention_end\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002380)="1b0000001a007f029e741683c28f7b331d00"/27, 0x1b}], 0x1}, 0x0) executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x2b}, {0x4}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) executing program 1: executing program 0: r0 = socket(0x22, 0x2, 0x24) close(r0) socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000040)={0x2a, 0x1, 0xfffffffe}, 0xc) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=@newlink={0x20, 0x76, 0x533, 0x0, 0x0, {0x68, 0x0, 0x63, 0x0, 0x4}}, 0x20}, 0x1, 0x4800}, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x2) syz_emit_ethernet(0x9a, &(0x7f0000001480)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x64, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x19, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @sack_perm={0x4, 0x2}, @window={0x3, 0x3}, @generic={0x0, 0xc, "693833dd8e386c3d1788"}, @generic={0x0, 0x7, "67ca56de5f"}, @mptcp=@mp_fclose={0x1e, 0xc}, @exp_fastopen={0xfe, 0xf, 0xf989, '\x00'/11}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}}, 0x0) [ 76.922677][ T5335] delete_channel: no stack executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="e000000010000905000000000000000008004300ff0300002f67e2171ef9582248fda90000002b0e13e735a3184f123d6da2f1acfac0ee2dd2b184b27d0000d57ef9b7bf852c8986626691b01b5f44f4ce28712c2829"], 0xe0}], 0x1}, 0x0) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)={0xa4, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x80, 0x8, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x54, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0xa4}}, 0x0) executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x15}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, 0x0, &(0x7f0000000140)) executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc0045878, 0x0) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x53}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x6, 0x4) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=@newlink={0x20, 0x76, 0x533, 0x0, 0x0, {0x68, 0x0, 0x63, 0x0, 0x4}}, 0x20}, 0x1, 0x4800}, 0x0) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140097f87059ae08060c040002ff0f0200000000000001870182fa73a69d35a2cca84708f7abca1b4e7d06a6bd7c493872f750375ed08a560400000003c48f93b82a03000000461e", 0x4c}], 0x1}, 0x0) executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000880)={0x11, 0x32, 0x601, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x18}], 0x1}, 0x0) executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_DATA={0x74, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_NETMASK={0x5}, @IPSET_ATTR_MAXELEM={0x8}, @IPSET_ATTR_HASHSIZE={0x8}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8}, @IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_LINENO={0x8}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev}}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xffffff11}, @IPSET_ATTR_NETMASK={0x5}]}]}, 0x130}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x2c, 0x3a, 0xb, 0x0, 0x0, {0x2}, [@nested={0xfffffffffffffec1, 0x0, 0x0, 0x1, [@typed={0x13, 0x3, 0x0, 0x0, @str='\r4\xd8\x02j,'}]}]}, 0x2c}}, 0x0) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, 0x0, &(0x7f0000000140)) executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c00000010003df600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400030064766d727009000000000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2], 0x4c}}, 0x0) executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) recvmmsg(r1, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000005a40)=[{&(0x7f0000000040)=""/25, 0x19}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, @none, 0x6}, 0xa) shutdown(r1, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000)={0x5, 0x7}, 0x2) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) shutdown(0xffffffffffffffff, 0x0) executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) recvmmsg(r1, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000005a40)=[{&(0x7f0000000040)=""/25, 0x19}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, @none, 0x6}, 0xa) shutdown(r1, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000)={0x5, 0x7}, 0x2) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) shutdown(0xffffffffffffffff, 0x0) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000014c0), 0x4) executing program 2: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in], 0x10) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r2, &(0x7f0000004b40)=[{{&(0x7f00000003c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10, &(0x7f00000036c0)=[{&(0x7f0000000400)='5', 0x1}], 0x1}}, {{&(0x7f00000037c0)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f00000038c0)=[{&(0x7f0000003800)="c1", 0x1}], 0x1}}], 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x11, &(0x7f0000000280)={r1}, 0x8) executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000880)={0x11, 0x32, 0x601, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x18}], 0x1}, 0x0) executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) executing program 2: socket$kcm(0x2, 0xa, 0x2) socket(0x11, 0x800000003, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf066505acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'veth0_to_bridge\x00', &(0x7f0000001b00)=@ethtool_per_queue_op={0x4b, 0xe}}) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x53}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 77.997983][ T5387] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)={0xa4, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x80, 0x8, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x54, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0xa4}}, 0x0) executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000040)="07000000010003", 0x7) executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcc0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x3d}, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x3, 0xb, 0x0, 0x4d00, 0x0, 0x4, {[@window={0x9, 0x3}, @timestamp={0x8, 0x2}, @generic={0x0, 0x2, "d58838068b91"}]}}}}}}, 0x4e) [ 78.218768][ T5397] Bluetooth: MGMT ver 1.22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x30}, [@ldst={0x3, 0x0, 0x3, 0xa, 0x0, 0xff00}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={@cgroup=r0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@cgroup, 0xffffffffffffffff, 0xc, 0x0, 0x0, @prog_id, r1}, 0x20) executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="b08a224d4ce57b65211e714560e421a7", 0x10}, {&(0x7f0000000180)="cf0834a484340392b5ea26f93bc41a14", 0x10}], 0x2, &(0x7f0000001840)=ANY=[], 0x20f0}, 0x0) executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x7}, @IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}}, 0x0) executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) pwrite64(r0, 0x0, 0x0, 0x0) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18010000000000000000000000000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='ext4_discard_preallocations\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='ext4_discard_preallocations\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) close(r2) executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x2e, 0x0, &(0x7f0000001dc0)) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x2e, &(0x7f0000000d80)=@framed={{}, [@ringbuf_query, @btf_id, @btf_id, @cb_func, @cb_func, @map_idx, @printk, @ringbuf_output, @printk={@s}, @ringbuf_query]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000900)={'wlan1\x00', @random='\x00\x00\x00 \x00'}) executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000700)) bind$bt_hci(r0, &(0x7f0000000040)={0x27, 0x2010}, 0x6) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000640), 0x0, 0x0) getgid() accept4$nfc_llcp(r0, &(0x7f0000001780), &(0x7f0000001800)=0x60, 0x800) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000900)={'wg1\x00'}) socket$l2tp(0x2, 0x2, 0x73) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d95c7e307963117b5a705fd4a74bc49e24aa3be35892d7aa39ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b732cda1ba46a2a42c4c333abc8eb00fb000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb41c92d40e31577a4e64c115500824170505000000000000890a2aedbe60114760c19a5feb47115ac44625090590c275a5f2cf4f8789450b8303e8fdb7449565e01a331f061e143b26ab8905449942ca2c339ffbe92f821d84b2dd89069e6b66174903a7e9be57da5d397f3333f4d76ec4d98432d6cf396b9d61858bcd5ff958da1ff886e43ffbcb2d972f43031769718daaa6105a5188ed990122303d201404e179144da06ed1e7ddff0fac2edd58ea986b3b375a050000002952902d357386f96c3e548196f1f1a3e59edcd7b9ced9b2782c41724b738a8d47236983a2db1146b7a925a02ebf7739f63057c4ae701c74622be55bd113a415f7b36818647ce0d39e3aeb2002d51ff70c1e464c5f5e26aa"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='bdi_dirty_ratelimit\x00', r3}, 0x10) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, r4, 0x0, 0x14, &(0x7f00000001c0)='\x00'}, 0x11) socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x18) r6 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) recvmmsg(r1, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000005a40)=[{&(0x7f0000000040)=""/25, 0x19}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, @none, 0x6}, 0xa) shutdown(r1, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000)={0x5, 0x7}, 0x2) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) shutdown(0xffffffffffffffff, 0x0) executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000b80)={&(0x7f0000000640)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@rthdr={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x0, 0x0, [@remote]}}}], 0x28}, 0x0) executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000003c0)=0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1f, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18010000000000000000000000000000850000002e00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10}, 0x90) [ 78.827825][ T5419] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000910000000000000000000000005000600000000000a00000000000000000000000000000000000000000000000000000000000000020001000000000000000702000000ff05000500000000000a00000000000000ff01000000000000000000000000000100000000000000000200080008"], 0x80}}, 0x0) executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r0, 0xc9c) listen(r1, 0x2) executing program 4: socket(0x22, 0x0, 0x4) [ 79.079968][ T5437] syz-executor.3[5437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @local, @remote}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000000c0)=ANY=[], 0x1c) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x10001}}}}}, 0x0) executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003a80)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000070000006b0366940400a5"], 0x18}, 0x0) executing program 1: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x4, "0400"}}}]}, 0x48}}, 0x0) executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a", 0x440) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2}, @sadb_sa={0x2}, @sadb_x_nat_t_type={0x1}, @sadb_spirange={0x2}]}, 0xffffffdb}}, 0x0) executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000002f00)={0x0, 0x0, &(0x7f0000002ec0)={&(0x7f0000002e00)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b36, &(0x7f0000000000)={'ip6_vti0\x00', @local}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000b80)={&(0x7f0000000640)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@rthdr={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x0, 0x0, [@remote]}}}], 0x28}, 0x0) executing program 4: r0 = socket$inet(0x2, 0x2, 0x1) ioctl$sock_proto_private(r0, 0x0, 0x0) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x92}], {0x95, 0x0, 0x700}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x90) executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x2}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) ioctl$TUNSETLINK(r0, 0x400454cd, 0x305) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'veth0_virt_wifi\x00'}) executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x4, 0x2, 0x1, 0x1d}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000910000000000000000000000005000600000000000a00000000000000000000000000000000000000000000000000000000000000020001000000000000000702000000ff05000500000000000a00000000000000ff01000000000000000000000000000100000000000000000200080008"], 0x80}}, 0x0) [ 79.080118][ T5437] syz-executor.3[5437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.761023][ T5098] Bluetooth: hci4: command 0x0405 tx timeout executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'caif0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x4a}}) executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x77) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001140)=[{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000300)="436317f062ecf2bf127c2c2c88ad", 0xe}, {&(0x7f0000000380)='0', 0x1}], 0x2}], 0x1, 0x0) executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001300a7cc5a8100ae541d002007000000", @ANYRES32=r1, @ANYBLOB="00000000100000001c001a80080002802d00ff0408000200f47bff"], 0x44}}, 0x0) [ 79.849635][ T5469] syz-executor.4[5469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) recvmmsg(r1, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000005a40)=[{&(0x7f0000000040)=""/25, 0x19}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, @none, 0x6}, 0xa) shutdown(r1, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000)={0x5, 0x7}, 0x2) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) shutdown(0xffffffffffffffff, 0x0) executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4018, 0x3, 0x218, 0x0, 0x0, 0x148, 0xd0, 0x148, 0x1d0, 0x240, 0x240, 0x1d0, 0x240, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x278) executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000700)) bind$bt_hci(r0, &(0x7f0000000040)={0x27, 0x2010}, 0x6) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000640), 0x0, 0x0) getgid() accept4$nfc_llcp(r0, &(0x7f0000001780), &(0x7f0000001800)=0x60, 0x800) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000900)={'wg1\x00'}) socket$l2tp(0x2, 0x2, 0x73) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='bdi_dirty_ratelimit\x00', r3}, 0x10) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, r4, 0x0, 0x14, &(0x7f00000001c0)='\x00'}, 0x11) socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x18) r6 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, 0x41, 0x107, 0x0, 0x0, {0x1, 0x7c}, [@nested={0x6, 0x3, 0x0, 0x1, [@generic='9\n']}]}, 0x1c}}, 0x0) executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000280)="02", 0x1, 0x0, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @loopback}}}, &(0x7f0000000140)=0x90) executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f, 0x30, 0x16]}}, 0x0, 0x31}, 0x20) executing program 2: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000002f00)={0x0, 0x0, &(0x7f0000002ec0)={&(0x7f0000002e00)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000700)) bind$bt_hci(r0, &(0x7f0000000040)={0x27, 0x2010}, 0x6) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000640), 0x0, 0x0) getgid() accept4$nfc_llcp(r0, &(0x7f0000001780), &(0x7f0000001800)=0x60, 0x800) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000900)={'wg1\x00'}) socket$l2tp(0x2, 0x2, 0x73) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d95c7e307963117b5a705fd4a74bc49e24aa3be35892d7aa39ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b732cda1ba46a2a42c4c333abc8eb00fb000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb41c92d40e31577a4e64c115500824170505000000000000890a2aedbe60114760c19a5feb47115ac44625090590c275a5f2cf4f8789450b8303e8fdb7449565e01a331f061e143b26ab8905449942ca2c339ffbe92f821d84b2dd89069e6b66174903a7e9be57da5d397f3333f4d76ec4d98432d6cf396b9d61858bcd5ff958da1ff886e43ffbcb2d972f43031769718daaa6105a5188ed990122303d201404e179144da06ed1e7ddff0fac2edd58ea986b3b375a050000002952902d357386f96c3e548196f1f1a3e59edcd7b9ced9b2782c41724b738a8d47236983a2db1146b7a925a02ebf7739f63057c4ae701c74622be55bd113a415f7b36818647ce0d39e3aeb2002d51ff70c1e464c5f5e26aa"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='bdi_dirty_ratelimit\x00', r3}, 0x10) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, r4, 0x0, 0x14, &(0x7f00000001c0)='\x00'}, 0x11) socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x18) r6 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x3d}, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x3, 0xb, 0x0, 0x4d00, 0x0, 0x4, {[@window={0x9, 0x3}, @timestamp={0x8, 0x2}, @generic={0x0, 0x2, "d58838068b91"}]}}}}}}, 0x4e) executing program 2: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x4, "0400"}}}]}, 0x48}}, 0x0) executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r2 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000180)) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x7fff8, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000280)={r1, 0x0, &(0x7f0000000200)=""/76}, 0x20) executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(r0, &(0x7f00000022c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x19, &(0x7f0000000000)='?', 0x1) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b36, &(0x7f0000000000)={'ip6_vti0\x00', @local}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001740)={0x14, r1, 0x309, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4018, 0x3, 0x218, 0x0, 0x0, 0x148, 0xd0, 0x148, 0x1d0, 0x240, 0x240, 0x1d0, 0x240, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x278) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x9b}, [@ldst={0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd96, &(0x7f0000000080)=""/201, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd56, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x58, r0, 0x801, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "4abee339084eeef16f162471f4"}, @NL80211_KEY_TYPE={0x8}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}]}]}, 0x58}}, 0x0) executing program 1: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8004}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000000c0)={0x20, r1, 0xd13, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000300)={'ipvlan0\x00', {0x2, 0x0, @private=0x80000000}}) executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005f3f770005000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) [ 79.849788][ T5469] syz-executor.4[5469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.000632][ T5526] syz-executor.3[5526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b36, &(0x7f0000000000)={'ip6_vti0\x00', @local}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000380)=0x7, 0x4) sendto$inet6(r0, 0x0, 0xffffff65, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x12001, 0x0, 0x0) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000f40)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000003700)={0x0, 0x10000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x40, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x888e}, @NL80211_ATTR_FRAME={0xe, 0x33, @ctrl_frame=@ack={{}, {}, @device_b}}]}, 0x40}}, 0x0) executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x5c, 0x18, 0xa, 0x101, 0xb00, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x30, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge_slave_0\x00'}, {0x14, 0x1, 'vcan0\x00'}]}]}]}], {0x14, 0x10}}, 0xe4}}, 0x0) [ 81.038701][ T5526] syz-executor.3[5526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.179678][ T5536] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 81.221265][ T5536] netlink: 'syz-executor.2': attribute type 5 has an invalid length. executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4018, 0x3, 0x218, 0x0, 0x0, 0x148, 0xd0, 0x148, 0x1d0, 0x240, 0x240, 0x1d0, 0x240, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x278) executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00', @random="4f33e363a4b1"}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001300)={{}, &(0x7f0000001280), &(0x7f00000012c0)='%+9llu \x00'}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r2 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000180)) executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000340)=0xc23, 0x4) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x7fff8, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000280)={r1, 0x0, &(0x7f0000000200)=""/76}, 0x20) [ 81.425243][ T5546] bridge0: port 1(bridge_slave_0) entered disabled state executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8a", 0x440) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2}, @sadb_sa={0x2}, @sadb_x_nat_t_type={0x1}, @sadb_spirange={0x2}]}, 0xffffffdb}}, 0x0) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001740)={0x14, r1, 0x309, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) [ 81.544725][ T5546] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.551999][ T5546] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 4: socket(0x23, 0x0, 0x7f0) executing program 1: r0 = socket(0xa, 0x3, 0x3a) getsockopt$nfc_llcp(r0, 0x3a, 0x1, 0x0, 0x20000000) executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x38, r1, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x38}}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)='D', 0x1, 0x8000, 0x0, 0x0) shutdown(r0, 0x2) executing program 3: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8004}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000000c0)={0x20, r1, 0xd13, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x4}]}, 0x24}}, 0x0) executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x33, 0x7, 'system_u:object_r:unconfined_execmem_exec_t:s0\x00'}]}, 0x48}}, 0x0) executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x33, 0x7, 'system_u:object_r:unconfined_execmem_exec_t:s0\x00'}]}, 0x48}}, 0x0) executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000240)='l', 0x1}], 0x1}}], 0x1, 0x8000) sendmsg$rds(r1, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000001dc0)=""/90, 0x5a}], 0x1}, 0x0) executing program 1: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x2}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffd}, [@call={0x85, 0x0, 0x0, 0x36}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {0x2a}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x6a) [ 82.306753][ T5575] [ 82.309119][ T5575] ====================================================== [ 82.316138][ T5575] WARNING: possible circular locking dependency detected [ 82.323143][ T5575] 6.9.0-rc5-syzkaller-01459-gc2e6a872bde9 #0 Not tainted [ 82.330145][ T5575] ------------------------------------------------------ [ 82.337178][ T5575] syz-executor.1/5575 is trying to acquire lock: [ 82.343485][ T5575] ffffffff8f735ba8 (rfcomm_mutex){+.+.}-{3:3}, at: rfcomm_dlc_exists+0xa6/0x380 [ 82.352545][ T5575] [ 82.352545][ T5575] but task is already holding lock: [ 82.359888][ T5575] ffffffff8f739708 (rfcomm_ioctl_mutex){+.+.}-{3:3}, at: rfcomm_dev_ioctl+0x237/0x21b0 [ 82.369555][ T5575] [ 82.369555][ T5575] which lock already depends on the new lock. [ 82.369555][ T5575] [ 82.379970][ T5575] [ 82.379970][ T5575] the existing dependency chain (in reverse order) is: [ 82.388980][ T5575] [ 82.388980][ T5575] -> #3 (rfcomm_ioctl_mutex){+.+.}-{3:3}: [ 82.396882][ T5575] lock_acquire+0x1ed/0x550 [ 82.401916][ T5575] __mutex_lock+0x136/0xd70 [ 82.406949][ T5575] rfcomm_dev_ioctl+0x237/0x21b0 [ 82.412429][ T5575] rfcomm_sock_ioctl+0x86/0xd0 [ 82.417720][ T5575] sock_do_ioctl+0x158/0x460 [ 82.422835][ T5575] sock_ioctl+0x629/0x8e0 [ 82.427685][ T5575] __se_sys_ioctl+0xfc/0x170 [ 82.432788][ T5575] do_syscall_64+0xf5/0x240 [ 82.437817][ T5575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.444219][ T5575] [ 82.444219][ T5575] -> #2 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}: [ 82.453599][ T5575] lock_acquire+0x1ed/0x550 [ 82.458610][ T5575] lock_sock_nested+0x48/0x100 [ 82.463891][ T5575] rfcomm_sk_state_change+0x5b/0x310 [ 82.469690][ T5575] __rfcomm_dlc_close+0x26f/0x6a0 [ 82.475224][ T5575] rfcomm_dlc_close+0xf1/0x190 [ 82.480531][ T5575] __rfcomm_sock_close+0x121/0x250 [ 82.486158][ T5575] rfcomm_sock_shutdown+0xb8/0x240 [ 82.491789][ T5575] __se_sys_shutdown+0x14e/0x1b0 [ 82.497243][ T5575] do_syscall_64+0xf5/0x240 [ 82.502256][ T5575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.508659][ T5575] [ 82.508659][ T5575] -> #1 (&d->lock){+.+.}-{3:3}: [ 82.515685][ T5575] lock_acquire+0x1ed/0x550 [ 82.520713][ T5575] __mutex_lock+0x136/0xd70 [ 82.525732][ T5575] __rfcomm_dlc_close+0x226/0x6a0 [ 82.531265][ T5575] rfcomm_dlc_close+0xf1/0x190 [ 82.536538][ T5575] __rfcomm_sock_close+0x121/0x250 [ 82.542159][ T5575] rfcomm_sock_shutdown+0xb8/0x240 [ 82.547780][ T5575] __se_sys_shutdown+0x14e/0x1b0 [ 82.553229][ T5575] do_syscall_64+0xf5/0x240 [ 82.558244][ T5575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.564656][ T5575] [ 82.564656][ T5575] -> #0 (rfcomm_mutex){+.+.}-{3:3}: [ 82.572034][ T5575] validate_chain+0x18cb/0x58e0 [ 82.577401][ T5575] __lock_acquire+0x1346/0x1fd0 [ 82.582757][ T5575] lock_acquire+0x1ed/0x550 [ 82.587770][ T5575] __mutex_lock+0x136/0xd70 [ 82.592800][ T5575] rfcomm_dlc_exists+0xa6/0x380 [ 82.598176][ T5575] rfcomm_dev_ioctl+0xb31/0x21b0 [ 82.603635][ T5575] rfcomm_sock_ioctl+0x86/0xd0 [ 82.608932][ T5575] sock_do_ioctl+0x158/0x460 [ 82.614048][ T5575] sock_ioctl+0x629/0x8e0 [ 82.618897][ T5575] __se_sys_ioctl+0xfc/0x170 [ 82.624003][ T5575] do_syscall_64+0xf5/0x240 [ 82.629046][ T5575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.635507][ T5575] [ 82.635507][ T5575] other info that might help us debug this: [ 82.635507][ T5575] [ 82.645723][ T5575] Chain exists of: [ 82.645723][ T5575] rfcomm_mutex --> sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM --> rfcomm_ioctl_mutex [ 82.645723][ T5575] [ 82.660486][ T5575] Possible unsafe locking scenario: [ 82.660486][ T5575] [ 82.667955][ T5575] CPU0 CPU1 [ 82.673323][ T5575] ---- ---- [ 82.678685][ T5575] lock(rfcomm_ioctl_mutex); [ 82.683362][ T5575] lock(sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM); [ 82.692120][ T5575] lock(rfcomm_ioctl_mutex); [ 82.699305][ T5575] lock(rfcomm_mutex); [ 82.703455][ T5575] [ 82.703455][ T5575] *** DEADLOCK *** [ 82.703455][ T5575] [ 82.711591][ T5575] 2 locks held by syz-executor.1/5575: [ 82.717030][ T5575] #0: ffff888023998258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sock_ioctl+0x78/0xd0 [ 82.728424][ T5575] #1: ffffffff8f739708 (rfcomm_ioctl_mutex){+.+.}-{3:3}, at: rfcomm_dev_ioctl+0x237/0x21b0 [ 82.738509][ T5575] [ 82.738509][ T5575] stack backtrace: [ 82.744383][ T5575] CPU: 1 PID: 5575 Comm: syz-executor.1 Not tainted 6.9.0-rc5-syzkaller-01459-gc2e6a872bde9 #0 [ 82.754690][ T5575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 82.764731][ T5575] Call Trace: [ 82.768019][ T5575] [ 82.770945][ T5575] dump_stack_lvl+0x241/0x360 [ 82.775630][ T5575] ? __pfx_dump_stack_lvl+0x10/0x10 [ 82.780824][ T5575] ? print_circular_bug+0x130/0x1a0 [ 82.786020][ T5575] check_noncircular+0x36a/0x4a0 [ 82.790948][ T5575] ? __pfx_check_noncircular+0x10/0x10 [ 82.796396][ T5575] ? lockdep_lock+0x123/0x2b0 [ 82.801062][ T5575] ? _find_first_zero_bit+0xd4/0x100 [ 82.806342][ T5575] validate_chain+0x18cb/0x58e0 [ 82.811188][ T5575] ? mark_lock+0x9a/0x350 [ 82.815512][ T5575] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 82.821480][ T5575] ? __pfx_validate_chain+0x10/0x10 [ 82.826666][ T5575] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 82.832979][ T5575] ? do_raw_spin_unlock+0x13c/0x8b0 [ 82.838170][ T5575] ? finish_task_switch+0x1e5/0x870 [ 82.843356][ T5575] ? lockdep_hardirqs_on+0x99/0x150 [ 82.848544][ T5575] ? finish_task_switch+0x1e5/0x870 [ 82.853745][ T5575] ? __schedule+0x17f0/0x4a50 [ 82.858425][ T5575] ? mark_lock+0x9a/0x350 [ 82.862746][ T5575] ? __pfx_validate_chain+0x10/0x10 [ 82.867937][ T5575] __lock_acquire+0x1346/0x1fd0 [ 82.872786][ T5575] lock_acquire+0x1ed/0x550 [ 82.877279][ T5575] ? rfcomm_dlc_exists+0xa6/0x380 [ 82.882383][ T5575] ? __pfx_lock_acquire+0x10/0x10 [ 82.887397][ T5575] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 82.893711][ T5575] ? __pfx___might_resched+0x10/0x10 [ 82.898995][ T5575] ? irqentry_exit+0x63/0x90 [ 82.903578][ T5575] __mutex_lock+0x136/0xd70 [ 82.908070][ T5575] ? rfcomm_dlc_exists+0xa6/0x380 [ 82.913106][ T5575] ? lock_acquire+0x264/0x550 [ 82.917781][ T5575] ? rfcomm_dlc_exists+0xa6/0x380 [ 82.922803][ T5575] ? __pfx___mutex_lock+0x10/0x10 [ 82.927818][ T5575] ? aa_get_newest_label+0xff/0x6f0 [ 82.933012][ T5575] ? __pfx_aa_get_newest_label+0x10/0x10 [ 82.938633][ T5575] ? __might_fault+0xaa/0x120 [ 82.943303][ T5575] rfcomm_dlc_exists+0xa6/0x380 [ 82.948144][ T5575] ? apparmor_capable+0x138/0x1b0 [ 82.953183][ T5575] ? __pfx_rfcomm_dlc_exists+0x10/0x10 [ 82.958739][ T5575] ? bpf_lsm_capable+0x9/0x10 [ 82.963422][ T5575] ? security_capable+0x90/0xb0 [ 82.968293][ T5575] rfcomm_dev_ioctl+0xb31/0x21b0 [ 82.973251][ T5575] ? __pfx_rfcomm_dev_ioctl+0x10/0x10 [ 82.978624][ T5575] ? __local_bh_enable_ip+0x168/0x200 [ 82.983993][ T5575] ? lockdep_hardirqs_on+0x99/0x150 [ 82.989189][ T5575] ? __local_bh_enable_ip+0x168/0x200 [ 82.994554][ T5575] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 83.000260][ T5575] ? do_raw_spin_unlock+0x13c/0x8b0 [ 83.005457][ T5575] rfcomm_sock_ioctl+0x86/0xd0 [ 83.010234][ T5575] sock_do_ioctl+0x158/0x460 [ 83.014907][ T5575] ? __pfx_sock_do_ioctl+0x10/0x10 [ 83.020006][ T5575] ? __pfx_lock_acquire+0x10/0x10 [ 83.025023][ T5575] sock_ioctl+0x629/0x8e0 [ 83.029341][ T5575] ? __pfx_sock_ioctl+0x10/0x10 [ 83.034179][ T5575] ? __fget_files+0x28/0x470 [ 83.038757][ T5575] ? bpf_lsm_file_ioctl+0x9/0x10 [ 83.043678][ T5575] ? security_file_ioctl+0x87/0xb0 [ 83.048776][ T5575] ? __pfx_sock_ioctl+0x10/0x10 [ 83.053618][ T5575] __se_sys_ioctl+0xfc/0x170 [ 83.058196][ T5575] do_syscall_64+0xf5/0x240 [ 83.062694][ T5575] ? clear_bhb_loop+0x35/0x90 [ 83.067362][ T5575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.073245][ T5575] RIP: 0033:0x7fa8c867dea9 [ 83.077649][ T5575] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 83.097250][ T5575] RSP: 002b:00007fa8c93e00c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 83.105655][ T5575] RAX: ffffffffffffffda RBX: 00007fa8c87abf80 RCX: 00007fa8c867dea9 [ 83.113614][ T5575] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000004 [ 83.121574][ T5575] RBP: 00007fa8c86ca4a4 R08: 0000000000000000 R09: 0000000000000000 [ 83.129531][ T5575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 83.137501][ T5575] R13: 000000000000000b R14: 00007fa8c87abf80 R15: 00007fffcf319098 [ 83.145472][ T5575] [ 83.176219][ T926] cfg80211: failed to load regulatory.db [ 83.634685][ T5613] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 83.679524][ T5613] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 83.728979][ T5613] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 84.523303][ T5684] openvswitch: netlink: Duplicate key (type 0). [ 84.611205][ T5694] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 84.985803][ T5719] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 84.988287][ T5720] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 85.130543][ T5727] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 85.304166][ T5740] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 85.602331][ T5762] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 86.075645][ T5795] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 86.145871][ T5801] tipc: Enabling of bearer rejected, failed to enable media [ 86.294206][ T5814] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 87.637065][ T5913] netlink: 132 bytes leftover after parsing attributes in process `syz-executor.4'. [ 90.102619][ T6079] warning: `syz-executor.4' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 90.197059][ T5098] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 90.205314][ T5098] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 90.215171][ T5098] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 90.223123][ T5098] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 90.230648][ T5098] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 90.240423][ T5098] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 90.362658][ T6082] chnl_net:caif_netlink_parms(): no params data found [ 90.504251][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.589689][ T6082] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.603287][ T6082] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.610499][ T6082] bridge_slave_0: entered allmulticast mode [ 90.620968][ T6082] bridge_slave_0: entered promiscuous mode [ 90.638106][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.666041][ T6082] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.674930][ T6082] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.685591][ T6082] bridge_slave_1: entered allmulticast mode [ 90.694709][ T6082] bridge_slave_1: entered promiscuous mode [ 90.718335][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.842421][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.904207][ T6082] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.945130][ T6082] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.964321][ T6119] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 91.070355][ T6082] team0: Port device team_slave_0 added [ 91.127006][ T6082] team0: Port device team_slave_1 added [ 91.271279][ T6082] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 91.321770][ T6082] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 91.375634][ T6082] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 91.420183][ T11] bridge_slave_1: left allmulticast mode [ 91.441398][ T11] bridge_slave_1: left promiscuous mode [ 91.447145][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.488406][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.827910][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 91.857162][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 91.875436][ T11] bond0 (unregistering): Released all slaves [ 91.889112][ T6082] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 91.896436][ T6082] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 91.923230][ T6082] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 92.141012][ T6082] hsr_slave_0: entered promiscuous mode [ 92.156746][ T6082] hsr_slave_1: entered promiscuous mode [ 92.177828][ T6082] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 92.188945][ T6082] Cannot create hsr debugfs directory [ 92.197864][ T6172] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 92.221651][ T6182] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'.