x0) clock_gettime(0x0, &(0x7f0000000700)) [ 892.804184][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:25:41 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 893.639271][ T306] team0: Port device team_slave_1 added [ 893.649796][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 893.658379][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 893.672425][T32151] device veth0_vlan entered promiscuous mode [ 893.795915][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 893.803977][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 893.837958][ T306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 893.856695][ T306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 893.933157][ T306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 893.955802][ T306] batman_adv: batadv0: Adding interface: batadv_slave_1 07:25:41 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 893.962765][ T306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 893.994116][ T306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 894.009248][T32151] device veth1_vlan entered promiscuous mode [ 894.090870][ T306] device hsr_slave_0 entered promiscuous mode [ 894.313779][ T306] device hsr_slave_1 entered promiscuous mode [ 894.509796][ T306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 894.522111][ T306] Cannot create hsr debugfs directory [ 894.552989][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 894.564128][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 894.585166][T32151] device veth0_macvtap entered promiscuous mode 07:25:42 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 894.837606][T32151] device veth1_macvtap entered promiscuous mode [ 895.037341][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 895.054042][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 07:25:43 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) clock_gettime(0x0, &(0x7f0000000700)) [ 895.092731][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 895.136663][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.153263][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 895.164213][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.174484][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 895.185173][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.195436][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 895.206596][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.222559][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 895.243303][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.255168][T32151] batman_adv: batadv0: Interface activated: batadv_slave_0 07:25:43 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) clock_gettime(0x0, &(0x7f0000000700)) 07:25:43 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) clock_gettime(0x0, &(0x7f0000000700)) [ 895.804539][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 895.823524][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 895.834335][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 895.854224][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.873314][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 895.893904][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.904196][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 895.924125][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.935661][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 895.963416][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.973639][T32151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 895.993353][T32151] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 896.006093][T32151] batman_adv: batadv0: Interface activated: batadv_slave_1 07:25:44 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 896.508310][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 896.522337][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 896.542155][T32151] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 896.583336][T32151] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 896.592078][T32151] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 896.613295][T32151] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 07:25:44 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:25:45 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 897.525345][T32466] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 897.713731][T32466] netdevsim netdevsim1 netdevsim1: renamed from eth1 07:25:45 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 897.794406][T32466] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 897.821681][T32466] netdevsim netdevsim1 netdevsim3: renamed from eth3 07:25:46 executing program 3: syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 898.268958][T14742] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 898.283467][T14742] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:25:46 executing program 3: syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 899.015806][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 899.146038][T32673] netdevsim netdevsim2 netdevsim0: renamed from eth0 07:25:47 executing program 3: syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:25:47 executing program 3: syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 900.323783][T32673] netdevsim netdevsim2 netdevsim1: renamed from eth1 07:25:48 executing program 3: syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:25:48 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 900.970306][T32673] netdevsim netdevsim2 netdevsim2: renamed from eth2 07:25:49 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:25:49 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:25:49 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) 07:25:50 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) 07:25:51 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) 07:25:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 904.413532][T29793] Bluetooth: hci3: command 0x0409 tx timeout [ 904.658380][T32466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 904.698194][T32673] netdevsim netdevsim2 netdevsim3: renamed from eth3 07:25:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 905.161263][T32466] 8021q: adding VLAN 0 to HW filter on device team0 [ 905.198090][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 905.213876][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 905.288035][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 905.297199][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 905.333741][ T1933] bridge0: port 1(bridge_slave_0) entered blocking state [ 905.340849][ T1933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 905.360502][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 905.384203][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 905.392632][ T1933] bridge0: port 2(bridge_slave_1) entered blocking state [ 905.399747][ T1933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 905.422093][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 905.448038][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 905.483625][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 905.492473][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 905.501646][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 905.517263][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 905.534135][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 905.545220][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 905.590901][T32466] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 905.613273][T32466] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 905.652047][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 905.661399][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 905.676594][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 905.694034][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 905.753389][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 905.872844][T32673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 905.901543][ T491] chnl_net:caif_netlink_parms(): no params data found [ 905.943947][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 905.953909][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 905.979579][T32673] 8021q: adding VLAN 0 to HW filter on device team0 07:25:54 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 906.286359][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 906.303509][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 906.399569][T32466] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 906.407868][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 906.444324][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 906.463537][T29793] bridge0: port 1(bridge_slave_0) entered blocking state [ 906.470619][T29793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 906.483823][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 906.493666][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 906.502121][T29793] bridge0: port 2(bridge_slave_1) entered blocking state [ 906.509221][T29793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 906.533724][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 906.554969][T29787] Bluetooth: hci3: command 0x041b tx timeout [ 906.603838][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:25:54 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 906.964675][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:25:55 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 907.287059][ T491] bridge0: port 1(bridge_slave_0) entered blocking state [ 907.329440][ T491] bridge0: port 1(bridge_slave_0) entered disabled state [ 907.344566][ T491] device bridge_slave_0 entered promiscuous mode [ 907.375526][ T306] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 907.522927][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 907.544078][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 907.552958][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 907.574495][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 907.595426][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 907.604840][ T491] bridge0: port 2(bridge_slave_1) entered blocking state [ 907.612741][ T491] bridge0: port 2(bridge_slave_1) entered disabled state [ 907.634513][ T491] device bridge_slave_1 entered promiscuous mode [ 907.653514][ T306] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 907.876313][ T306] netdevsim netdevsim4 netdevsim2: renamed from eth2 07:25:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 908.573524][T29794] Bluetooth: hci3: command 0x040f tx timeout [ 908.602443][ T306] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 908.692535][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 908.714661][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 908.733524][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 908.742544][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 908.763998][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 908.772512][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:25:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 908.806664][T32673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 908.819699][ T491] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 07:25:57 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:25:58 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 910.221642][T32466] device veth0_vlan entered promiscuous mode [ 910.254551][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 910.263010][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 910.289689][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 910.313905][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 910.326126][ T491] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 910.370824][T32466] device veth1_vlan entered promiscuous mode [ 910.643371][T29793] Bluetooth: hci3: command 0x0419 tx timeout [ 910.840284][ T491] team0: Port device team_slave_0 added [ 910.850311][ T491] team0: Port device team_slave_1 added 07:25:59 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 911.505063][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 911.524821][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 911.548219][T32466] device veth0_macvtap entered promiscuous mode [ 911.558290][T32466] device veth1_macvtap entered promiscuous mode [ 911.584359][ T491] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 911.591325][ T491] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 911.662129][ T491] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 911.686087][ T491] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 911.693042][ T491] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 911.740276][ T491] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 911.758703][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 911.772782][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 911.800921][T32673] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 911.826712][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 911.835457][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 911.848359][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.861769][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.883262][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.894097][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.904272][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.915695][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.926622][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.937769][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.947952][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 911.958991][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.970659][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:26:00 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 911.981506][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 911.993497][T32466] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 912.397647][ T306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 912.405158][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 912.419789][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 912.440879][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.461075][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.475862][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.490219][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.513295][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.534709][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.562502][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.583266][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.593087][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.620409][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 912.639830][T32466] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 912.663843][T32466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:26:00 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 912.691238][T32466] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 912.730532][ T491] device hsr_slave_0 entered promiscuous mode [ 912.853811][ T491] device hsr_slave_1 entered promiscuous mode [ 912.951357][ T491] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 912.959226][ T491] Cannot create hsr debugfs directory [ 913.012379][ T306] 8021q: adding VLAN 0 to HW filter on device team0 [ 913.040256][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 913.054158][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 913.062966][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 913.104110][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 913.112948][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 913.134110][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 913.146156][T32466] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 913.163336][T32466] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 913.172066][T32466] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 913.183666][T32466] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 913.420023][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 913.450979][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:26:01 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 913.463765][T29793] bridge0: port 1(bridge_slave_0) entered blocking state [ 913.470842][T29793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 913.513709][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 913.533838][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 913.553911][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 913.573730][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 913.581816][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 913.825999][T32673] device veth0_vlan entered promiscuous mode [ 913.839523][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 913.848432][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 913.874049][T29794] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.881123][T29794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 913.893631][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 913.902579][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:26:02 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 914.574795][T32673] device veth1_vlan entered promiscuous mode [ 914.582247][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 914.604030][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 914.624143][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 914.632943][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 914.654877][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 914.670158][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 914.680889][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 914.691725][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 07:26:02 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:03 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:03 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:04 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 917.528739][ T306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 917.585910][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 917.623657][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 917.632142][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:26:06 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 918.371009][T32673] device veth0_macvtap entered promiscuous mode 07:26:07 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 920.007366][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 920.016360][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 920.066475][T32673] device veth1_macvtap entered promiscuous mode [ 920.154368][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 07:26:08 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:09 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 07:26:09 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 07:26:10 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) 07:26:10 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 922.577754][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 922.610921][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 922.643493][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 922.673244][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 922.683089][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 922.744024][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 922.763272][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 922.813282][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 922.823108][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 922.862018][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 922.882687][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 922.913425][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 922.933243][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 922.953251][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 922.972708][T32673] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 923.014758][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 923.042074][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:26:11 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 923.093360][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 923.134224][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 923.163706][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 923.191384][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 923.213246][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 923.234364][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 923.253327][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 923.283315][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 923.303358][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 923.315498][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 923.333541][T32673] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 923.353359][T32673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 923.374730][T32673] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 923.382558][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 923.404531][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 923.413761][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 923.422466][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 07:26:11 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:11 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 924.125489][ T491] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.165918][T32673] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.201695][T32673] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.233277][T32673] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.242019][T32673] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.285128][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 924.292694][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 924.315914][ T306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 924.464697][ T491] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:26:12 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:13 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 925.203589][T25563] Bluetooth: hci2: command 0x0409 tx timeout 07:26:13 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:13 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 925.994291][ T491] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 926.172413][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 926.194012][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:26:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 926.734966][ T491] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:26:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 927.293656][T29791] Bluetooth: hci2: command 0x041b tx timeout 07:26:15 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:26:15 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:26:16 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:26:17 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 929.168378][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 929.184120][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 929.195722][ T306] device veth0_vlan entered promiscuous mode [ 929.251169][ T306] device veth1_vlan entered promiscuous mode [ 929.270136][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 929.278492][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 929.346617][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 929.355584][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 929.366918][ T306] device veth0_macvtap entered promiscuous mode [ 929.373606][T29794] Bluetooth: hci2: command 0x040f tx timeout [ 929.384742][ T306] device veth1_macvtap entered promiscuous mode [ 929.417554][ T667] chnl_net:caif_netlink_parms(): no params data found [ 929.458218][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.473235][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.483151][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.521766][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.553238][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.573269][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.583097][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.623432][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.643259][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.663232][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.673081][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.703381][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.714303][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.725627][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.736830][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 929.753320][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.775402][ T306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 929.790556][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 929.799270][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 929.807694][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 929.823984][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 929.852660][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.874153][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.903300][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.923583][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.943307][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 929.971963][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 929.993260][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 930.015686][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.025576][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 930.053306][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.063179][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 930.084213][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.103262][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 930.113808][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.133292][ T306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 930.147503][ T306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 930.167629][ T306] batman_adv: batadv0: Interface activated: batadv_slave_1 07:26:18 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 930.541792][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 930.554693][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 930.566683][ T306] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 930.576430][ T306] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 930.587271][ T306] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 930.596324][ T306] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 931.216758][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.223087][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 07:26:19 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 931.443561][T29791] Bluetooth: hci2: command 0x0419 tx timeout [ 931.565855][ T491] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 931.591836][ T491] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 931.639533][ T667] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.653419][ T667] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.661800][ T667] device bridge_slave_0 entered promiscuous mode [ 931.734860][ T491] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 932.024036][ T667] bridge0: port 2(bridge_slave_1) entered blocking state [ 932.031120][ T667] bridge0: port 2(bridge_slave_1) entered disabled state [ 932.052512][ T667] device bridge_slave_1 entered promiscuous mode [ 932.617313][ T491] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 932.643774][T29794] Bluetooth: hci4: command 0x0409 tx timeout [ 933.097593][ T667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 933.144733][ T667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:26:21 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 934.733470][T29794] Bluetooth: hci4: command 0x041b tx timeout [ 935.370263][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 935.381857][ T667] team0: Port device team_slave_0 added [ 935.393481][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 935.396157][ T667] team0: Port device team_slave_1 added 07:26:23 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 935.822125][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 936.011242][ T667] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 936.034537][ T667] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:26:24 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 936.080017][ T667] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 936.107304][ T667] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 936.143284][ T667] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 936.193290][ T667] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 936.223806][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 936.242245][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 936.813262][ T13] Bluetooth: hci4: command 0x040f tx timeout 07:26:24 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 937.412583][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 937.546453][ T667] device hsr_slave_0 entered promiscuous mode [ 937.599814][ T667] device hsr_slave_1 entered promiscuous mode [ 937.805882][ T667] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 937.833418][ T667] Cannot create hsr debugfs directory 07:26:25 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:25 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:26 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 938.893902][T29793] Bluetooth: hci4: command 0x0419 tx timeout [ 939.069017][ T491] 8021q: adding VLAN 0 to HW filter on device bond0 07:26:27 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:27 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 939.112816][ T721] chnl_net:caif_netlink_parms(): no params data found [ 939.239383][ T667] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 939.376991][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 939.385148][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:26:27 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:27 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:28 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:28 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:28 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:28 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:29 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:29 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:29 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:30 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:30 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:30 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:31 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:31 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:31 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 943.746727][ T491] 8021q: adding VLAN 0 to HW filter on device team0 07:26:32 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:32 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 944.333021][ T667] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 944.359024][ T721] bridge0: port 1(bridge_slave_0) entered blocking state [ 944.375096][ T721] bridge0: port 1(bridge_slave_0) entered disabled state [ 944.393667][ T721] device bridge_slave_0 entered promiscuous mode [ 944.415644][ T721] bridge0: port 2(bridge_slave_1) entered blocking state [ 944.422721][ T721] bridge0: port 2(bridge_slave_1) entered disabled state [ 944.474665][ T721] device bridge_slave_1 entered promiscuous mode [ 944.505286][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 944.523804][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 944.532749][T25563] bridge0: port 1(bridge_slave_0) entered blocking state [ 944.539916][T25563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 944.593798][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 944.602721][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 944.633931][T25563] bridge0: port 2(bridge_slave_1) entered blocking state [ 944.641018][T25563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 944.663744][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:26:33 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:33 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) 07:26:33 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:34 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) 07:26:35 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:36 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:36 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 948.584272][ T667] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 948.954271][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 948.974094][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 949.008959][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 949.039737][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 07:26:37 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 949.072173][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 949.094260][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 949.130878][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 949.141792][ T721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 949.163747][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 949.183467][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 949.217144][ T491] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 949.244149][ T491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 949.265823][ T721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 949.279995][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 949.304626][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:26:37 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) 07:26:37 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:38 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 07:26:38 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:26:39 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:39 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 07:26:39 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 951.635540][ T667] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 951.858241][ T721] team0: Port device team_slave_0 added [ 951.879861][ T721] team0: Port device team_slave_1 added [ 951.899516][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 951.933546][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 951.946069][ T491] 8021q: adding VLAN 0 to HW filter on device batadv0 07:26:40 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 07:26:40 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:26:41 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 953.475424][ T721] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 953.482432][ T721] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 953.583417][ T721] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 953.607367][ T721] batman_adv: batadv0: Adding interface: batadv_slave_1 07:26:41 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 953.629126][ T721] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 953.703381][ T721] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:26:41 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 07:26:42 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 07:26:42 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 07:26:43 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") 07:26:43 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 955.522301][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 955.532961][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:26:43 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") [ 956.060899][ T721] device hsr_slave_0 entered promiscuous mode 07:26:44 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") 07:26:44 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 956.453852][ T721] device hsr_slave_1 entered promiscuous mode 07:26:45 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") 07:26:45 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 957.151703][ T721] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 957.163347][ T721] Cannot create hsr debugfs directory 07:26:45 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") 07:26:46 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) 07:26:46 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") [ 958.469202][ T491] device veth0_vlan entered promiscuous mode [ 958.912639][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 958.934511][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 958.972968][ T491] device veth1_vlan entered promiscuous mode [ 959.006227][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 959.014743][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 07:26:47 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") [ 959.326589][ T667] netdevsim netdevsim1 netdevsim0: renamed from eth0 07:26:47 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 960.424758][ T667] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 960.514063][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 960.522697][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 960.554521][ T667] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 960.584976][ T667] netdevsim netdevsim1 netdevsim3: renamed from eth3 07:26:48 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 960.990473][ T491] device veth0_macvtap entered promiscuous mode [ 961.009217][ T721] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 961.065600][ T491] device veth1_macvtap entered promiscuous mode [ 961.094276][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:26:49 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 961.109885][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.123230][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.142406][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.152647][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.174621][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.193237][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.211561][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.229005][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.253293][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.263160][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.283219][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.295164][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.313218][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.323031][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.343252][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.353077][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 961.373388][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.390481][ T491] batman_adv: batadv0: Interface activated: batadv_slave_0 07:26:49 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 961.422523][ T721] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 961.440404][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 961.459954][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 961.468512][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 961.478947][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 961.496201][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.514667][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.527677][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.538431][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.548576][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 07:26:49 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 961.597260][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.618392][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.629229][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:26:49 executing program 3: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) [ 961.640520][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.663110][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.681808][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.694735][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.704812][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.715633][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.725704][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.736408][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.753783][ T491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 961.765038][ T491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 961.780772][ T491] batman_adv: batadv0: Interface activated: batadv_slave_1 07:26:49 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 961.797050][ T721] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:26:49 executing program 3: syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 961.869462][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 961.885849][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 961.898243][ T491] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 07:26:49 executing program 3: getpgid(0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 961.915668][ T491] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.933420][ T491] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.942129][ T491] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.982132][ T721] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:26:50 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 962.151821][ T667] 8021q: adding VLAN 0 to HW filter on device bond0 07:26:50 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 962.213550][ T667] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.224214][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 962.232058][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 962.315054][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 962.335775][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.344867][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.351992][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.361076][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:26:50 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 962.412485][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 962.424770][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.443569][T29794] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.450644][T29794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.473802][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:26:50 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 962.618715][ T721] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 962.637157][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 962.654328][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 07:26:50 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 962.673554][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 962.704626][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 962.724457][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 962.741728][ T667] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 962.794501][ T667] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 962.837640][ T721] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 962.858316][ T721] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 962.885808][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 962.906190][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 962.943986][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.958395][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 962.978417][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:26:51 executing program 3: socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 963.018448][ T721] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 963.043682][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:26:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 963.383488][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 963.390976][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 963.435009][ T721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 963.449121][ T667] 8021q: adding VLAN 0 to HW filter on device batadv0 07:26:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 963.682966][ T721] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.709576][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 963.717495][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 963.784017][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 963.795601][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 963.825412][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 963.854081][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:26:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 963.873646][T25544] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.880722][T25544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.001266][ T667] device veth0_vlan entered promiscuous mode [ 964.048269][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 964.074167][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 964.093952][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 964.114512][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 964.124627][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.154501][ T1933] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.161657][ T1933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.187326][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 964.212024][ T667] device veth1_vlan entered promiscuous mode 07:26:52 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 964.409740][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 964.421589][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 964.444666][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 964.464126][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 964.475477][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 964.506751][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 964.527372][ T997] chnl_net:caif_netlink_parms(): no params data found [ 964.677508][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 964.694369][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 964.713422][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 964.722118][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 07:26:52 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 964.773461][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 964.781997][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 964.846699][ T5013] device hsr_slave_0 left promiscuous mode [ 964.933404][ T5013] device hsr_slave_1 left promiscuous mode [ 964.996907][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 965.035162][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:26:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 965.071246][ T5013] device bridge_slave_1 left promiscuous mode [ 965.083379][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.124342][T29793] Bluetooth: hci0: command 0x0409 tx timeout 07:26:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 965.260270][ T5013] device bridge_slave_0 left promiscuous mode [ 965.269283][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.430345][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 965.481858][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:26:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 965.523849][ T5013] device bridge_slave_1 left promiscuous mode [ 965.530054][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.725829][ T5013] device bridge_slave_0 left promiscuous mode [ 965.732098][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.756852][ T5013] device bridge_slave_1 left promiscuous mode [ 965.763087][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:26:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 965.845990][ T5013] device bridge_slave_0 left promiscuous mode [ 965.852221][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:26:54 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 966.216260][ T5013] device hsr_slave_0 left promiscuous mode [ 966.224329][ T5013] device hsr_slave_1 left promiscuous mode [ 966.414433][T29787] Bluetooth: hci3: command 0x0409 tx timeout [ 966.428275][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 966.458854][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 966.558430][ T5013] device bridge_slave_1 left promiscuous mode [ 966.569683][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:26:54 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) clock_gettime(0x0, &(0x7f0000000700)) [ 966.634007][ T5013] device bridge_slave_0 left promiscuous mode [ 966.640261][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.695907][ T5013] device hsr_slave_0 left promiscuous mode [ 966.764432][ T5013] device hsr_slave_1 left promiscuous mode [ 966.773911][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 966.783388][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 966.837255][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 966.853329][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 966.925993][ T5013] device bridge_slave_1 left promiscuous mode [ 966.932194][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.023173][ T5013] device bridge_slave_0 left promiscuous mode [ 967.029572][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:26:55 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 967.214255][T29787] Bluetooth: hci0: command 0x041b tx timeout [ 967.305996][ T5013] device hsr_slave_0 left promiscuous mode [ 967.323821][ T5013] device hsr_slave_1 left promiscuous mode [ 967.333568][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 967.341085][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 967.401224][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 967.414356][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 967.535884][ T5013] device bridge_slave_1 left promiscuous mode [ 967.542238][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:26:55 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 967.826877][ T5013] device bridge_slave_0 left promiscuous mode [ 967.833225][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:26:55 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 968.031111][ T5013] device hsr_slave_0 left promiscuous mode [ 968.044330][ T5013] device hsr_slave_1 left promiscuous mode [ 968.186305][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 968.197553][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 968.221648][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 968.235236][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:26:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 968.290725][ T5013] device bridge_slave_1 left promiscuous mode [ 968.301729][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.493679][T29787] Bluetooth: hci3: command 0x041b tx timeout [ 968.564441][ T5013] device bridge_slave_0 left promiscuous mode [ 968.570764][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.781529][ T5013] device hsr_slave_0 left promiscuous mode 07:26:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 968.853795][ T5013] device hsr_slave_1 left promiscuous mode [ 969.095136][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 969.102680][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 969.117366][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 969.134273][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 969.156037][ T5013] device bridge_slave_1 left promiscuous mode [ 969.162307][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.293669][T29793] Bluetooth: hci0: command 0x040f tx timeout [ 969.300465][ T5013] device bridge_slave_0 left promiscuous mode [ 969.309403][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.393342][ T5013] device veth1_macvtap left promiscuous mode [ 969.399493][ T5013] device veth0_macvtap left promiscuous mode [ 969.412014][ T5013] device veth1_vlan left promiscuous mode [ 969.417943][ T5013] device veth0_vlan left promiscuous mode [ 969.490171][ T5013] device veth1_macvtap left promiscuous mode [ 969.498888][ T5013] device veth0_macvtap left promiscuous mode [ 969.509854][ T5013] device veth1_vlan left promiscuous mode [ 969.520561][ T5013] device veth0_vlan left promiscuous mode 07:26:57 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 970.206070][ T5013] device veth1_macvtap left promiscuous mode [ 970.212275][ T5013] device veth0_macvtap left promiscuous mode [ 970.233459][ T5013] device veth1_vlan left promiscuous mode [ 970.239328][ T5013] device veth0_vlan left promiscuous mode 07:26:58 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 970.563548][T29793] Bluetooth: hci3: command 0x040f tx timeout 07:26:58 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1", 0x58, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 971.352210][ T5013] device veth1_macvtap left promiscuous mode [ 971.358716][ T5013] device veth0_macvtap left promiscuous mode [ 971.367321][T29794] Bluetooth: hci0: command 0x0419 tx timeout [ 971.384028][ T5013] device veth1_vlan left promiscuous mode [ 971.389900][ T5013] device veth0_vlan left promiscuous mode 07:26:59 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:27:00 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1", 0x58, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 972.653441][T29791] Bluetooth: hci3: command 0x0419 tx timeout 07:27:01 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1", 0x58, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:27:02 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:27:04 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:27:05 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:27:06 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:27:08 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:27:09 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:27:09 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:27:10 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:27:11 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:27:12 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:27:13 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:27:16 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:27:17 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 989.775719][ T5013] team0 (unregistering): Port device team_slave_1 removed [ 990.054427][ T5013] team0 (unregistering): Port device team_slave_0 removed 07:27:18 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 990.232114][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 990.793823][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:27:19 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 991.203664][T29794] Bluetooth: hci5: command 0x0409 tx timeout 07:27:20 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:27:20 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 992.650036][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.656441][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 [ 993.295632][T29794] Bluetooth: hci5: command 0x041b tx timeout 07:27:21 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 993.484325][ T5013] bond0 (unregistering): Released all slaves 07:27:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 995.166697][ T5013] team0 (unregistering): Port device team_slave_1 removed [ 995.363327][T29791] Bluetooth: hci5: command 0x040f tx timeout 07:27:23 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 995.914346][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 996.770940][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:27:24 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 997.456775][T29791] Bluetooth: hci5: command 0x0419 tx timeout 07:27:25 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 998.115441][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 998.723695][T29794] Bluetooth: hci6: command 0x0409 tx timeout 07:27:27 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) 07:27:28 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) [ 1000.803267][ T3611] Bluetooth: hci6: command 0x041b tx timeout [ 1000.877669][ T5013] bond0 (unregistering): Released all slaves 07:27:29 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) [ 1001.816091][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:27:30 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) [ 1002.154488][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:27:30 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) [ 1002.883795][T25551] Bluetooth: hci6: command 0x040f tx timeout 07:27:31 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) 07:27:32 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) [ 1004.240698][ T5013] bond0 (unregistering): Released all slaves 07:27:32 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1004.963533][ T3611] Bluetooth: hci6: command 0x0419 tx timeout 07:27:33 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:33 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:34 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:34 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:35 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:36 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:37 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1009.002137][ T5013] team0 (unregistering): Port device team_slave_1 removed [ 1009.428303][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 1009.655215][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:27:37 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1009.962979][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:27:38 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:39 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:39 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1012.188377][ T5013] bond0 (unregistering): Released all slaves 07:27:40 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:41 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:42 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:43 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:44 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:45 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1017.766927][ T5013] team0 (unregistering): Port device team_slave_1 removed 07:27:45 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1017.820961][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 1018.186519][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:27:46 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1018.878664][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:27:47 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:48 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:48 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1020.987973][ T5013] bond0 (unregistering): Released all slaves 07:27:49 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:50 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:50 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:51 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) 07:27:51 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) 07:27:52 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1024.360673][ T5013] team0 (unregistering): Port device team_slave_1 removed 07:27:53 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1025.913845][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 1026.466728][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:27:54 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1026.761999][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:27:55 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:27:56 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1029.442915][ T5013] bond0 (unregistering): Released all slaves 07:27:57 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:27:58 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1031.043285][T25551] Bluetooth: hci7: command 0x0409 tx timeout 07:27:59 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:00 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1032.323536][ T3611] Bluetooth: hci8: command 0x0409 tx timeout 07:28:01 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1033.123342][T29791] Bluetooth: hci7: command 0x041b tx timeout 07:28:01 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:01 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:02 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1034.413444][T29793] Bluetooth: hci8: command 0x041b tx timeout 07:28:03 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1035.213564][T29791] Bluetooth: hci7: command 0x040f tx timeout [ 1035.456629][ T5013] team0 (unregistering): Port device team_slave_1 removed 07:28:03 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1035.714079][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 1036.043848][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:28:04 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 1036.325204][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1036.483396][T29791] Bluetooth: hci8: command 0x040f tx timeout 07:28:05 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) [ 1037.283464][T29791] Bluetooth: hci7: command 0x0419 tx timeout 07:28:05 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) 07:28:06 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) [ 1038.563393][T29793] Bluetooth: hci8: command 0x0419 tx timeout 07:28:06 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) [ 1039.564782][ T5013] bond0 (unregistering): Released all slaves 07:28:08 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) 07:28:08 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:08 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:09 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1041.575592][ T5013] team0 (unregistering): Port device team_slave_1 removed [ 1041.600417][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 1041.863663][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1041.893728][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:28:09 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:10 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:11 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1043.316933][ T5013] bond0 (unregistering): Released all slaves 07:28:11 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:28:12 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) r0 = syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) 07:28:12 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r0 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x2}) [ 1044.620475][ T721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1045.225409][ T1583] chnl_net:caif_netlink_parms(): no params data found [ 1045.884515][ T1417] chnl_net:caif_netlink_parms(): no params data found [ 1045.924132][T29794] Bluetooth: hci2: command 0x0406 tx timeout [ 1045.964780][ T1328] chnl_net:caif_netlink_parms(): no params data found 07:28:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) [ 1046.580997][ T1574] chnl_net:caif_netlink_parms(): no params data found 07:28:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) 07:28:15 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) [ 1047.014922][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 1047.022015][ T1583] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.054503][ T1583] device bridge_slave_0 entered promiscuous mode 07:28:15 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) 07:28:16 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) 07:28:17 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) [ 1049.114841][ T1583] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.121930][ T1583] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.163612][ T1583] device bridge_slave_1 entered promiscuous mode 07:28:17 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 1049.946316][ T1583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1049.964670][ T1417] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.971748][ T1417] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.994495][ T1417] device bridge_slave_0 entered promiscuous mode [ 1050.025889][ T1583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1050.616631][ T1417] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.628475][ T1417] bridge0: port 2(bridge_slave_1) entered disabled state [ 1050.646312][ T1417] device bridge_slave_1 entered promiscuous mode 07:28:18 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) [ 1051.252071][ T1583] team0: Port device team_slave_0 added [ 1051.270247][ T1583] team0: Port device team_slave_1 added 07:28:19 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:20 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 07:28:20 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:20 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:28:21 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1053.974483][ T1574] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.981574][ T1574] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.004567][ T1574] device bridge_slave_0 entered promiscuous mode [ 1054.086330][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.092654][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 07:28:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570", 0x54, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1054.387165][ T1417] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1054.414732][ T1583] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1054.421989][ T1583] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1054.493183][ T1583] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1054.514240][ T1574] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.543239][ T1574] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.551674][ T1574] device bridge_slave_1 entered promiscuous mode [ 1054.585634][ T1417] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1054.596703][ T1583] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1054.613182][ T1583] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1054.653604][ T1583] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:28:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:28:23 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:28:24 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180", 0x4e, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1056.567433][ T1574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1056.595779][ T1574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:25 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1057.284405][ T13] Bluetooth: hci0: command 0x0409 tx timeout 07:28:25 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1057.903726][ T1583] device hsr_slave_0 entered promiscuous mode [ 1057.935764][ T1583] device hsr_slave_1 entered promiscuous mode 07:28:26 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1059.363436][T25563] Bluetooth: hci0: command 0x041b tx timeout 07:28:27 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1060.279771][ T1574] team0: Port device team_slave_0 added [ 1061.187960][ T1574] team0: Port device team_slave_1 added 07:28:29 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1061.443453][T25563] Bluetooth: hci0: command 0x040f tx timeout 07:28:29 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1062.755044][ T1574] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1062.762045][ T1574] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1062.810929][ T1574] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1062.874625][ T1574] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1062.881592][ T1574] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1062.969377][ T1574] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:28:31 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1063.523327][T25563] Bluetooth: hci0: command 0x0419 tx timeout 07:28:31 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1064.376500][ T1574] device hsr_slave_0 entered promiscuous mode [ 1064.438779][ T1574] device hsr_slave_1 entered promiscuous mode [ 1064.526025][ T1574] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1064.537336][ T1574] Cannot create hsr debugfs directory [ 1064.551881][ T1730] chnl_net:caif_netlink_parms(): no params data found [ 1064.563430][T25544] Bluetooth: hci2: command 0x0409 tx timeout 07:28:32 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), 0x0}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1064.990300][ T1583] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:28:33 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1066.378267][ T1583] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1066.653592][T29791] Bluetooth: hci2: command 0x041b tx timeout [ 1066.903236][ T1730] bridge0: port 1(bridge_slave_0) entered blocking state [ 1066.910331][ T1730] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.923315][ T1730] device bridge_slave_0 entered promiscuous mode [ 1066.949827][ T1583] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1066.999110][ T1730] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.013625][ T1730] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.033395][ T1730] device bridge_slave_1 entered promiscuous mode [ 1067.049549][ T1763] chnl_net:caif_netlink_parms(): no params data found 07:28:36 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1068.723357][T29791] Bluetooth: hci2: command 0x040f tx timeout [ 1068.866674][ T1583] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1068.906761][ T1730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1068.925781][ T1730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:37 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1069.928551][ T1730] team0: Port device team_slave_0 added [ 1069.970018][ T1730] team0: Port device team_slave_1 added [ 1070.082351][ T1730] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1070.092793][ T1730] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1070.143215][ T1730] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1070.189987][ T1574] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1070.604577][ T1730] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1070.611562][ T1730] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1070.693176][ T1730] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1070.724418][ T1763] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.731583][ T1763] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.778329][ T1763] device bridge_slave_0 entered promiscuous mode [ 1070.809664][ T1763] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.813283][T29791] Bluetooth: hci2: command 0x0419 tx timeout [ 1070.833325][ T1763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.863588][ T1763] device bridge_slave_1 entered promiscuous mode 07:28:39 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1072.189894][ T1763] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 07:28:40 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1073.621029][ T1763] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:41 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1074.115098][ T1574] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1074.270480][ T1730] device hsr_slave_0 entered promiscuous mode [ 1074.322661][ T1730] device hsr_slave_1 entered promiscuous mode [ 1074.384023][ T1730] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1074.391648][ T1730] Cannot create hsr debugfs directory [ 1074.647498][ T1763] team0: Port device team_slave_0 added 07:28:42 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1075.425193][ T1574] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1075.622742][ T1763] team0: Port device team_slave_1 added 07:28:44 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:28:44 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:28:44 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) clock_gettime(0x0, &(0x7f0000000700)) [ 1077.148472][ T1574] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.234432][ T1763] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1077.241413][ T1763] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1077.324398][ T1763] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1077.805623][ T1763] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1077.812698][ T1763] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1077.873403][ T1763] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:28:46 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:46 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) clock_gettime(0x0, &(0x7f0000000700)) [ 1078.919345][ T1763] device hsr_slave_0 entered promiscuous mode [ 1079.216843][ T1763] device hsr_slave_1 entered promiscuous mode [ 1079.298540][ T1763] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1079.313966][ T1763] Cannot create hsr debugfs directory 07:28:47 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:48 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1080.607754][ T1583] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1080.685695][ T1583] netdevsim netdevsim0 netdevsim1: renamed from eth1 07:28:48 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1081.417652][ T1583] netdevsim netdevsim0 netdevsim2: renamed from eth2 07:28:49 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1081.771724][ T1583] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1082.046237][ T1574] netdevsim netdevsim4 netdevsim0: renamed from eth0 07:28:50 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1082.411472][ T1574] netdevsim netdevsim4 netdevsim1: renamed from eth1 07:28:50 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1083.053864][ T1574] netdevsim netdevsim4 netdevsim2: renamed from eth2 07:28:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1083.206553][ T1574] netdevsim netdevsim4 netdevsim3: renamed from eth3 07:28:52 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1086.023390][ T1583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1086.049772][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1086.063763][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1086.075044][ T1583] 8021q: adding VLAN 0 to HW filter on device team0 [ 1086.115093][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1086.133852][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1086.142326][T25563] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.149430][T25563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1086.177397][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1086.186012][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1086.195212][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1086.204771][ T1933] bridge0: port 2(bridge_slave_1) entered blocking state [ 1086.211839][ T1933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1086.219988][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1086.234226][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1086.243093][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1086.264072][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1086.279898][ T1574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1086.307531][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1086.324216][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1086.333015][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1086.362159][ T1583] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1086.385153][ T1583] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1086.406234][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1086.415295][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1086.434287][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1086.442723][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1086.454685][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1086.462514][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1086.484680][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1086.494599][ T1574] 8021q: adding VLAN 0 to HW filter on device team0 [ 1086.519560][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1086.533638][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1086.569452][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.576650][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1086.603968][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1086.635825][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1086.653873][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1086.674343][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 1086.681434][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1086.703543][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:28:54 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1087.444583][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1087.463645][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1087.479485][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1087.494934][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1087.513269][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1087.522231][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1087.553992][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1087.567574][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1087.575980][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1087.591712][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1087.608009][ T1574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1087.619650][ T1583] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1087.629948][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1087.643422][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1087.686548][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1087.696160][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1087.742066][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1087.763946][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1087.774956][ T1583] device veth0_vlan entered promiscuous mode [ 1087.808022][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1087.817194][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1087.838361][ T1583] device veth1_vlan entered promiscuous mode [ 1087.873216][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1087.881384][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1087.893469][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1087.907697][ T1574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1087.929403][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1087.941538][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1087.950427][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1087.961866][ T1583] device veth0_macvtap entered promiscuous mode [ 1087.975309][ T1583] device veth1_macvtap entered promiscuous mode [ 1087.997535][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1088.008795][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.018843][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1088.030573][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.045781][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1088.061200][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:28:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1088.076995][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1088.123310][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.163650][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1088.183276][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.193118][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1088.223221][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.244361][ T1583] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1088.258829][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1088.273959][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1088.282101][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1088.304221][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1088.315029][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1088.343376][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.363169][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1088.383246][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.393082][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1088.424817][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.443319][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1088.462449][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.478160][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1088.498333][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.513204][ T1583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1088.530666][ T1583] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1088.549153][ T1583] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1088.563855][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1088.572527][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1088.606502][ T1583] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1088.625527][ T1583] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1088.647186][ T1583] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1088.661654][ T1583] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 07:28:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1089.313723][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1089.322496][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1089.463048][ T155] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1089.477177][ T155] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1089.514760][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1089.536949][T25747] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1089.547243][T25747] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:28:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1089.560016][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 07:28:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:57 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5dd") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:57 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:58 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5dd") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:58 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5dd") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:58 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:59 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:59 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:28:59 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:00 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:00 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:00 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:01 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:01 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:01 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:02 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:02 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:03 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1095.622296][ T2255] chnl_net:caif_netlink_parms(): no params data found [ 1096.173392][ T3504] Bluetooth: hci3: command 0x0409 tx timeout 07:29:04 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={0xffffffffffffffff, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:04 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:05 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={0xffffffffffffffff, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:05 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:06 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={0xffffffffffffffff, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1098.187561][ T2255] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.204327][ T2255] bridge0: port 1(bridge_slave_0) entered disabled state [ 1098.243468][T29793] Bluetooth: hci3: command 0x041b tx timeout [ 1098.248989][ T2255] device bridge_slave_0 entered promiscuous mode [ 1098.265990][ T2255] bridge0: port 2(bridge_slave_1) entered blocking state [ 1098.283338][ T2255] bridge0: port 2(bridge_slave_1) entered disabled state [ 1098.311230][ T2255] device bridge_slave_1 entered promiscuous mode 07:29:07 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:07 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:07 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1099.994332][ T1763] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1100.140023][ T2255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1100.170728][ T1763] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1100.261606][ T2255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1100.333453][ T3504] Bluetooth: hci3: command 0x040f tx timeout 07:29:08 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:08 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:09 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1101.418143][ T1763] netdevsim netdevsim2 netdevsim2: renamed from eth2 07:29:09 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1101.916871][ T1763] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1102.282930][ T2255] team0: Port device team_slave_0 added [ 1102.335034][ T2255] team0: Port device team_slave_1 added [ 1102.413340][T29793] Bluetooth: hci3: command 0x0419 tx timeout 07:29:10 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:11 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:11 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1103.782108][ T1730] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1104.390326][ T2255] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1104.403670][ T2255] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1104.473393][ T2255] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1104.515072][ T1730] netdevsim netdevsim1 netdevsim1: renamed from eth1 07:29:12 executing program 3: r0 = syz_open_dev$media(0x0, 0x0, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:12 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1105.037086][ T2255] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1105.053187][ T2255] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1105.113275][ T2255] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1105.139863][ T1730] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1105.257014][ T1730] netdevsim netdevsim1 netdevsim3: renamed from eth3 07:29:14 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:15 executing program 3: r0 = syz_open_dev$media(0x0, 0x0, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:15 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1108.237763][ T2255] device hsr_slave_0 entered promiscuous mode 07:29:16 executing program 3: r0 = syz_open_dev$media(0x0, 0x0, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1108.513873][ T2255] device hsr_slave_1 entered promiscuous mode [ 1109.053381][ T2255] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1109.060972][ T2255] Cannot create hsr debugfs directory 07:29:17 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:18 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1111.031401][ T1763] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1111.103737][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1111.111581][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1111.145670][ T1763] 8021q: adding VLAN 0 to HW filter on device team0 [ 1111.333209][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1111.341948][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1111.373717][T29794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1111.380823][T29794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1111.413617][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 07:29:19 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1111.422454][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1111.453619][T29794] bridge0: port 2(bridge_slave_1) entered blocking state [ 1111.460711][T29794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1111.503594][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1111.512530][T29794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1111.544712][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:29:19 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1111.784561][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1111.806326][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1111.823980][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1111.833046][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1111.864114][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1111.873865][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1111.898095][ T1730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1111.978371][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1111.997469][ T1763] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1112.023891][ T1763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:29:20 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1112.055034][ T1730] 8021q: adding VLAN 0 to HW filter on device team0 [ 1112.062999][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1112.083992][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1112.092385][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1112.114054][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1112.208140][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1112.223877][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1112.232657][ T21] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.239788][ T21] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1112.303783][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1112.313086][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 07:29:20 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1112.354313][ T21] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.361407][ T21] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1112.383581][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1112.537403][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1112.549078][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1112.584469][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1112.614415][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1112.633624][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1112.642444][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1112.682255][ T1730] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1112.713319][ T1730] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 07:29:20 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1112.747958][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1112.756992][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1112.791431][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1112.800484][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1112.809214][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1112.824192][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1112.858763][ T1763] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1112.885259][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1112.892793][ T1933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1112.952378][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1112.964790][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1113.029908][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1113.064329][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1113.102560][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1113.134006][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1113.144098][ T1763] device veth0_vlan entered promiscuous mode [ 1113.182091][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1113.191719][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1113.217121][ T1730] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1113.240210][ T1763] device veth1_vlan entered promiscuous mode [ 1113.309907][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1113.320996][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1113.334218][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1113.345340][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1113.408708][ T1730] device veth0_vlan entered promiscuous mode [ 1113.420617][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1113.429633][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1113.439874][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 07:29:21 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1113.455171][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1113.471643][ T1763] device veth0_macvtap entered promiscuous mode [ 1113.488155][ T2255] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1113.570157][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1113.594133][T29787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1113.606150][ T1763] device veth1_macvtap entered promiscuous mode [ 1113.625883][ T2255] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1113.675580][ T2255] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1113.748353][ T1730] device veth1_vlan entered promiscuous mode [ 1113.757831][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1113.773892][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1113.782352][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1113.800450][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1113.856553][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:29:21 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1113.903251][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1113.943207][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1113.983222][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1114.013222][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.023058][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1114.063158][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.072998][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1114.103809][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.120722][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1114.141602][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.163173][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1114.185727][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.207693][ T1763] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1114.225067][ T2255] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1114.360724][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1114.370325][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 07:29:22 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1114.406399][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1114.423257][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.452363][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1114.473275][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.483111][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1114.523196][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.533021][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1114.560748][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.585022][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1114.606874][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.622377][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1114.638849][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.653068][ T1763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1114.669761][ T1763] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1114.695660][ T1763] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1114.710757][ T1730] device veth0_macvtap entered promiscuous mode [ 1114.747230][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1114.763957][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1114.773935][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1114.794044][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 07:29:22 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1114.806867][ T1763] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1114.833559][ T1763] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1114.842279][ T1763] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1114.861179][ T1763] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1114.886170][ T1730] device veth1_macvtap entered promiscuous mode [ 1114.925939][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1114.943969][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1115.043998][T29787] Bluetooth: hci4: command 0x0409 tx timeout [ 1115.082816][ T2407] chnl_net:caif_netlink_parms(): no params data found 07:29:23 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1115.537610][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.543947][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 07:29:23 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1116.305095][ T2407] bridge0: port 1(bridge_slave_0) entered blocking state [ 1116.312174][ T2407] bridge0: port 1(bridge_slave_0) entered disabled state [ 1116.337420][ T2407] device bridge_slave_0 entered promiscuous mode [ 1116.375062][ T2407] bridge0: port 2(bridge_slave_1) entered blocking state [ 1116.393251][ T2407] bridge0: port 2(bridge_slave_1) entered disabled state [ 1116.401651][ T2407] device bridge_slave_1 entered promiscuous mode 07:29:24 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1116.644666][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1116.652650][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1116.727476][ T2407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1116.761129][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1116.787194][ T2255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1116.816962][ T2407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1116.874336][ T2255] 8021q: adding VLAN 0 to HW filter on device team0 07:29:24 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1117.036373][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1117.053946][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1117.063306][ T155] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1117.077750][ T155] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1117.089555][ T2407] team0: Port device team_slave_0 added [ 1117.133819][ T13] Bluetooth: hci4: command 0x041b tx timeout [ 1117.237068][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1117.255877][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1117.273842][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:29:25 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1117.282376][T29793] bridge0: port 1(bridge_slave_0) entered blocking state [ 1117.289481][T29793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1117.313622][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1117.322702][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 07:29:25 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1117.343568][T29793] bridge0: port 2(bridge_slave_1) entered blocking state [ 1117.350637][T29793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1117.373693][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1117.384612][ T2407] team0: Port device team_slave_1 added 07:29:25 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:25 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:25 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:26 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:26 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:26 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:26 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:26 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:27 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1119.213515][T29791] Bluetooth: hci4: command 0x040f tx timeout 07:29:27 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:27 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:27 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1119.853543][T29786] Bluetooth: hci0: command 0x0409 tx timeout 07:29:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:28 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1120.844786][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1120.862024][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1120.888951][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1120.915071][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1120.941299][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1120.965276][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 07:29:29 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1121.304295][ T3559] Bluetooth: hci4: command 0x0419 tx timeout 07:29:29 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1121.487704][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 07:29:29 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1121.925096][ T3611] Bluetooth: hci0: command 0x041b tx timeout [ 1122.080074][ T2407] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1122.093291][ T2407] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1122.152813][ T2407] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1122.191244][ T2255] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1122.223171][ T2255] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 07:29:30 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1122.510104][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1122.534115][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1122.563941][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1122.572472][T29793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1122.604629][ T2407] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1122.611608][ T2407] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1122.663159][ T2407] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:29:30 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:30 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:31 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1123.548746][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:29:32 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1124.003266][ T3559] Bluetooth: hci0: command 0x040f tx timeout 07:29:32 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:32 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:33 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:33 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1126.083291][ T3559] Bluetooth: hci0: command 0x0419 tx timeout 07:29:34 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:35 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:35 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:36 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1128.617497][ T2255] 8021q: adding VLAN 0 to HW filter on device batadv0 07:29:37 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:37 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1129.857056][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1129.893755][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:29:38 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:38 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:39 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:40 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:40 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:41 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:41 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:42 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:42 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1134.564700][ T2407] device hsr_slave_0 entered promiscuous mode [ 1134.604009][ T2407] device hsr_slave_1 entered promiscuous mode [ 1134.610907][ T2407] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1134.628942][ T2407] Cannot create hsr debugfs directory 07:29:43 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1135.828668][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1135.838165][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1135.889308][ T2255] device veth0_vlan entered promiscuous mode [ 1136.481301][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1136.495990][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1136.529343][ T2255] device veth1_vlan entered promiscuous mode 07:29:44 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:45 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1137.956018][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1137.983993][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1137.991941][T29791] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1138.150810][ T2255] device veth0_macvtap entered promiscuous mode [ 1138.189729][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1138.203004][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1138.219674][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1138.257858][ T2255] device veth1_macvtap entered promiscuous mode 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1138.311396][ T2480] chnl_net:caif_netlink_parms(): no params data found [ 1138.360552][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1138.380178][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.408051][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1138.440760][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.462431][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1138.479078][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.490625][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1138.501775][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1138.520120][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1138.574648][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.588735][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1138.618454][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.643676][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1138.656978][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1138.678770][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1138.692008][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.704639][ T2255] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1138.732234][ T5013] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1138.783768][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1138.791985][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1138.804164][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1138.815025][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1138.827035][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.837965][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1138.848683][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.863299][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 07:29:46 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1138.893381][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.933934][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1138.953141][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.962979][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1138.974835][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1138.989622][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1139.013164][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1139.023014][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1139.039377][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1139.051268][ T2255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1139.071853][ T2255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1139.093503][ T2255] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1139.107668][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1139.135555][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1139.178763][ T5013] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1139.228115][ T2255] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1139.241629][ T2255] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1139.262835][ T2255] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1139.271915][ T2255] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1139.297808][ T5013] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1139.369833][ T5013] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1139.467425][ T2480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1139.475085][ T2480] bridge0: port 1(bridge_slave_0) entered disabled state [ 1139.485049][ T2480] device bridge_slave_0 entered promiscuous mode [ 1139.495992][ T2480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1139.503357][ T2480] bridge0: port 2(bridge_slave_1) entered disabled state [ 1139.511533][ T2480] device bridge_slave_1 entered promiscuous mode [ 1139.569901][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1139.587501][ T2480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1139.613246][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1139.661119][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1139.682236][ T2480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1139.747534][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1139.777977][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:47 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1140.062403][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1140.079580][ T2480] team0: Port device team_slave_0 added 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") [ 1140.121099][ T2480] team0: Port device team_slave_1 added 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226") 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226") 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226") 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1140.436571][ T2480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1140.473235][ T2480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3") [ 1140.533420][ T2480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3") [ 1140.608773][ T2480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1140.623357][ T2480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1140.693336][ T2480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3") 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:29:48 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d934") 07:29:48 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 1140.846553][ T2480] device hsr_slave_0 entered promiscuous mode [ 1140.874980][ T2480] device hsr_slave_1 entered promiscuous mode [ 1140.905006][ T2480] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1140.912610][ T2480] Cannot create hsr debugfs directory 07:29:49 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d934") 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d934") 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb9") 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb9") 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb9") 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:49 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1") 07:29:49 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, &(0x7f0000000700)) [ 1141.781475][ T2407] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1141.844432][ T2407] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1141.882966][ T2407] netdevsim netdevsim0 netdevsim2: renamed from eth2 07:29:49 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1") [ 1141.952137][ T2407] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1141.965676][ T2761] chnl_net:caif_netlink_parms(): no params data found 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:50 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1") 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, &(0x7f0000000700)) [ 1142.083927][ T3504] Bluetooth: hci2: command 0x0409 tx timeout 07:29:50 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1") 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, 0x0) 07:29:50 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, 0x0) 07:29:50 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, 0x0) 07:29:50 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d934") 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, 0x0) 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, 0x0) 07:29:50 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3") 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x0, 0xffffffffffffffe1}) clock_gettime(0x0, 0x0) 07:29:50 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:29:50 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") 07:29:50 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:29:51 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:51 executing program 4: getpgid(0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") 07:29:51 executing program 3: syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:29:51 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:51 executing program 3: syz_open_dev$media(0x0, 0x2f0580000, 0x4401) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:29:51 executing program 4: syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:29:51 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1143.345115][ T2761] bridge0: port 1(bridge_slave_0) entered blocking state [ 1143.352219][ T2761] bridge0: port 1(bridge_slave_0) entered disabled state [ 1143.377044][ T2761] device bridge_slave_0 entered promiscuous mode 07:29:51 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1143.406278][ T2761] bridge0: port 2(bridge_slave_1) entered blocking state [ 1143.421361][ T2761] bridge0: port 2(bridge_slave_1) entered disabled state 07:29:51 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1143.447903][ T2761] device bridge_slave_1 entered promiscuous mode 07:29:51 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1143.555291][ T2407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1143.565626][ T2761] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 07:29:51 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1143.671213][ T2407] 8021q: adding VLAN 0 to HW filter on device team0 [ 1143.705955][ T2761] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:29:51 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1143.764820][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1143.776414][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:29:51 executing program 3: syz_open_dev$media(0x0, 0x0, 0x4401) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:29:51 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:51 executing program 3: syz_open_dev$media(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1143.910573][ T2761] team0: Port device team_slave_0 added 07:29:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:52 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1144.173597][ T13] Bluetooth: hci2: command 0x041b tx timeout [ 1144.175650][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 07:29:52 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1144.214841][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1144.235730][T25563] bridge0: port 1(bridge_slave_0) entered blocking state [ 1144.242830][T25563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1144.277086][ T2761] team0: Port device team_slave_1 added 07:29:52 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1144.344363][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1144.352446][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1144.383986][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1144.407722][T25551] bridge0: port 2(bridge_slave_1) entered blocking state [ 1144.414871][T25551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1144.439422][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:29:52 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:52 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1144.516943][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1144.544495][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1144.554694][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1144.576716][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1144.595375][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1144.630513][ T2761] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1144.647621][ T2761] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 07:29:52 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1144.723178][ T2761] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1144.755891][ T2761] batman_adv: batadv0: Adding interface: batadv_slave_1 07:29:52 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1144.762874][ T2761] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1144.822051][ T2761] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1144.845735][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1144.858710][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1144.885633][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1144.926717][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1144.944140][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1144.973845][ T2407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:29:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1145.050193][ T2480] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1145.089638][ T2480] netdevsim netdevsim1 netdevsim1: renamed from eth1 07:29:53 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1145.161123][ T2761] device hsr_slave_0 entered promiscuous mode [ 1145.187331][ T2761] device hsr_slave_1 entered promiscuous mode [ 1145.214578][ T2761] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1145.222203][ T2761] Cannot create hsr debugfs directory [ 1145.244667][ T2480] netdevsim netdevsim1 netdevsim2: renamed from eth2 07:29:53 executing program 3: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1145.378258][ T2480] netdevsim netdevsim1 netdevsim3: renamed from eth3 07:29:53 executing program 4: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:53 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:54 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1146.246605][ T3504] Bluetooth: hci2: command 0x040f tx timeout [ 1146.286824][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1146.295979][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1146.326858][ T2407] 8021q: adding VLAN 0 to HW filter on device batadv0 07:29:54 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={0xffffffffffffffff, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:54 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:54 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:54 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:55 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:55 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1147.579276][ T2761] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1147.784743][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1147.813954][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1147.849255][ T2407] device veth0_vlan entered promiscuous mode 07:29:55 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r2 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1147.894275][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1147.906100][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1147.928005][ T2480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1147.956098][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1147.986559][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1148.011341][ T2407] device veth1_vlan entered promiscuous mode [ 1148.057591][ T2480] 8021q: adding VLAN 0 to HW filter on device team0 [ 1148.074443][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1148.082883][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1148.113973][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:29:56 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1148.323443][ T13] Bluetooth: hci2: command 0x0419 tx timeout 07:29:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:56 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1148.980055][ T2761] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1149.087129][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1149.097453][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1149.114247][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1149.122839][T25563] bridge0: port 1(bridge_slave_0) entered blocking state [ 1149.130032][T25563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1149.184918][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1149.199081][T25563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1149.213893][T25563] bridge0: port 2(bridge_slave_1) entered blocking state [ 1149.221015][T25563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1149.250261][ T2407] device veth0_macvtap entered promiscuous mode [ 1149.282708][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1149.292323][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:29:57 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1149.316937][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1149.339266][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1149.365265][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1149.410688][ T2407] device veth1_macvtap entered promiscuous mode 07:29:57 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:29:58 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570", 0x54, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1150.172622][ T2761] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1150.201293][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1150.209915][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1150.264189][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1150.293770][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1150.303870][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1150.323722][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1150.375449][ T413] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1150.384420][ T413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1150.423860][ T413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1150.432521][ T413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1150.474079][ T413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1150.484716][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.511458][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.542929][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.568737][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.601819][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.627094][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.649490][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.673308][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:29:58 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570", 0x54, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1150.712127][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.743166][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.770739][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.793453][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.808823][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.833162][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.843050][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.883761][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.894036][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1150.923283][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1150.955313][ T2407] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1150.965346][ T2480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:29:59 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:29:59 executing program 4: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:29:59 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1152.147523][ T2761] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1152.353866][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1152.362755][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1152.418881][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1152.433192][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.453482][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 07:30:00 executing program 4: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1152.485815][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.508822][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1152.543292][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.565441][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1152.603484][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.633398][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 07:30:00 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1152.673241][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.703863][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1152.733415][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.743428][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1152.758880][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.768768][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1152.783139][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.792960][ T2407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1152.823193][ T2407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1152.834659][ T2407] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1152.853870][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1152.894009][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1152.905644][ T2407] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1152.922506][ T2407] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1152.943312][ T2407] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1152.952039][ T2407] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1153.004122][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1153.011644][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1153.251515][ T2480] 8021q: adding VLAN 0 to HW filter on device batadv0 07:30:01 executing program 3: syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:01 executing program 4: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:01 executing program 3: syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:02 executing program 4: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:02 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:02 executing program 4: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:03 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1155.401530][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1155.421815][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1155.473344][ T2480] device veth0_vlan entered promiscuous mode [ 1155.483911][T25747] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1155.492093][T25747] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1155.509851][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1155.518553][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1155.552302][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1155.584605][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1155.592951][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1155.621662][ T2480] device veth1_vlan entered promiscuous mode [ 1155.674493][ T2761] netdevsim netdevsim2 netdevsim0: renamed from eth0 07:30:03 executing program 4: syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1156.340154][ T3612] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1156.350838][ T2761] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1156.357687][ T3612] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:30:04 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1156.632670][ T2761] netdevsim netdevsim2 netdevsim2: renamed from eth2 07:30:04 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:05 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1157.320003][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1157.364114][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1157.394139][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1157.402480][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1157.461555][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1157.488641][ T2480] device veth0_macvtap entered promiscuous mode 07:30:05 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1157.517870][ T2761] netdevsim netdevsim2 netdevsim3: renamed from eth3 07:30:05 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:05 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:05 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:06 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:06 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:06 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1158.747183][ T2480] device veth1_macvtap entered promiscuous mode [ 1158.805129][ T413] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1158.849375][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1158.887017][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1158.944311][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1158.983165][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1158.993021][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.056468][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.073139][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:30:07 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1159.114313][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.143239][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:30:07 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1159.223323][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.253390][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.283358][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.315846][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.363234][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.413846][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:30:07 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1159.459077][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.523820][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.553419][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.603791][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1159.633327][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.684221][ T2480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1159.733394][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1159.742454][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1159.767539][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1159.803163][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.813028][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1159.853379][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1159.884489][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1159.917207][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:30:08 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1159.963248][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.003268][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.046791][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.108694][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.143161][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 07:30:08 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:30:08 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1160.174543][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.203354][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.231807][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.313260][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.349603][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.385477][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.407253][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.443188][ T2480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1160.493228][ T2480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1160.546297][ T2480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1160.597463][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1160.606410][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1160.639275][ T2480] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 07:30:08 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 1160.693206][ T2480] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1160.701960][ T2480] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1160.770916][ T2480] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 07:30:09 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:30:09 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:30:10 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:10 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:10 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:11 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:11 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:11 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:12 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:12 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:13 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:13 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:13 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:13 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:14 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:15 executing program 4: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:15 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:16 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:16 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:16 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:18 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:19 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1171.625874][ T2761] 8021q: adding VLAN 0 to HW filter on device bond0 07:30:20 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:20 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:21 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1173.582187][ T2761] 8021q: adding VLAN 0 to HW filter on device team0 [ 1173.623813][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1173.631794][T29786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1173.723308][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1173.732059][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1173.783924][T25544] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.791045][T25544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.820647][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1173.862830][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1173.887679][T25544] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.894828][T25544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.933700][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1173.952240][ T3612] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1173.994396][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1174.002772][ T3612] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1174.013840][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1174.049677][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1174.088873][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1174.124786][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1174.138436][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1174.180023][ T3612] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1174.200811][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1174.218911][ T3612] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:30:22 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) [ 1174.233685][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1174.251267][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1174.276378][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1174.313391][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1174.322102][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:30:22 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1174.353648][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1174.384853][ T2761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:30:22 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:22 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1174.820765][ T2761] 8021q: adding VLAN 0 to HW filter on device batadv0 07:30:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1174.864496][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1174.872140][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1174.934059][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1174.970951][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:30:23 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1175.010180][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1175.032712][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1175.056810][ T2761] device veth0_vlan entered promiscuous mode [ 1175.078825][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1175.090295][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1175.130711][ T2761] device veth1_vlan entered promiscuous mode [ 1175.234124][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1175.242593][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1175.272299][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1175.317794][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1175.367863][ T2761] device veth0_macvtap entered promiscuous mode [ 1175.392754][ T2761] device veth1_macvtap entered promiscuous mode [ 1175.418619][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.433189][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.445492][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.473658][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.491614][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.513296][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.544066][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.563280][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.583286][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 07:30:23 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1175.630165][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.664494][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.713726][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.757911][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.775729][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.796397][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.835799][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.873172][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.897692][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.933798][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.953291][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1175.972737][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1175.997540][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.031583][ T2761] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1176.063708][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1176.072081][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 07:30:24 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) [ 1176.104038][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1176.125189][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1176.151774][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.193173][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:30:24 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1176.233160][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.275442][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.312636][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.381398][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 07:30:24 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1176.444417][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.505945][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.533328][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.573316][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.601727][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.655962][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.693565][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.720528][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.748210][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 07:30:24 executing program 3: mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1176.774285][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.813226][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.853190][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.863072][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.894141][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1176.971748][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1176.973529][ T2761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1176.978109][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 [ 1176.995970][ T2761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.034914][ T2761] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1177.043210][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1177.052148][T25544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1177.097156][ T2761] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.123826][ T2761] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.173288][ T2761] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.182055][ T2761] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 07:30:25 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:25 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:25 executing program 3: mq_open(0x0, 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:25 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:26 executing program 3: mq_open(0x0, 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:26 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:26 executing program 3: mq_open(0x0, 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1178.670507][ T155] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1178.693435][ T155] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:30:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:26 executing program 3: mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:30:26 executing program 3: mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x0, 0x0) 07:30:26 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:27 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:27 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:27 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1179.373437][ T3504] Bluetooth: hci4: command 0x0409 tx timeout 07:30:27 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:27 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:27 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:27 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:28 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), 0x0}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1180.205446][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 07:30:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={0xffffffffffffffff, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1180.249188][ T155] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1180.273359][ T155] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1180.285197][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 07:30:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:28 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, 0x0, &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1180.568915][ T3481] chnl_net:caif_netlink_parms(): no params data found 07:30:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:28 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:28 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:29 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, 0x0, &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:29 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:29 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:29 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) [ 1181.482530][ T13] Bluetooth: hci4: command 0x041b tx timeout 07:30:29 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:29 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:29 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1181.815262][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.822353][ T3481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.874395][ T3481] device bridge_slave_0 entered promiscuous mode [ 1181.908726][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.935575][ T3481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.962670][ T3481] device bridge_slave_1 entered promiscuous mode 07:30:30 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:30 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:30 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:30 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1182.608206][ T3481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1182.642313][ T3481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:30:30 executing program 4: mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:30 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:31 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:31 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:31 executing program 4: mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) [ 1183.523503][ T13] Bluetooth: hci4: command 0x040f tx timeout 07:30:31 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:32 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:32 executing program 4: mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:32 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:32 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:32 executing program 4: mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:32 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:33 executing program 4: mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) 07:30:33 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:33 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:33 executing program 4: mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x0, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) [ 1185.613268][ T13] Bluetooth: hci4: command 0x0419 tx timeout 07:30:33 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:33 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:33 executing program 4: mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x0, 0x0) 07:30:34 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:34 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:34 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1186.497176][ T3481] team0: Port device team_slave_0 added [ 1186.514256][ T3481] team0: Port device team_slave_1 added 07:30:34 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:35 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:35 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:35 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:35 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:36 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:36 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:36 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1188.819463][ T3481] batman_adv: batadv0: Adding interface: batadv_slave_0 07:30:36 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1188.846836][ T3481] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1188.878570][ T3481] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 07:30:37 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:37 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:37 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:38 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:38 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:39 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:39 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:30:40 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:40 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:40 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:40 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 1192.813896][ T3481] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1192.820869][ T3481] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1192.926529][ T3481] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 07:30:41 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14", 0x2d, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:41 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:30:41 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, 0x0, &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:41 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1193.961364][ T3481] device hsr_slave_0 entered promiscuous mode [ 1193.971715][ T3481] device hsr_slave_1 entered promiscuous mode [ 1193.979667][ T3481] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1194.043199][ T3481] Cannot create hsr debugfs directory 07:30:42 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:42 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:43 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14", 0x2d, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:43 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:43 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:44 executing program 3: syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:44 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:44 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:44 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:45 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:46 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:46 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:46 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1198.708039][ T3481] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:30:46 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1199.045215][ T3481] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:30:47 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:47 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:48 executing program 3: syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:49 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:49 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:49 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:50 executing program 3: syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:50 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:50 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), 0x0}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:50 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:51 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:51 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1204.351445][ T3481] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:30:52 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:52 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:53 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:53 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:53 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:54 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:54 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:54 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") [ 1207.027041][ T3481] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 07:30:55 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:56 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:56 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:57 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:58 executing program 3: syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:30:58 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:58 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:59 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1}) clock_gettime(0x0, &(0x7f0000000700)) 07:30:59 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1211.966037][ T3481] netdevsim netdevsim0 netdevsim0: renamed from eth0 07:31:00 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:31:00 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:00 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:01 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:01 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:01 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:02 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:02 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1214.529750][ T3481] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1214.557370][ T3481] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1214.631224][ T3481] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1214.652837][ T5013] device hsr_slave_0 left promiscuous mode [ 1214.686720][ T5013] device hsr_slave_1 left promiscuous mode [ 1214.713971][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 07:31:03 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r1 = getpgid(0xffffffffffffffff) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1215.437618][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1215.853182][ T5013] device bridge_slave_1 left promiscuous mode [ 1215.859415][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:04 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, 0x0, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:04 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:31:04 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1216.847112][ T5013] device bridge_slave_0 left promiscuous mode [ 1216.857911][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:04 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:05 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r2 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) r3 = getpgid(0xffffffffffffffff) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000540)={r0, r2, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:05 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:31:06 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:06 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:31:07 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:07 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1219.680868][ T5013] device hsr_slave_0 left promiscuous mode 07:31:07 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1220.013230][ T3564] Bluetooth: hci3: command 0x0406 tx timeout 07:31:08 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1220.662276][ T5013] device hsr_slave_1 left promiscuous mode 07:31:08 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") 07:31:09 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1}) clock_gettime(0x0, 0x0) [ 1221.531506][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1221.571381][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 07:31:09 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1221.958082][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1221.965614][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:10 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1222.268656][ T5013] device bridge_slave_1 left promiscuous mode [ 1222.288534][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:10 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:11 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:11 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, 0x0) [ 1223.494632][ T5013] device bridge_slave_0 left promiscuous mode [ 1223.501067][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:11 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, 0x0) 07:31:12 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, 0x0) 07:31:12 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:12 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:12 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, 0x0) [ 1225.744971][ T5013] device hsr_slave_0 left promiscuous mode 07:31:14 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837f") mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:14 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f083") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1226.382372][ T5013] device hsr_slave_1 left promiscuous mode 07:31:14 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:14 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:15 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98b") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:15 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb23") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1227.571986][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1228.188159][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:16 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1228.902455][ T5013] device bridge_slave_1 left promiscuous mode [ 1228.909264][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.896639][ T5013] device bridge_slave_0 left promiscuous mode [ 1229.902907][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:17 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={0xffffffffffffffff, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:18 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb23") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:18 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1230.008499][ T5013] device bridge_slave_1 left promiscuous mode [ 1230.036819][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:18 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1230.926187][ T5013] device bridge_slave_0 left promiscuous mode [ 1230.932453][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:19 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:19 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={0xffffffffffffffff, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:19 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:20 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:20 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:21 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1233.209798][ T5013] device hsr_slave_0 left promiscuous mode 07:31:21 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={0xffffffffffffffff, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:21 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), 0x0}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:21 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), 0x0}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1234.169859][ T5013] device hsr_slave_1 left promiscuous mode 07:31:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, 0x0, &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:22 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1234.769589][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 07:31:22 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:22 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:22 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), 0x0}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1235.027630][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:23 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), 0x0}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1235.092816][ T5013] device bridge_slave_1 left promiscuous mode [ 1235.102504][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1235.126689][ T5013] device bridge_slave_0 left promiscuous mode [ 1235.132897][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 1235.186174][ T5013] device hsr_slave_0 left promiscuous mode [ 1235.343391][ T5013] device hsr_slave_1 left promiscuous mode 07:31:24 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r0, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1236.033757][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 07:31:24 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r0, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1236.314789][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:24 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:24 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1236.615528][ T5013] device bridge_slave_1 left promiscuous mode [ 1236.621751][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:25 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1237.348228][ T5013] device bridge_slave_0 left promiscuous mode [ 1237.357293][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:25 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:25 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:26 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:26 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, 0xffffffffffffffff, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1238.417021][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.423403][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 07:31:26 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:26 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:27 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:27 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:27 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1240.043187][ T5013] device hsr_slave_0 left promiscuous mode 07:31:28 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:28 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1240.243599][ T5013] device hsr_slave_1 left promiscuous mode [ 1240.256488][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1240.270019][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1240.483179][T29786] Bluetooth: hci0: command 0x0406 tx timeout [ 1240.876265][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1240.908890][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:29 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:29 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) [ 1241.912444][ T5013] device bridge_slave_1 left promiscuous mode [ 1241.939880][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:29 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:30 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:30 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:31 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) [ 1243.115636][ T5013] device bridge_slave_0 left promiscuous mode [ 1243.121875][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:31 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) 07:31:31 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:32 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:32 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:32 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:33 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, 0x0) 07:31:33 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:33 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:33 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x0, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1245.344519][ T5013] device hsr_slave_0 left promiscuous mode [ 1245.394081][ T5013] device hsr_slave_1 left promiscuous mode [ 1245.683342][T29791] Bluetooth: hci5: command 0x0409 tx timeout 07:31:34 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1246.426001][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1246.433717][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 07:31:35 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1247.318787][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1247.343234][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:35 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:35 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 1247.773342][ T3564] Bluetooth: hci5: command 0x041b tx timeout 07:31:35 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:31:36 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1248.450011][ T5013] device bridge_slave_1 left promiscuous mode [ 1248.463272][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:36 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:36 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:36 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:37 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1249.843337][T29794] Bluetooth: hci5: command 0x040f tx timeout [ 1249.925349][ T5013] device bridge_slave_0 left promiscuous mode [ 1249.931578][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:38 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:38 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:38 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1250.409180][ T5013] device hsr_slave_0 left promiscuous mode [ 1250.443902][ T5013] device hsr_slave_1 left promiscuous mode 07:31:38 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(0x0, 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1250.452556][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1250.473651][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1250.495355][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1250.502808][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1250.533489][ T5013] device bridge_slave_1 left promiscuous mode [ 1250.539707][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1250.580185][ T5013] device bridge_slave_0 left promiscuous mode [ 1250.594473][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state [ 1250.663259][ T5013] device hsr_slave_0 left promiscuous mode [ 1250.679603][ T5013] device hsr_slave_1 left promiscuous mode [ 1251.816803][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1251.835345][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1251.923296][T29791] Bluetooth: hci5: command 0x0419 tx timeout 07:31:39 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1252.110950][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1252.123214][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:40 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235b") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:40 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1252.560757][ T5013] device bridge_slave_1 left promiscuous mode [ 1252.573421][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:40 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x0, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:41 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1253.637806][ T5013] device bridge_slave_0 left promiscuous mode [ 1253.655496][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:41 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:42 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:42 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:42 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:42 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:43 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:43 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed1322432") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:43 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1255.719492][ T5013] device hsr_slave_0 left promiscuous mode [ 1255.753407][ T5013] device hsr_slave_1 left promiscuous mode 07:31:44 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:45 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x0, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:45 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1257.362299][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1257.397305][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_0 07:31:45 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), 0x0) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1257.958579][ T5013] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1257.966864][ T5013] batman_adv: batadv0: Removing interface: batadv_slave_1 07:31:46 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:46 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) [ 1258.947460][ T5013] device bridge_slave_1 left promiscuous mode [ 1258.956875][ T5013] bridge0: port 2(bridge_slave_1) entered disabled state 07:31:46 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:47 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, 0x0, &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:47 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1", 0x58, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:48 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1", 0x58, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1260.131333][ T5013] device bridge_slave_0 left promiscuous mode [ 1260.137657][ T5013] bridge0: port 1(bridge_slave_0) entered disabled state 07:31:48 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:31:48 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4f", 0x57, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1260.847299][ T5013] device veth1_macvtap left promiscuous mode [ 1260.873279][ T5013] device veth0_macvtap left promiscuous mode [ 1260.879363][ T5013] device veth1_vlan left promiscuous mode [ 1260.933232][ T5013] device veth0_vlan left promiscuous mode 07:31:49 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:49 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb4196", 0x43, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:49 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 07:31:49 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14", 0x2d, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:50 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:51 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:51 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:51 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1263.753727][ T5013] device veth1_macvtap left promiscuous mode [ 1263.760619][ T5013] device veth0_macvtap left promiscuous mode [ 1263.793301][ T5013] device veth1_vlan left promiscuous mode [ 1263.803403][ T5013] device veth0_vlan left promiscuous mode [ 1264.589142][ T5013] device veth1_vlan left promiscuous mode [ 1264.609240][ T5013] device veth0_vlan left promiscuous mode 07:31:52 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1264.813523][ T5013] device veth1_macvtap left promiscuous mode [ 1264.819748][ T5013] device veth0_macvtap left promiscuous mode [ 1264.853407][ T5013] device veth1_vlan left promiscuous mode [ 1264.859222][ T5013] device veth0_vlan left promiscuous mode [ 1264.875453][ T5013] device veth1_macvtap left promiscuous mode [ 1264.881494][ T5013] device veth0_macvtap left promiscuous mode [ 1264.908321][ T5013] device veth1_vlan left promiscuous mode [ 1264.953205][ T5013] device veth0_vlan left promiscuous mode [ 1265.282924][ T5013] device veth1_macvtap left promiscuous mode [ 1265.292975][ T5013] device veth0_macvtap left promiscuous mode [ 1265.303227][ T5013] device veth1_vlan left promiscuous mode [ 1265.309022][ T5013] device veth0_vlan left promiscuous mode [ 1265.413876][ T5013] device veth1_macvtap left promiscuous mode [ 1265.419922][ T5013] device veth0_macvtap left promiscuous mode [ 1265.433543][ T5013] device veth1_vlan left promiscuous mode [ 1265.439334][ T5013] device veth0_vlan left promiscuous mode [ 1265.633728][ T5013] device veth1_macvtap left promiscuous mode [ 1265.639971][ T5013] device veth0_macvtap left promiscuous mode [ 1265.663309][ T5013] device veth1_vlan left promiscuous mode [ 1265.669123][ T5013] device veth0_vlan left promiscuous mode [ 1266.083323][T29794] Bluetooth: hci2: command 0x0406 tx timeout 07:31:54 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:55 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:55 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), 0x0}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:56 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), 0x0}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:56 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, 0x0, &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:57 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, 0x0, &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:31:59 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:00 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:02 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:04 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:06 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:07 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), 0x0}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:09 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:11 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:13 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:15 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:16 executing program 3: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:16 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0x0, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:17 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1292.813263][ T3564] Bluetooth: hci1: command 0x0409 tx timeout [ 1292.823719][ T3564] Bluetooth: hci0: command 0x0409 tx timeout 07:32:21 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:21 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1294.883160][T29794] Bluetooth: hci0: command 0x041b tx timeout [ 1294.894296][T29794] Bluetooth: hci1: command 0x041b tx timeout [ 1296.963189][ T4609] Bluetooth: hci1: command 0x040f tx timeout [ 1296.969244][ T4609] Bluetooth: hci0: command 0x040f tx timeout 07:32:25 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1297.443215][ T3564] Bluetooth: hci6: command 0x0409 tx timeout [ 1299.043263][T25551] Bluetooth: hci0: command 0x0419 tx timeout [ 1299.050300][T25551] Bluetooth: hci1: command 0x0419 tx timeout [ 1299.523299][T25551] Bluetooth: hci6: command 0x041b tx timeout [ 1299.846394][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.852699][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 07:32:28 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1301.603205][ T414] Bluetooth: hci6: command 0x040f tx timeout [ 1301.933162][ T3564] Bluetooth: hci4: command 0x0406 tx timeout [ 1303.683224][ T3564] Bluetooth: hci6: command 0x0419 tx timeout 07:32:33 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:36 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:37 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), 0x0}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1311.773272][ T3564] Bluetooth: hci7: command 0x0409 tx timeout 07:32:41 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1313.853367][ T4609] Bluetooth: hci7: command 0x041b tx timeout [ 1315.933372][ T3564] Bluetooth: hci7: command 0x040f tx timeout 07:32:45 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1318.013287][ T3564] Bluetooth: hci7: command 0x0419 tx timeout 07:32:49 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:32:54 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:00 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={0x80000000, &(0x7f0000000240), &(0x7f0000000280)}) r2 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r1, &(0x7f0000000540)={r0, r1, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:03 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:05 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:06 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1339.004588][ T5013] team0 (unregistering): Port device team_slave_1 removed [ 1339.524580][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 1339.701066][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:33:08 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1340.194418][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:33:09 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1341.457371][ T5013] bond0 (unregistering): Released all slaves 07:33:10 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:11 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:12 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) getpgid(0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:13 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x4401) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(0x0, r4, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:14 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1347.174124][ T5013] team0 (unregistering): Port device team_slave_1 removed 07:33:15 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1348.147092][ T5013] team0 (unregistering): Port device team_slave_0 removed 07:33:16 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) [ 1348.734508][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1350.366593][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:33:18 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}, {{0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)}) r4 = getpgid(0xffffffffffffffff) r5 = syz_clone(0x20000, &(0x7f0000000340)="35e2d64c2b4052d20c7711b9d3c081237853334a0e48ad94523cdc996f58bf041dbde168f8049074d24e8c7a14053cad433fd62ab357fb5784a7aa773c8516c3fb41969a235eb9dd42e846fc4180dfe99d81d570750c4fa1bb", 0x59, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="a77637471fcba561db86a2bfe6fb236122a62e11b98be18731f0837fa80a839b62a48ea131074055c81d74fa869a6787819c75e393a6d251d0442f9c05a51095f69c6e296846bcff0aee7894aa4f741eb74dfe604a2f29cc0b9f9a4f4b0327a059e970847570cf84a28581e0184f8d1a76207618663de78e0b18ea9e893a4240a0cdf05d1e92d079f6f5c48c646f7286cfe0076cf62b02ef5b088df11ed132243226231dac3227749480af7bac4ae3e0add8c647d93483dcb928b1ac978f9b0e21bcfae4d1e43db2ab522dde557b235ba72cc5ddc7c7") kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000540)={r0, r3, 0x2}) mq_open(&(0x7f0000000580)='/dev/media#\x00', 0x80, 0x18, &(0x7f00000005c0)={0xd1773db, 0x8001, 0xffffffffffffffe1, 0x5}) clock_gettime(0x0, &(0x7f0000000700)) 07:33:19 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={r1, &(0x7f0000000140), &(0x7f0000000180)}) [ 1351.484128][ T5013] bond0 (unregistering): Released all slaves 07:33:20 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) 07:33:21 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) 07:33:21 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) 07:33:22 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) 07:33:23 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) 07:33:24 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) [ 1356.555239][ T5013] team0 (unregistering): Port device team_slave_1 removed [ 1356.724778][ T5013] team0 (unregistering): Port device team_slave_0 removed 07:33:25 executing program 2: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) [ 1357.061521][ T4651] syz-executor.2 (4651) used greatest stack depth: 16736 bytes left [ 1357.526147][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 07:33:25 executing program 2: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) [ 1357.866974][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:33:26 executing program 2: r0 = syz_open_dev$media(0x0, 0x2f0580000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) [ 1358.723573][T29794] Bluetooth: hci8: command 0x0409 tx timeout [ 1358.803187][ T401] Bluetooth: hci9: command 0x0409 tx timeout 07:33:26 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) [ 1358.930929][ T5013] bond0 (unregistering): Released all slaves 07:33:27 executing program 2: syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) 07:33:27 executing program 2: syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) [ 1359.841485][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1359.950593][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 07:33:28 executing program 2: syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) 07:33:28 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) [ 1360.813476][ T4609] Bluetooth: hci8: command 0x041b tx timeout [ 1360.883276][ T4609] Bluetooth: hci9: command 0x041b tx timeout 07:33:29 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) [ 1361.185037][ T5013] bond0 (unregistering): Released all slaves [ 1361.296422][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.302776][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 07:33:29 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) 07:33:30 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) [ 1362.424790][ T5013] bond0 (unregistering): Released all slaves 07:33:30 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) [ 1362.883812][ T3564] Bluetooth: hci8: command 0x040f tx timeout [ 1362.963246][ T4609] Bluetooth: hci9: command 0x040f tx timeout 07:33:31 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, 0x0, &(0x7f0000000180)}) [ 1363.283406][ T3564] Bluetooth: hci10: command 0x0409 tx timeout 07:33:31 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) 07:33:31 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) 07:33:32 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) [ 1364.227500][ T5013] team0 (unregistering): Port device team_slave_1 removed 07:33:32 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) [ 1364.964217][ T4609] Bluetooth: hci8: command 0x0419 tx timeout [ 1365.053499][ T4609] Bluetooth: hci9: command 0x0419 tx timeout [ 1365.123232][ T27] INFO: task kworker/0:1:13 blocked for more than 143 seconds. [ 1365.131301][ T27] Not tainted 5.15.148-syzkaller #0 [ 1365.153166][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1365.161886][ T27] task:kworker/0:1 state:D stack:23648 pid: 13 ppid: 2 flags:0x00004000 [ 1365.213275][ T27] Workqueue: events switchdev_deferred_process_work [ 1365.220192][ T27] Call Trace: [ 1365.233167][ T27] [ 1365.236336][ T27] __schedule+0x12c4/0x45b0 [ 1365.241970][ T27] ? mark_lock+0x98/0x340 [ 1365.263101][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1365.269311][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1365.293983][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1365.299524][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1365.313172][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1365.323520][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1365.328947][ T27] schedule+0x11b/0x1f0 [ 1365.354923][ T27] schedule_preempt_disabled+0xf/0x20 [ 1365.360367][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1365.373211][ T4609] Bluetooth: hci10: command 0x041b tx timeout [ 1365.383664][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1365.390075][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1365.403796][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1365.409959][ T27] ? print_irqtrace_events+0x210/0x210 [ 1365.431787][ T5013] team0 (unregistering): Port device team_slave_0 removed [ 1365.443154][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1365.448582][ T27] mutex_lock_nested+0x17/0x20 [ 1365.465205][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1365.471336][ T27] process_one_work+0x8a1/0x10c0 [ 1365.493156][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1365.499190][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1365.523253][ T27] ? kthread_data+0x4e/0xc0 [ 1365.528185][ T27] ? wq_worker_running+0x97/0x170 [ 1365.543101][ T27] worker_thread+0xaca/0x1280 [ 1365.548954][ T27] kthread+0x3f6/0x4f0 [ 1365.579572][ T27] ? rcu_lock_release+0x20/0x20 [ 1365.592772][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1365.598092][ T27] ret_from_fork+0x1f/0x30 [ 1365.602649][ T27] [ 1365.613294][ T27] INFO: task kworker/0:3:3504 blocked for more than 143 seconds. [ 1365.624416][ T27] Not tainted 5.15.148-syzkaller #0 [ 1365.630501][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1365.663092][ T27] task:kworker/0:3 state:D stack:24184 pid: 3504 ppid: 2 flags:0x00004000 [ 1365.672610][ T27] Workqueue: events linkwatch_event [ 1365.723122][ T27] Call Trace: [ 1365.726471][ T27] [ 1365.729435][ T27] __schedule+0x12c4/0x45b0 [ 1365.744629][ T27] ? mark_lock+0x98/0x340 [ 1365.749045][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1365.773346][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1365.779417][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1365.815469][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1365.820744][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1365.836511][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1365.841797][ T27] schedule+0x11b/0x1f0 07:33:33 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) [ 1365.868963][ T27] schedule_preempt_disabled+0xf/0x20 [ 1365.879499][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1365.884911][ T27] ? linkwatch_event+0xa/0x50 [ 1365.889632][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1365.955902][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1365.962017][ T27] ? print_irqtrace_events+0x210/0x210 [ 1365.993119][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1365.998400][ T27] mutex_lock_nested+0x17/0x20 [ 1366.023156][ T27] linkwatch_event+0xa/0x50 [ 1366.043193][ T27] process_one_work+0x8a1/0x10c0 [ 1366.048488][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1366.073105][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1366.078720][ T27] ? kthread_data+0x4e/0xc0 [ 1366.093156][ T27] ? wq_worker_running+0x97/0x170 [ 1366.104207][ T27] worker_thread+0xaca/0x1280 [ 1366.109497][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1366.143109][ T27] kthread+0x3f6/0x4f0 [ 1366.147256][ T27] ? rcu_lock_release+0x20/0x20 [ 1366.152236][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1366.183097][ T27] ret_from_fork+0x1f/0x30 [ 1366.187645][ T27] [ 1366.213951][ T27] INFO: task syz-executor.0:3481 blocked for more than 144 seconds. [ 1366.221999][ T27] Not tainted 5.15.148-syzkaller #0 [ 1366.253505][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1366.262545][ T27] task:syz-executor.0 state:D stack:21624 pid: 3481 ppid: 1 flags:0x00004006 [ 1366.293163][ T27] Call Trace: [ 1366.296513][ T27] [ 1366.299669][ T27] __schedule+0x12c4/0x45b0 [ 1366.305215][ T5013] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1366.323099][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 1366.329072][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1366.343117][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1366.348390][ T27] schedule+0x11b/0x1f0 [ 1366.352600][ T27] schedule_preempt_disabled+0xf/0x20 [ 1366.373259][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1366.378667][ T27] ? wg_set_device+0xff/0x2100 [ 1366.406109][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1366.411733][ T27] ? kasan_unpoison+0x42/0x60 [ 1366.426846][ T27] ? dev_get_by_name+0x24e/0x280 [ 1366.431932][ T27] mutex_lock_nested+0x17/0x20 [ 1366.443752][ T27] wg_set_device+0xff/0x2100 [ 1366.448421][ T27] ? nla_get_range_unsigned+0x1e1/0x430 [ 1366.463074][ T27] ? __nla_validate_parse+0x1e6b/0x27f0 [ 1366.473519][ T27] ? wg_get_device_done+0xf0/0xf0 [ 1366.478604][ T27] ? __nla_validate+0x50/0x50 07:33:34 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) [ 1366.523203][ T27] ? __nla_parse+0x3c/0x50 [ 1366.527688][ T27] ? genl_family_rcv_msg_attrs_parse+0x1d1/0x290 [ 1366.543123][ T27] genl_rcv_msg+0xfbd/0x14a0 [ 1366.547786][ T27] ? genl_bind+0x420/0x420 [ 1366.552222][ T27] ? arch_stack_walk+0xf3/0x140 [ 1366.583231][ T27] ? mark_lock+0x98/0x340 [ 1366.587639][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1366.592697][ T27] ? wg_get_device_done+0xf0/0xf0 [ 1366.623090][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1366.627926][ T27] ? genl_bind+0x420/0x420 [ 1366.632369][ T27] ? netlink_ack+0xb10/0xb10 [ 1366.653082][ T27] ? down_read+0x1b3/0x2e0 [ 1366.657555][ T27] ? genl_rcv+0x9/0x40 [ 1366.661663][ T27] genl_rcv+0x24/0x40 [ 1366.683208][ T27] netlink_unicast+0x7b6/0x980 [ 1366.688041][ T27] ? netlink_detachskb+0x90/0x90 [ 1366.713061][ T27] ? 0xffffffff81000000 [ 1366.725375][ T27] ? __check_object_size+0x300/0x410 [ 1366.730797][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1366.748205][ T27] netlink_sendmsg+0xa30/0xd60 [ 1366.763068][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1366.768350][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1366.783109][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1366.788447][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1366.823196][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1366.828460][ T27] __sys_sendto+0x564/0x720 [ 1366.865273][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1366.870728][ T27] ? rcu_is_watching+0x11/0xa0 [ 1366.893962][ T27] ? print_irqtrace_events+0x210/0x210 [ 1366.899654][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1366.905429][ T27] __x64_sys_sendto+0xda/0xf0 [ 1366.913317][ T27] do_syscall_64+0x3d/0xb0 [ 1366.917844][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1366.953066][ T27] RIP: 0033:0x7fe158588a9c [ 1366.957532][ T27] RSP: 002b:00007ffc8131ae50 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1366.993157][ T27] RAX: ffffffffffffffda RBX: 00007fe1591dd620 RCX: 00007fe158588a9c [ 1367.001189][ T27] RDX: 0000000000000170 RSI: 00007fe1591dd670 RDI: 0000000000000005 [ 1367.043067][ T27] RBP: 0000000000000000 R08: 00007ffc8131aea4 R09: 000000000000000c [ 1367.051093][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 1367.082351][ T27] R13: 0000000000000000 R14: 00007fe1591dd670 R15: 0000000000000000 [ 1367.090951][ T27] [ 1367.096074][ T27] [ 1367.096074][ T27] Showing all locks held in the system: [ 1367.133060][ T27] 3 locks held by kworker/u4:0/9: [ 1367.138149][ T27] #0: ffff888142fcc938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1367.179287][ T27] #1: ffffc90000ce7d20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1367.203309][ T27] #2: ffff8880256440e0 (&type->s_umount_key#32){++++}-{3:3}, at: trylock_super+0x1b/0xf0 [ 1367.223059][ T27] 3 locks held by kworker/0:1/13: [ 1367.228127][ T27] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1367.263097][ T27] #1: ffffc90000d27d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1367.287731][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1367.319917][ T27] 1 lock held by khungtaskd/27: [ 1367.345082][ T27] #0: ffffffff8c91f220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1367.360626][ T27] 4 locks held by kworker/u4:4/1199: [ 1367.368714][ T27] #0: ffff8880b9b39718 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1367.403063][ T27] #1: ffff8880b9b27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810 [ 1367.436490][ T27] #2: ffff888054164d40 (&wdev->mtx){+.+.}-{3:3}, at: ieee80211_ibss_work+0xa0/0x1480 [ 1367.446821][T29794] Bluetooth: hci10: command 0x040f tx timeout [ 1367.467052][ T27] #3: ffffffff8c91f220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 [ 1367.496585][ T27] 2 locks held by getty/3261: [ 1367.501316][ T27] #0: ffff88814abe7098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 07:33:35 executing program 2: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) [ 1367.524508][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1367.573070][ T27] 3 locks held by kworker/0:3/3504: [ 1367.578321][ T27] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1367.613063][ T27] #1: ffffc90002c97d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1367.633069][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1367.642145][ T27] 5 locks held by kworker/u4:6/5013: [ 1367.663150][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1367.683072][ T27] #1: ffffc90006017d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1367.703076][ T27] #2: ffffffff8d9cead0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1367.712512][ T27] #3: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1367.753202][ T27] #4: ffff8880b9a39718 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1367.773067][ T27] 3 locks held by kworker/u4:7/14742: [ 1367.778592][ T27] 3 locks held by kworker/1:11/25551: [ 1367.793055][ T27] #0: ffff88802406fd38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1367.813056][ T27] #1: ffffc9000facfd20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1367.823931][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1367.833868][ T27] 3 locks held by kworker/0:12/29786: [ 1367.839269][ T27] #0: ffff888011c71d38 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1367.851754][ T27] #1: ffffc90002f97d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1367.873210][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1367.882964][ T27] 2 locks held by kworker/0:16/29794: [ 1367.888816][ T27] #0: ffff888011c72538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1367.913069][ T27] #1: ffffc90003097d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1367.925869][ T27] 3 locks held by syz-executor.0/3481: [ 1367.931364][ T27] #0: ffffffff8da39f50 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 [ 1367.943103][ T27] #1: ffffffff8da39e08 (genl_mutex){+.+.}-{3:3}, at: genl_rcv_msg+0x124/0x14a0 [ 1367.952245][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: wg_set_device+0xff/0x2100 [ 1367.973102][ T27] 1 lock held by syz-executor.4/3970: [ 1367.978529][ T27] #0: ffffffff8c9237e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1367.993063][ T27] 1 lock held by syz-executor.1/4193: [ 1367.998484][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1368.016241][ T27] 1 lock held by syz-executor.3/4284: 07:33:36 executing program 2: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) [ 1368.021666][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1368.060968][ T27] 1 lock held by syz-executor.0/4359: [ 1368.066750][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.083089][ T27] 1 lock held by syz-executor.3/4680: [ 1368.088521][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.113086][ T27] 1 lock held by syz-executor.1/4681: [ 1368.118611][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.143216][ T27] 1 lock held by syz-executor.4/4784: [ 1368.148651][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.159538][ T27] 1 lock held by syz-executor.0/5050: [ 1368.173082][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.182594][ T27] 2 locks held by syz-executor.2/5335: [ 1368.193076][ T27] 2 locks held by syz-executor.2/5340: [ 1368.198590][ T27] 2 locks held by syz-executor.2/5344: [ 1368.213071][ T27] 4 locks held by syz-executor.2/5348: [ 1368.218589][ T27] 3 locks held by syz-executor.2/5352: [ 1368.233094][ T27] 3 locks held by syz-executor.2/5356: [ 1368.238610][ T27] 2 locks held by syz-executor.2/5361: [ 1368.244712][ T27] 2 locks held by syz-executor.2/5365: [ 1368.250212][ T27] 2 locks held by syz-executor.2/5368: [ 1368.273765][ T27] 3 locks held by syz-executor.2/5375: [ 1368.279288][ T27] 2 locks held by syz-executor.2/5378: [ 1368.287165][ T27] 2 locks held by syz-executor.2/5381: [ 1368.292665][ T27] 2 locks held by syz-executor.2/5384: [ 1368.303063][ T27] 1 lock held by syz-executor.3/5405: [ 1368.308482][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.325670][ T27] 1 lock held by syz-executor.1/5407: [ 1368.331091][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.353069][ T27] 1 lock held by syz-executor.4/5429: [ 1368.358500][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1368.368502][ T27] 2 locks held by dhcpcd/5457: [ 1368.383101][ T27] #0: ffff888055378120 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xd50 [ 1368.392939][ T27] #1: ffffffff8c9237e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1368.423159][ T27] [ 1368.425534][ T27] ============================================= [ 1368.425534][ T27] [ 1368.453151][ T27] NMI backtrace for cpu 0 [ 1368.457528][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 1368.465526][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1368.475597][ T27] Call Trace: [ 1368.478894][ T27] 07:33:36 executing program 2: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), 0x0}) [ 1368.481847][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1368.486568][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1368.492236][ T27] ? panic+0x84d/0x84d [ 1368.496343][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1368.501563][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1368.506529][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1368.511446][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1368.517636][ T27] ? _printk+0xd1/0x111 [ 1368.521820][ T27] ? panic+0x84d/0x84d [ 1368.525917][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1368.530791][ T27] ? panic+0x84d/0x84d [ 1368.534884][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1368.539935][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1368.546109][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1368.552126][ T27] watchdog+0xe72/0xeb0 [ 1368.556397][ T27] kthread+0x3f6/0x4f0 [ 1368.560498][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1368.565553][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1368.570165][ T27] ret_from_fork+0x1f/0x30 [ 1368.574613][ T27] [ 1368.578449][ T27] Sending NMI from CPU 0 to CPUs 1: [ 1368.584028][ C1] NMI backtrace for cpu 1 [ 1368.584041][ C1] CPU: 1 PID: 1199 Comm: kworker/u4:4 Not tainted 5.15.148-syzkaller #0 [ 1368.584060][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1368.584071][ C1] Workqueue: phy32 ieee80211_iface_work [ 1368.584097][ C1] RIP: 0010:kasan_addr_to_page+0x0/0x50 [ 1368.584121][ C1] Code: 00 00 89 d8 5b 41 5e 41 5f c3 f0 48 0f ba 2d 66 88 78 0f 01 0f 92 c0 c3 66 90 85 ff 75 08 f0 80 25 54 88 78 0f fd c3 0f 1f 00 <53> 48 89 f9 48 c1 e9 27 31 c0 81 f9 11 ff ff 01 72 32 48 39 3d a7 [ 1368.584135][ C1] RSP: 0018:ffffc900056e7340 EFLAGS: 00000246 [ 1368.584149][ C1] RAX: 0000000000000000 RBX: ffff88805a8ee900 RCX: 0000000000000001 [ 1368.584161][ C1] RDX: 0000000000000000 RSI: ffffffff8a8c13e0 RDI: ffff88805a8ee900 [ 1368.584173][ C1] RBP: ffffc900056e7450 R08: dffffc0000000000 R09: ffffc900056e72a0 [ 1368.584186][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1368.584198][ C1] R13: 1ffff92000adce74 R14: ffffc900056e73e0 R15: ffff88805a8ee900 [ 1368.584211][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1368.584226][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1368.584238][ C1] CR2: 00007f7dd40e46c6 CR3: 0000000062205000 CR4: 00000000003506e0 [ 1368.584254][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1368.584264][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1368.584275][ C1] Call Trace: [ 1368.584279][ C1] [ 1368.584285][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1368.584307][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1368.584327][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1368.584348][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 1368.584450][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1368.584468][ C1] ? nmi_handle+0xf7/0x370 [ 1368.584486][ C1] ? kasan_restore_multi_shot+0x10/0x10 [ 1368.584507][ C1] ? default_do_nmi+0x62/0x150 [ 1368.584528][ C1] ? exc_nmi+0xab/0x120 [ 1368.584546][ C1] ? end_repeat_nmi+0x16/0x31 [ 1368.584572][ C1] ? kasan_restore_multi_shot+0x10/0x10 [ 1368.584593][ C1] ? kasan_restore_multi_shot+0x10/0x10 [ 1368.584614][ C1] ? kasan_restore_multi_shot+0x10/0x10 [ 1368.584635][ C1] [ 1368.584639][ C1] [ 1368.584644][ C1] kasan_record_aux_stack+0xb/0x100 [ 1368.584661][ C1] kvfree_call_rcu+0x118/0x8a0 [ 1368.584680][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1368.584698][ C1] ? call_rcu+0xa70/0xa70 [ 1368.584714][ C1] ? do_raw_spin_lock+0x14a/0x370 [ 1368.584732][ C1] ? cmp_bss+0x2cb/0xde0 [ 1368.584759][ C1] cfg80211_update_known_bss+0x16b/0x9e0 [ 1368.584780][ C1] cfg80211_bss_update+0x16d/0x20d0 [ 1368.584804][ C1] ? __kmalloc+0x168/0x300 [ 1368.584820][ C1] ? cfg80211_inform_bss_frame_data+0x4f8/0x20f0 [ 1368.584838][ C1] ? cfg80211_inform_bss_frame_data+0x6e6/0x20f0 [ 1368.584859][ C1] cfg80211_inform_bss_frame_data+0xa13/0x20f0 [ 1368.584890][ C1] ? cfg80211_parse_mbssid_data+0x3410/0x3410 [ 1368.584917][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 1368.584941][ C1] ieee80211_bss_info_update+0x7a6/0xc80 [ 1368.585006][ C1] ? ieee80211_rx_bss_put+0x60/0x60 [ 1368.585032][ C1] ieee80211_ibss_rx_queued_mgmt+0x175e/0x2af0 [ 1368.585050][ C1] ? mark_lock+0x98/0x340 [ 1368.585073][ C1] ? ieee80211_ibss_rx_no_sta+0x720/0x720 [ 1368.585090][ C1] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1368.585107][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1368.585123][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1368.585140][ C1] ? _raw_spin_unlock+0x40/0x40 [ 1368.585157][ C1] ? kcov_remote_start+0x76/0x490 [ 1368.585177][ C1] ? kcov_remote_start+0xf9/0x490 [ 1368.585196][ C1] ieee80211_iface_work+0x78f/0xcc0 [ 1368.585217][ C1] process_one_work+0x8a1/0x10c0 [ 1368.585243][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1368.585263][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1368.585280][ C1] ? kthread_data+0x4e/0xc0 [ 1368.585296][ C1] ? wq_worker_running+0x97/0x170 [ 1368.585314][ C1] worker_thread+0xaca/0x1280 [ 1368.585343][ C1] kthread+0x3f6/0x4f0 [ 1368.585358][ C1] ? rcu_lock_release+0x20/0x20 [ 1368.585374][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1368.585390][ C1] ret_from_fork+0x1f/0x30 [ 1368.585416][ C1] [ 1369.000279][ T3564] Bluetooth: hci5: command 0x0406 tx timeout [ 1369.346112][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1369.346129][ T5013] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1369.353006][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 1369.353029][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1369.353042][ T27] Call Trace: [ 1369.353049][ T27] [ 1369.353058][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1369.353090][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1369.353114][ T27] ? panic+0x84d/0x84d [ 1369.353146][ T27] panic+0x318/0x84d [ 1369.353165][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1369.353191][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1369.353219][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1369.353241][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1369.353268][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1369.353291][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1369.353319][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1369.353346][ T27] watchdog+0xeb0/0xeb0 [ 1369.353379][ T27] kthread+0x3f6/0x4f0 [ 1369.353400][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1369.353423][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1369.353445][ T27] ret_from_fork+0x1f/0x30 [ 1369.353481][ T27] [ 1369.353707][ T27] Kernel Offset: disabled [ 1369.475364][ T27] Rebooting in 86400 seconds..