last executing test programs: 1.592516221s ago: executing program 3 (id=4): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0a0000000400000006000000ff00000042"], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x2000000, 0x1, 0x0, 0x1, "ff00f7000000000000000000af88008300"}) r1 = syz_open_pts(r0, 0x141601) socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc, 0x0, 0x0, "682341f2fd71a6a76177920ea7e60c0ac7a4a5"}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000080), 0x10) ioperm(0x83, 0xd59, 0x8) sendmsg$can_bcm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x48850}, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) timerfd_create(0x1, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r3, 0xffffffffffffffff, 0x0) 1.282089081s ago: executing program 2 (id=3): r0 = getpid() setreuid(0xee00, 0x0) syz_pidfd_open(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r3, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, r3, 0xe27, 0x0, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x0) 1.21109864s ago: executing program 1 (id=2): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f00000002c0)=""/4094, 0xffe}], 0x1, 0xf0, 0x3) 1.168470731s ago: executing program 2 (id=6): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRES8=r0, @ANYRESOCT=r0], 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)={[{0x2b, 'cpu'}, {0x2b, 'net_prio'}, {0x2b, 'cpu'}]}, 0x14) set_mempolicy(0x3, &(0x7f00000000c0)=0x5, 0xa) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xbb) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r2}, 0x10) listen(0xffffffffffffffff, 0x3) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000280)='kmem_cache_free\x00', r6, 0x0, 0x1008}, 0x18) io_getevents(0x0, 0xf, 0x0, &(0x7f00000003c0), &(0x7f0000000800)) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0xffffff1f, 0xfffffffc, 0x25dfdbff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r7}]}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) r9 = semget(0x1, 0x3, 0x202) (fail_nth: 5) semctl$SEM_STAT_ANY(r9, 0x1, 0x14, &(0x7f0000000200)=""/35) 1.104536341s ago: executing program 1 (id=7): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r2, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="364000002600913e"], 0xfe33) 1.082613501s ago: executing program 0 (id=1): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, r2, 0xe27, 0x0, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x0) 725.639691ms ago: executing program 3 (id=8): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r1, &(0x7f0000000180), &(0x7f0000000080)=0x6e) socket(0x1, 0x803, 0x0) (async) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 527.14373ms ago: executing program 2 (id=9): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r2, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) (fail_nth: 1) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="364000002600913e"], 0xfe33) 515.73877ms ago: executing program 0 (id=10): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES64=r1], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r3, &(0x7f0000000e40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000740)="6042ffaeae4c", 0x6}], 0x1}}], 0x1, 0x48000) shutdown(r3, 0x1) r4 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x101000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x26) r5 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r6, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r6, 0x0) ioctl$TCSETS(r5, 0x8926, 0x0) pipe(0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c03, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x5, 0x30, 0x80000001, 0xfffffffffffffffc}, &(0x7f0000000100)=0x18) r7 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r7, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="364000002600913e"], 0xfe33) 311.86588ms ago: executing program 2 (id=11): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, r2, 0xe27, 0x0, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x0) 295.33686ms ago: executing program 1 (id=12): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000020000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4}, &(0x7f0000000040), &(0x7f0000000140)=r3}, 0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)={0x2}) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/53}, 0x20) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='.\x00', 0xc0000484) creat(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010000000000e4ff0400000000000000100000000000000020"], 0x24, 0x0) readv(r5, &(0x7f00000007c0)=[{&(0x7f0000000100)=""/182, 0xb6}, {0x0}], 0x2) 264.37789ms ago: executing program 3 (id=13): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x80000, 0x0, 0x0, 0x0, 0x66, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) fsetxattr$security_selinux(r1, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) 263.99342ms ago: executing program 1 (id=14): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) name_to_handle_at(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 203.86644ms ago: executing program 0 (id=15): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0xf1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = syz_io_uring_setup(0xd2, &(0x7f0000000480)={0x0, 0x0, 0x80, 0x1, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2c, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x42, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, {0x2}}) io_uring_enter(r2, 0x47bc, 0x2, 0x0, 0x0, 0x0) 203.4495ms ago: executing program 3 (id=16): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1b3a, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000020000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)={0x2}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/53}, 0x20) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='.\x00', 0xc0000484) creat(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010000000000e4ff0400000000000000100000000000000020"], 0x24, 0x0) readv(r4, &(0x7f00000007c0)=[{&(0x7f0000000100)=""/182, 0xb6}, {0x0}], 0x2) 187.91164ms ago: executing program 1 (id=17): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mknod(&(0x7f0000000280)='./file0\x00', 0x1ffa, 0xfffffffc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = dup(0xffffffffffffffff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) syz_io_uring_setup(0x20000040, &(0x7f0000000700)={0x0, 0x0, 0x80, 0x2, 0xfffffffd}, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000000)={r6, 0x1, 0x6}, 0x10) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route_sched(r7, &(0x7f00000003c0)={0x0, 0xfffffe03, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdc03, {0x0, 0x0, 0x0, r6, {0xc}, {0xfff3}}}, 0x24}}, 0x20040000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x13, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x9b, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000001780)={@mcast2, 0x0}, &(0x7f00000017c0)=0x14) getsockname$packet(r2, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r11, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r13, {0x0, 0xfff7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x4, 0x40000000, 0x1000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10200, 0x5d2, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x15e9, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xcad, 0x0, 0x0, 0xfffffffd, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x7e98263b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x9, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x7, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x800, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0xa42, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0x10, 0x0, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0x0, 0xc0000000}, {0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x6, 0x30, 0x2000000}}]}}]}, 0x45c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000001b40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001b00)={&(0x7f0000001880)={0x27c, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x4}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x8b9e767bcebdeef5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x97d2321deda2666f}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x27c}, 0x1, 0x0, 0x0, 0x4000}, 0x40040) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000005c0)={0x4, &(0x7f00000002c0)=[{0x3, 0xeb, 0x8, 0x8}, {0x7f, 0x6e, 0x4, 0x6}, {0x8, 0x4, 0x9, 0x4}, {0x3ff, 0x7f, 0x0, 0x1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) linkat(0xffffffffffffffff, &(0x7f00000004c0)='./file1/file3\x00', 0xffffffffffffffff, 0x0, 0x400) faccessat2(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x2, 0x0) 178.3672ms ago: executing program 2 (id=18): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f00000003c0)='system_u:object_r:checkpolicy_exec_t:s0\x00', 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, &(0x7f0000000880), 0x0}, 0x20) 172.003581ms ago: executing program 4 (id=5): capset(&(0x7f00000004c0)={0x20080522}, &(0x7f0000000500)={0x0, 0x7, 0x0, 0x0, 0x0, 0x3cd}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2101, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x3, 0x0, 0x0, "0062ba7d82000000000000000000f7fffeff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0xff) r4 = syz_open_pts(r0, 0x40a000) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000000)=ANY=[], 0x48) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) inotify_rm_watch(0xffffffffffffffff, 0x0) shmdt(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='xdp_exception\x00', r5, 0x0, 0x2}, 0x18) r6 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="80", 0xfdef}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/248, 0xf8}], 0x1}, 0x10100) sendmsg$inet(r6, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="dc59", 0x58}], 0x1}, 0x10001) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3477, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$vsock_stream(0x28, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ioctl$TCFLSH(r4, 0x5608, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) 169.14365ms ago: executing program 0 (id=19): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x6390, &(0x7f0000000000)={0x0, 0x6221, 0x4000, 0x3, 0x398, 0x0, r0}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r2, 0xb, &(0x7f0000000080), 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) syz_read_part_table(0x1053, &(0x7f0000002100)="$eJzsz7ENwjAQBdCfBIWMwSgpGAF2YAaqsAcTsAE9JbMgMYGRCwsmQCneKyxL/+5LF9ZirM/5malkGfPuvkmfZDsPQ/1PKUObLmOm34Zln+RegzKn9G33cboe0mUzJ+l2r1zSuo+3/50HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOv1CQAA//9CWA/n") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x10000}, 0x18) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r6, 0x40043311, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2008800, &(0x7f0000000080), 0x1, 0x651, &(0x7f0000000800)="$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") lsm_set_self_attr(0x64, 0x0, 0xe3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000240)={0x1, 0x4, 0x5dd, 0x7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000004c000000050a01020000100000000000010020000c00024000000000000000010900010073797a310000000020000480140003006e657464657673696d300000000000000800014000000005"], 0xd4}}, 0x0) 122.95443ms ago: executing program 3 (id=20): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)}, 0x48810) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x7, 0x0, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, &(0x7f0000000180)="5ca44104bacbd4ed9a63193f03d96fcefefd4c56923e051251f71eefebe02d", 0x1f, 0x0, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000080)) 101.85217ms ago: executing program 2 (id=21): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="05000c0004000000ff0f000005", @ANYRESDEC=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x0, 0x1, 0x1ff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x2a, 0x2, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x266b90d379bdf09, 0x11, r1, 0x8) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16=0x0, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2ee, &(0x7f00000006c0)="$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") r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r8, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r8, 0x0) fdatasync(r8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mlock2(&(0x7f0000004000/0x4000)=nil, 0x40ef, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000080)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0xfffa, 0x2}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x800}]}}]}, 0x3c}}, 0x24000000) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)={'tunl0\x00', r5, 0x8, 0x7, 0x1, 0xf, {{0x5, 0x4, 0x1, 0x5, 0x14, 0x68, 0x0, 0x2, 0x2d, 0x0, @remote, @loopback}}}}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000ac0)={0x28, r9, 0xacf5e67dd0b583a1, 0x0, 0x0, {{0x5}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 0s ago: executing program 3 (id=22): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0a0000000400000006000000ff00000042"], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x2000000, 0x1, 0x0, 0x1, "ff00f7000000000000000000af88008300"}) r1 = syz_open_pts(r0, 0x141601) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0xfffffffc, 0x0, 0x0, "682341f2fd71a6a76177920ea7e60c0ac7a4a5"}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000080), 0x10) ioperm(0x83, 0xd59, 0x8) sendmsg$can_bcm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x48850}, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) timerfd_create(0x1, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r4, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.165' (ED25519) to the list of known hosts. [ 28.684312][ T29] audit: type=1400 audit(1741057466.868:82): avc: denied { mounton } for pid=3288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.685345][ T3288] cgroup: Unknown subsys name 'net' [ 28.707062][ T29] audit: type=1400 audit(1741057466.868:83): avc: denied { mount } for pid=3288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.734442][ T29] audit: type=1400 audit(1741057466.908:84): avc: denied { unmount } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.911208][ T3288] cgroup: Unknown subsys name 'cpuset' [ 28.917395][ T3288] cgroup: Unknown subsys name 'rlimit' [ 29.049061][ T29] audit: type=1400 audit(1741057467.228:85): avc: denied { setattr } for pid=3288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.072382][ T29] audit: type=1400 audit(1741057467.228:86): avc: denied { create } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.092961][ T29] audit: type=1400 audit(1741057467.238:87): avc: denied { write } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.113342][ T29] audit: type=1400 audit(1741057467.238:88): avc: denied { read } for pid=3288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.133616][ T29] audit: type=1400 audit(1741057467.258:89): avc: denied { mounton } for pid=3288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.158439][ T29] audit: type=1400 audit(1741057467.258:90): avc: denied { mount } for pid=3288 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 29.166470][ T3290] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 29.190668][ T29] audit: type=1400 audit(1741057467.378:91): avc: denied { relabelto } for pid=3290 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.238347][ T3288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.314129][ T3297] chnl_net:caif_netlink_parms(): no params data found [ 30.366476][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 30.392154][ T3301] chnl_net:caif_netlink_parms(): no params data found [ 30.432539][ T3297] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.439689][ T3297] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.446990][ T3297] bridge_slave_0: entered allmulticast mode [ 30.453480][ T3297] bridge_slave_0: entered promiscuous mode [ 30.476132][ T3297] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.483271][ T3297] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.490674][ T3297] bridge_slave_1: entered allmulticast mode [ 30.498138][ T3297] bridge_slave_1: entered promiscuous mode [ 30.511807][ T3298] chnl_net:caif_netlink_parms(): no params data found [ 30.544903][ T3297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.570371][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.577463][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.584907][ T3304] bridge_slave_0: entered allmulticast mode [ 30.591737][ T3304] bridge_slave_0: entered promiscuous mode [ 30.599121][ T3297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.619424][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.626575][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.633795][ T3304] bridge_slave_1: entered allmulticast mode [ 30.640286][ T3304] bridge_slave_1: entered promiscuous mode [ 30.670463][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 30.681736][ T3301] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.688863][ T3301] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.696044][ T3301] bridge_slave_0: entered allmulticast mode [ 30.702494][ T3301] bridge_slave_0: entered promiscuous mode [ 30.714069][ T3297] team0: Port device team_slave_0 added [ 30.735931][ T3301] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.743039][ T3301] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.751004][ T3301] bridge_slave_1: entered allmulticast mode [ 30.757582][ T3301] bridge_slave_1: entered promiscuous mode [ 30.769102][ T3297] team0: Port device team_slave_1 added [ 30.781743][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.794541][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.803864][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.810953][ T3298] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.818245][ T3298] bridge_slave_0: entered allmulticast mode [ 30.824762][ T3298] bridge_slave_0: entered promiscuous mode [ 30.831573][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.838737][ T3298] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.846478][ T3298] bridge_slave_1: entered allmulticast mode [ 30.852981][ T3298] bridge_slave_1: entered promiscuous mode [ 30.887575][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.902093][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.909088][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.935136][ T3297] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.949054][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.956092][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.982094][ T3297] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.994043][ T3304] team0: Port device team_slave_0 added [ 31.003156][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.013833][ T3298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.024351][ T3298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.036080][ T3304] team0: Port device team_slave_1 added [ 31.068445][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.075472][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.101530][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.117718][ T3301] team0: Port device team_slave_0 added [ 31.128450][ T3298] team0: Port device team_slave_0 added [ 31.143487][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.150495][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.176451][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.187968][ T3301] team0: Port device team_slave_1 added [ 31.199388][ T3298] team0: Port device team_slave_1 added [ 31.211806][ T3297] hsr_slave_0: entered promiscuous mode [ 31.217799][ T3297] hsr_slave_1: entered promiscuous mode [ 31.224189][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.231430][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.238649][ T3308] bridge_slave_0: entered allmulticast mode [ 31.245200][ T3308] bridge_slave_0: entered promiscuous mode [ 31.254194][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.261312][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.268620][ T3308] bridge_slave_1: entered allmulticast mode [ 31.275152][ T3308] bridge_slave_1: entered promiscuous mode [ 31.308495][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.315946][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.342715][ T3301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.368798][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.379041][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.395696][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.402743][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.428767][ T3301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.439764][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.446895][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.473087][ T3298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.506150][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.513225][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.539256][ T3298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.552042][ T3304] hsr_slave_0: entered promiscuous mode [ 31.558182][ T3304] hsr_slave_1: entered promiscuous mode [ 31.564163][ T3304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.571797][ T3304] Cannot create hsr debugfs directory [ 31.582978][ T3308] team0: Port device team_slave_0 added [ 31.598353][ T3308] team0: Port device team_slave_1 added [ 31.644378][ T3298] hsr_slave_0: entered promiscuous mode [ 31.650311][ T3298] hsr_slave_1: entered promiscuous mode [ 31.656227][ T3298] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.664231][ T3298] Cannot create hsr debugfs directory [ 31.678197][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.685208][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.711783][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.724727][ T3301] hsr_slave_0: entered promiscuous mode [ 31.731140][ T3301] hsr_slave_1: entered promiscuous mode [ 31.737004][ T3301] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.744780][ T3301] Cannot create hsr debugfs directory [ 31.768279][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.775352][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.801590][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.863469][ T3308] hsr_slave_0: entered promiscuous mode [ 31.869411][ T3308] hsr_slave_1: entered promiscuous mode [ 31.875928][ T3308] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.883538][ T3308] Cannot create hsr debugfs directory [ 31.952102][ T3297] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.975339][ T3297] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.985919][ T3297] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.002803][ T3297] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.042572][ T3304] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 32.051524][ T3304] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 32.065407][ T3304] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 32.075252][ T3304] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 32.101646][ T3298] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.111810][ T3298] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.126975][ T3298] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.137008][ T3298] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.172491][ T3301] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.192063][ T3301] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.211508][ T3301] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.236667][ T3301] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.251841][ T3297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.258952][ T3308] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 32.270678][ T3308] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 32.279728][ T3308] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.289441][ T3308] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.316510][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.325181][ T3297] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.340652][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.350634][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.357752][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.366691][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.373771][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.406333][ T3298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.420597][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.427838][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.462603][ T145] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.469776][ T145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.483179][ T3298] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.505810][ T145] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.512999][ T145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.535085][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.542712][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.561589][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.578178][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.588811][ T3301] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.602756][ T3298] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.613225][ T3298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.641432][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.673705][ T3297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.682774][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.689905][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.699030][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.706194][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.715362][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.722433][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.740278][ T145] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.747455][ T145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.786131][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.799491][ T3298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.831209][ T3308] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.899362][ T3301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.954605][ T3297] veth0_vlan: entered promiscuous mode [ 32.966920][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.981373][ T3304] veth0_vlan: entered promiscuous mode [ 32.989232][ T3304] veth1_vlan: entered promiscuous mode [ 33.000300][ T3297] veth1_vlan: entered promiscuous mode [ 33.013483][ T3298] veth0_vlan: entered promiscuous mode [ 33.039285][ T3297] veth0_macvtap: entered promiscuous mode [ 33.051568][ T3298] veth1_vlan: entered promiscuous mode [ 33.058916][ T3297] veth1_macvtap: entered promiscuous mode [ 33.080016][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.100659][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.118649][ T3297] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.127568][ T3297] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.136393][ T3297] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.145223][ T3297] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.156797][ T3298] veth0_macvtap: entered promiscuous mode [ 33.163571][ T3304] veth0_macvtap: entered promiscuous mode [ 33.182301][ T3298] veth1_macvtap: entered promiscuous mode [ 33.189316][ T3304] veth1_macvtap: entered promiscuous mode [ 33.203866][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.214422][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.226180][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.234687][ T3301] veth0_vlan: entered promiscuous mode [ 33.244203][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.254728][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.264586][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.275060][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.286663][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.299782][ T3298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.310370][ T3298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.321796][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.329688][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.340216][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.350131][ T3304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.360649][ T3304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.371685][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.384296][ T3301] veth1_vlan: entered promiscuous mode [ 33.394488][ T3298] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.403378][ T3298] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.412154][ T3298] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.420889][ T3298] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.435987][ T3304] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.444847][ T3304] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.453602][ T3304] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.462373][ T3304] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.474302][ T3297] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.485530][ T3301] veth0_macvtap: entered promiscuous mode [ 33.496864][ T3301] veth1_macvtap: entered promiscuous mode [ 33.531590][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.542182][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.552179][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.562654][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.572514][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.583007][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.593689][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.609797][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.620314][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.630230][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.640800][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.650723][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.661222][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.671886][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.679724][ T3308] veth0_vlan: entered promiscuous mode [ 33.691098][ T3301] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.699851][ T3301] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.708695][ T3301] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.717589][ T3301] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.734352][ T3308] veth1_vlan: entered promiscuous mode [ 33.744983][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 33.745000][ T29] audit: type=1400 audit(1741057471.928:145): avc: denied { create } for pid=3435 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.771631][ T29] audit: type=1400 audit(1741057471.928:146): avc: denied { connect } for pid=3435 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.791007][ T29] audit: type=1400 audit(1741057471.928:147): avc: denied { write } for pid=3435 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.794159][ T3308] veth0_macvtap: entered promiscuous mode [ 33.836871][ T3308] veth1_macvtap: entered promiscuous mode [ 33.850643][ T29] audit: type=1400 audit(1741057472.028:148): avc: denied { prog_load } for pid=3442 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 33.869420][ T29] audit: type=1400 audit(1741057472.028:149): avc: denied { perfmon } for pid=3442 comm="syz.2.3" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 33.896652][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.907260][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.911158][ T29] audit: type=1400 audit(1741057472.098:150): avc: denied { prog_run } for pid=3444 comm="syz.2.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 33.917162][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.946201][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.956219][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.966779][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.976784][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.987353][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.001242][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.031628][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.034551][ T29] audit: type=1326 audit(1741057472.188:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz.2.6" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce489d169 code=0x7ffc0000 [ 34.042104][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.042118][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.042136][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.065145][ T29] audit: type=1326 audit(1741057472.188:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz.2.6" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9ce489d169 code=0x7ffc0000 [ 34.075010][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.075048][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.075058][ T3308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.075072][ T3308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.079739][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.085527][ T29] audit: type=1326 audit(1741057472.188:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz.2.6" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce489d169 code=0x7ffc0000 [ 34.085560][ T29] audit: type=1326 audit(1741057472.188:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz.2.6" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9ce489d169 code=0x7ffc0000 [ 34.096505][ T3453] FAULT_INJECTION: forcing a failure. [ 34.096505][ T3453] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 34.145581][ T3308] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.149533][ T3453] CPU: 0 UID: 0 PID: 3453 Comm: syz.2.6 Not tainted 6.14.0-rc5-syzkaller-00013-g99fa936e8e4f #0 [ 34.149567][ T3453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.149584][ T3453] Call Trace: [ 34.149600][ T3453] [ 34.149609][ T3453] dump_stack_lvl+0xf2/0x150 [ 34.149650][ T3453] dump_stack+0x15/0x1a [ 34.149678][ T3453] should_fail_ex+0x24a/0x260 [ 34.149716][ T3453] should_fail+0xb/0x10 [ 34.149750][ T3453] should_fail_usercopy+0x1a/0x20 [ 34.149866][ T3453] _copy_to_user+0x20/0xa0 [ 34.149890][ T3453] simple_read_from_buffer+0xa0/0x110 [ 34.149978][ T3453] proc_fail_nth_read+0xf9/0x140 [ 34.150016][ T3453] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 34.150141][ T3453] vfs_read+0x19b/0x6f0 [ 34.150173][ T3453] ? __rcu_read_unlock+0x4e/0x70 [ 34.150213][ T3453] ? __fget_files+0x17c/0x1c0 [ 34.150331][ T3453] ksys_read+0xe8/0x1b0 [ 34.150364][ T3453] __x64_sys_read+0x42/0x50 [ 34.150397][ T3453] x64_sys_call+0x2874/0x2dc0 [ 34.150489][ T3453] do_syscall_64+0xc9/0x1c0 [ 34.150528][ T3453] ? clear_bhb_loop+0x55/0xb0 [ 34.150563][ T3453] ? clear_bhb_loop+0x55/0xb0 [ 34.150599][ T3453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.150633][ T3453] RIP: 0033:0x7f9ce489bb7c [ 34.150657][ T3453] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 34.150679][ T3453] RSP: 002b:00007f9ce2ee6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 34.150750][ T3453] RAX: ffffffffffffffda RBX: 00007f9ce4ab6080 RCX: 00007f9ce489bb7c [ 34.150765][ T3453] RDX: 000000000000000f RSI: 00007f9ce2ee60a0 RDI: 000000000000000a [ 34.150781][ T3453] RBP: 00007f9ce2ee6090 R08: 0000000000000000 R09: 0000000000000000 [ 34.150796][ T3453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.150810][ T3453] R13: 0000000000000001 R14: 00007f9ce4ab6080 R15: 00007ffe4a4785e8 [ 34.150833][ T3453] [ 34.428192][ T3308] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.436997][ T3308] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.445907][ T3308] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.460041][ T3445] batman_adv: batadv0: Adding interface: gretap1 [ 34.466540][ T3445] batman_adv: batadv0: The MTU of interface gretap1 is too small (1424) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.492022][ T3445] batman_adv: batadv0: Not using interface gretap1 (retrying later): interface not active [ 34.502618][ T3454] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.7'. [ 34.513362][ T3452] smc: net device bond0 applied user defined pnetid SYZ0 [ 34.521865][ T3455] smc: net device bond0 erased user defined pnetid SYZ0 [ 34.531942][ T3461] FAULT_INJECTION: forcing a failure. [ 34.531942][ T3461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 34.536544][ T3458] bond0: (slave ipvlan2): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 34.545169][ T3461] CPU: 1 UID: 0 PID: 3461 Comm: syz.2.9 Not tainted 6.14.0-rc5-syzkaller-00013-g99fa936e8e4f #0 [ 34.545201][ T3461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.545217][ T3461] Call Trace: [ 34.545224][ T3461] [ 34.545235][ T3461] dump_stack_lvl+0xf2/0x150 [ 34.545336][ T3461] dump_stack+0x15/0x1a [ 34.545363][ T3461] should_fail_ex+0x24a/0x260 [ 34.545400][ T3461] should_fail+0xb/0x10 [ 34.545434][ T3461] should_fail_usercopy+0x1a/0x20 [ 34.545523][ T3461] _copy_from_user+0x1c/0xa0 [ 34.545546][ T3461] copy_msghdr_from_user+0x54/0x2a0 [ 34.545587][ T3461] ? __fget_files+0x17c/0x1c0 [ 34.545710][ T3461] __sys_recvmsg+0x140/0x260 [ 34.545754][ T3461] __x64_sys_recvmsg+0x46/0x50 [ 34.545846][ T3461] x64_sys_call+0xc64/0x2dc0 [ 34.545879][ T3461] do_syscall_64+0xc9/0x1c0 [ 34.545919][ T3461] ? clear_bhb_loop+0x55/0xb0 [ 34.545964][ T3461] ? clear_bhb_loop+0x55/0xb0 [ 34.546015][ T3461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.546049][ T3461] RIP: 0033:0x7f9ce489d169 [ 34.546068][ T3461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.546088][ T3461] RSP: 002b:00007f9ce2f07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 34.546130][ T3461] RAX: ffffffffffffffda RBX: 00007f9ce4ab5fa0 RCX: 00007f9ce489d169 [ 34.546147][ T3461] RDX: 0000000000000000 RSI: 0000400000000480 RDI: 0000000000000006 [ 34.546161][ T3461] RBP: 00007f9ce2f07090 R08: 0000000000000000 R09: 0000000000000000 [ 34.546175][ T3461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.546226][ T3461] R13: 0000000000000000 R14: 00007f9ce4ab5fa0 R15: 00007ffe4a4785e8 [ 34.546248][ T3461] [ 34.731770][ T3458] bond0: (slave ipvlan2): The slave device specified does not support setting the MAC address [ 34.742304][ T3458] bond0: (slave ipvlan2): Error -95 calling set_mac_address [ 34.752428][ T3450] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.7'. [ 34.762744][ T3461] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.9'. [ 34.772278][ T3464] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.10'. [ 34.792313][ T3463] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.10'. [ 34.847192][ T3466] smc: net device bond0 applied user defined pnetid SYZ0 [ 34.864292][ T3472] smc: net device bond0 erased user defined pnetid SYZ0 [ 35.009707][ T3485] 9pnet_fd: Insufficient options for proto=fd [ 35.040177][ T3485] veth0_to_bond: entered promiscuous mode [ 35.049162][ T293] ================================================================== [ 35.057292][ T293] BUG: KCSAN: data-race in __stop_tty / pty_write [ 35.063755][ T293] [ 35.066096][ T293] write to 0xffff8881180c89bc of 1 bytes by task 3492 on cpu 0: [ 35.073738][ T293] __stop_tty+0x42/0x90 [ 35.077964][ T293] n_tty_ioctl_helper+0x223/0x240 [ 35.083015][ T293] n_tty_ioctl+0xfd/0x200 [ 35.083450][ T3491] loop2: detected capacity change from 0 to 128 [ 35.087378][ T293] tty_ioctl+0x87a/0xbe0 [ 35.097886][ T293] __se_sys_ioctl+0xc9/0x140 [ 35.102549][ T293] __x64_sys_ioctl+0x43/0x50 [ 35.107178][ T293] x64_sys_call+0x1690/0x2dc0 [ 35.111886][ T293] do_syscall_64+0xc9/0x1c0 [ 35.116422][ T293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.122338][ T293] [ 35.124664][ T293] read to 0xffff8881180c89bc of 1 bytes by task 293 on cpu 1: [ 35.132383][ T293] pty_write+0x26/0xa0 [ 35.136461][ T293] tty_put_char+0x8d/0xc0 [ 35.140808][ T293] __process_echoes+0x3a3/0x6b0 [ 35.145677][ T293] n_tty_receive_buf_common+0x8ea/0xbd0 [ 35.151257][ T293] n_tty_receive_buf2+0x33/0x40 [ 35.156138][ T293] tty_ldisc_receive_buf+0x63/0x100 [ 35.161368][ T293] tty_port_default_receive_buf+0x59/0x90 [ 35.167116][ T293] flush_to_ldisc+0x1ce/0x410 [ 35.171821][ T293] process_scheduled_works+0x4db/0xa20 [ 35.177296][ T293] worker_thread+0x51d/0x6f0 [ 35.181909][ T293] kthread+0x4ae/0x520 [ 35.186023][ T293] ret_from_fork+0x4b/0x60 [ 35.190466][ T293] ret_from_fork_asm+0x1a/0x30 [ 35.195253][ T293] [ 35.197581][ T293] value changed: 0x00 -> 0x01 [ 35.202258][ T293] [ 35.204583][ T293] Reported by Kernel Concurrency Sanitizer on: [ 35.210734][ T293] CPU: 1 UID: 0 PID: 293 Comm: kworker/u8:5 Not tainted 6.14.0-rc5-syzkaller-00013-g99fa936e8e4f #0 [ 35.221499][ T293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 35.231563][ T293] Workqueue: events_unbound flush_to_ldisc [ 35.237389][ T293] ================================================================== [ 35.253424][ T3485] netlink: 4 bytes leftover after parsing attributes in process `syz.1.17'. [ 35.269003][ T3483] loop0: detected capacity change from 0 to 8192 [ 35.286031][ T3485] veth0_to_bond (unregistering): left promiscuous mode [ 35.313551][ T3485] bond0: (slave bond_slave_0): Releasing backup interface [ 35.317280][ T3491] syz.2.21: attempt to access beyond end of device [ 35.317280][ T3491] loop2: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 35.349135][ T3491] syz.2.21: attempt to access beyond end of device [ 35.349135][ T3491] loop2: rw=524288, sector=145, nr_sectors = 224 limit=128 [ 35.375717][ T3491] syz.2.21: attempt to access beyond end of device [ 35.375717][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128 [ 35.389061][ T3491] syz.2.21: attempt to access beyond end of device [ 35.389061][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128 [ 35.410166][ T3498] sch_tbf: burst 9895 is lower than device lo mtu (65550) ! [ 35.417868][ T3491] syz.2.21: attempt to access beyond end of device [ 35.417868][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128 [ 35.431315][ T3491] syz.2.21: attempt to access beyond end of device [ 35.431315][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128 [ 35.454247][ T3491] syz.2.21: attempt to access beyond end of device [ 35.454247][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128 [ 35.468985][ T3491] syz.2.21: attempt to access beyond end of device [ 35.468985][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128 [ 35.485213][ T3491] syz.2.21: attempt to access beyond end of device [ 35.485213][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128 [ 35.499559][ T3491] syz.2.21: attempt to access beyond end of device [ 35.499559][ T3491] loop2: rw=0, sector=145, nr_sectors = 8 limit=128