last executing test programs: 34.813120424s ago: executing program 1 (id=2): r0 = io_uring_setup(0x25f3, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x0, 0x257}) io_uring_enter(r0, 0x2000000, 0x2, 0xf, &(0x7f0000000000), 0x18) 34.576234394s ago: executing program 0 (id=1): ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x4, 0x5, 0x0, 0x6, 0x50, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, 0x700, 0x7800, 0x9, 0x1}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a50000002300000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x31, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x45}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0x80, &(0x7f00000000c0)=""/15, &(0x7f0000000200)=0xf) socket$unix(0x1, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2ba, &(0x7f0000000f40)="$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") 34.281280478s ago: executing program 0 (id=6): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/676], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r1, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f00000000c0), &(0x7f0000000040)=@buf="e6c7204c5d301c15ceb0042b08962fb2100be3251f0e68a712f61467b1285aef5dbb7efba7dacbcc4771190d6b06c9acf146151c"}, 0x20) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r3, r0) close_range(r4, 0xffffffffffffffff, 0x0) r5 = socket(0x1d, 0x2, 0x6) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x10000002}]}, 0x90) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r6, 0x1, 0x24, &(0x7f0000000200)=0x7, 0x4) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000240)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@ra={0x94, 0x4, 0x1}]}}, {{0x4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) r7 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x64, &(0x7f0000000000)=r10, 0x10) sendmsg$inet(r7, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000380)="ee", 0xff80}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$nfc_llcp(r5, 0x6a, 0x5, 0x0, 0x20000071) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r11 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) r12 = fsopen(&(0x7f00000003c0)='tracefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r12, 0x1, &(0x7f0000000ac0)='gid', &(0x7f0000000b00)='\xbf%#\x00', 0x0) ioctl$USBDEVFS_FREE_STREAMS(r11, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303100007006000000002000020d3"]) ioctl$USBDEVFS_CONNECTINFO(r11, 0x80045520, 0x0) 33.976083433s ago: executing program 0 (id=7): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xfffffffffffffffc}, 0x4108, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) timer_delete(0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) keyctl$session_to_parent(0x12) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xce405c1b27a729d7}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newqdisc={0xf0, 0x24, 0x800, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xa, 0x10}, {0x9, 0xb}, {0x9, 0x2}}, [@TCA_STAB={0xcc, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0xe, 0x0, 0xd89a, 0x0, 0x2, 0x2}}, {0x4}}, {{0x1c, 0x1, {0x7, 0x9, 0x5, 0x7fffffff, 0x3, 0x0, 0x10001, 0x3}}, {0xa, 0x2, [0xffff, 0x3, 0x1]}}, {{0x1c, 0x1, {0x7, 0x80, 0x1, 0xe3b5, 0x1, 0x1ff, 0x7fffffff, 0x3}}, {0xa, 0x2, [0x2, 0x4, 0xb]}}, {{0x1c, 0x1, {0x3, 0x2, 0x8, 0x774, 0x0, 0x6, 0x4, 0x9}}, {0x16, 0x2, [0x3, 0x2, 0x6, 0x8, 0xb, 0x3, 0x6, 0x8, 0xff]}}, {{0x1c, 0x1, {0x6, 0x86, 0x7, 0x8, 0x0, 0x1, 0x5, 0x2}}, {0x8, 0x2, [0x8, 0x0]}}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x80}, 0x22000810) 33.928157976s ago: executing program 1 (id=8): socket$netlink(0x10, 0x3, 0x0) unshare(0x22020600) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@i_version}, {@minixdf}]}, 0x1, 0x50b, &(0x7f0000001b00)="$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") socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x21, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10804, 0xc00000000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6d0c, &(0x7f0000000340)={0x0, 0xbe4e, 0x10100, 0x8001}, &(0x7f0000000240), &(0x7f0000000140)) syz_io_uring_setup(0x1866, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000100)) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, 0x5}) io_uring_enter(r0, 0x184d, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000400)={0x0, 0xb9da1321bea21ad8, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20044841}, 0x80) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$bind(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0/../file0/../file0\x00', 0x0, 0x201000, 0x0) ppoll(&(0x7f00000000c0)=[{}, {}], 0x2, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000019c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d1f001e000000000400380000000e0001"], 0x34}}, 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000100)='devpts\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000440)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$eJzs3c9vVFsdAPDvnXZoKQMFZaFGBRFFQ5j+ABqCC2GjMYTESFy5gNoOTdMZpum0SCuLsnRvIokr/RPcuTBh5cKdO925wYUJKnkv9CVvMS/3zqUd2g7te7Qd6Hw+ye2955xhvufMcM6Ze2B6AuhZZyNiNSKORMS9iBjO85P8iButI33cq5ePp9ZePp5Kotm8878kK0/zou3PpI7lzzkYET/7ccQvk61xG8src5PVamUhT48s1uZHGssrl2YLec74xNjE6LXLV8f3rK1nan968aPZWz//y5+/8fzvq9//dVqt0m+OZ2Xt7dhLraYXo9SW1x8Rt/YjWJf0539/+PCkve1LEXEu6//D0Ze9mwDAYdZsDkdzuD0NABx26f1/KZJCOV8LKEWhUC631vBOx1ChWm8sXhyuLz2YjmwN62QUC/dnq5XRfK3wZBSTND2WXW+kxzelL0fEqYj47cDRLF2eqlenu/nBBwB62LFN8//HA635HwA45Aa7XQEA4MCZ/wGg95j/AaD3fI7537cDAeCQcP8PAL3H/A8AvWfH+f/JwdQDADgQP719Oz2aa/nvv55+uLz0g9LDS9OVxly5tjRVnqovzJdn6vWZaqU81Wzu9HzVen1+7Mp6srG8crdWX3qweHe2NjlTuVsp7nN7AICdnTrz7J9JRKxeP5od0baXg7kaDrdCtysAdE1ftysAdI3v80Dv2sU9vmUAOOS22aL3DR3/i9BTm7/Ch+rCV63/Q6+y/g+964ut//9wz+sBHDzr/9C7ms3Env8A0GOs8QPv9O//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0KNK2ZEUytle4Kvpz0K5HHE8Ik5GMbk/W62MRsSJiPjHQHEgTY91u9IAwDsq/CfJ9/+6MHy+tLn0SPLJQHaOiF/9/s7vHk0uLi6Mpfn/X89ffJrnjx/pRgMAgHY3tma15un83HYj/+rl46nXx0FW8cXN1uaiady1/GiV9Ed/dh6MYkQMfZTk6Zb080rfHsRffRIRX9lo/6O2CKVsDaS18+nm+Gns4/sQf+P13xy/8Eb8QlaWnovZa/HlPagL9JpnN1vjZN730i6W979CnM3O2/f/wWyEenevx7+1LeNfYX3869sSP8n6/Nn19Ntr8uLKX3+yJbM53Cp7EvG1/u3iJ+vxkw7j7/ldtvFfX//muU5lzT9EXIjt47fUsmF2ZLE2P9JYXrk0W5ucqcxUHoyPT4xNjF67fHV8JFujbv3823Yx/nv94olO8dP2D3WIP7hD+7+zy/b/8dN7v/jWW+J/79vbv/+n3xI/nRO/u8v4k0M3Om7fncaf7tD+nd7/i7uM//zfK9O7fCgAcAAayytzk9VqZWGHi/Sz5k6PcfFhXsRqxHtQDRfv1UW3RyZgv210+m7XBAAAAAAAAAAAAAAA6KSxvDI3EPv7daJutxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDD67MAAAD//w/PzvM=") r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.sectors\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r7, 0x0) ftruncate(r7, 0x9) futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bond0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0002000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r9], 0x44}}, 0x0) 2.576939809s ago: executing program 4 (id=15): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x75, 0x1a1281) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303100007006000000002000020d3"]) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x8010550e, 0x0) 2.304218651s ago: executing program 4 (id=18): io_uring_setup(0x4822, &(0x7f00000004c0)) socket$packet(0x11, 0x2, 0x300) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x49) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="4400000010000104001007fb5c360dff9fe30000", @ANYRES32=r2, @ANYBLOB="0100000000000000240012000c000100627269646765000e14000200080007004a9a00000800"], 0x44}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b000100677265746170000014000280080004000104000005000a000100000008000a00", @ANYRES32=r5], 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='@'], 0x85}}, 0x0) 1.845342179s ago: executing program 4 (id=20): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x1c, &(0x7f0000001280)=[@in6={0xa, 0x4e21, 0x1c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x5}]}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000240)=0x84) r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000100)='./control\x00', 0x0) unlinkat(r3, &(0x7f0000000140)='./control\x00', 0x200) rmdir(&(0x7f0000000040)='./control\x00') openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00'}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newtaction={0x64, 0x30, 0x9, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4, 0x4}, {0xc}, {0xffffffffffffff9c}}}]}]}, 0x64}}, 0x0) 1.395554235s ago: executing program 3 (id=22): io_uring_setup(0x4822, &(0x7f00000004c0)) socket$packet(0x11, 0x2, 0x300) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0x49) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x54}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="4400000010000104001007fb5c360dff9fe30000", @ANYRES32=r2, @ANYBLOB="0100000000000000240012000c00010062726964"], 0x44}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b000100677265746170000014000280080004000104000005000a000100000008000a00", @ANYRES32=r5], 0x4c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='@'], 0x85}}, 0x0) 1.305930773s ago: executing program 4 (id=23): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_POWER_SAVE(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)={0xc, 0x0, 0x125, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6f}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x41) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000200)=0x7, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", ""]}, 0x2c}}, 0x8010) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=@acquire={0x128, 0x17, 0x0, 0x0, 0x0, {{@in=@broadcast}, @in6=@remote, {@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@mcast1}, {{@in=@loopback, @in6=@private2}}}}, 0x128}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="926c242c391961a74a4626bed1b678801a4f54a272558f396d554863d5a949304f37326d148810e5a7512673db03638176e60294570d475dde", 0x39}], 0x1) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}]}}) write$P9_RLERRORu(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[], [], 0x6b}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) 1.068635232s ago: executing program 3 (id=25): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000001380), 0x4) sendmsg$inet(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000003c0)=""/245, 0xf5}, {0x0}, {&(0x7f00000005c0)=""/245, 0xf5}], 0x3, &(0x7f00000006c0)=""/201, 0xc9}, 0x26}, {{0x0, 0x0, &(0x7f0000000fc0), 0x0, &(0x7f0000001000)=""/250, 0xfa}, 0xffffff00}], 0x2, 0x40, 0x0) r1 = socket(0x1d, 0x2, 0x6) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x64, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x105404, 0x9, 0x0, 0x2, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x7, 0x0) read(r4, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x3, 0x80, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RAUTH(r5, &(0x7f0000000240)={0x14}, 0x14) dup2(r2, r3) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) fcntl$setownex(r2, 0xf, &(0x7f00000001c0)={0x2}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) r7 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r7, &(0x7f0000000000)={0x1d, r6, 0x3}, 0x18) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[], 0x14}}, 0x0) io_uring_setup(0x32c7, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x20}) close_range(r1, 0xffffffffffffffff, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) r9 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0x42, 0x4, 0xaf0, 0xffffffff, 0x0, 0x990, 0x98, 0xffffffff, 0xffffffff, 0xa58, 0xa58, 0xa58, 0xffffffff, 0x5, 0x0, {[{{@uncond, 0x74000000, 0x70, 0x98, 0x1ba, {0x46010000, 0x2c000000000000}}, @REJECT={0x28}}, {{@uncond, 0x287, 0x898, 0x8f8, 0x0, {}, [@common=@unspec=@u32={{0x7e0}, {[], 0x1}}, @common=@unspec=@limit={{0x48}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@connmark={{0x30}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xb50) sendmsg$nl_route(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000013000100000000000000000007000000", @ANYRESOCT=r8, @ANYBLOB="000000000000000014001a80100004800c000880080001"], 0x34}}, 0x0) 984.386559ms ago: executing program 2 (id=26): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000014c0), 0x1, 0x793, &(0x7f0000001700)="$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") (async) open(&(0x7f0000007fc0)='./bus\x00', 0x60142, 0x0) (async) r0 = socket$inet6(0xa, 0x1, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) (async) unshare(0x22000600) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x90) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xc1) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt(r2, 0xff, 0x1, 0x0, &(0x7f0000000040)) (async) r3 = epoll_create1(0x0) r4 = dup(r3) (async) r5 = socket$unix(0x1, 0x5, 0x0) bind$unix(r5, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000900)={'trans=fd,', {'rfdno', 0x3d, r4}}) (async) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x13, r0, 0x0) (async) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000009000000000000000000000905000000070000000000000e0000000000000000800000000000000d00000000000000000000000213000000000000000000005f00"], 0x0, 0x55}, 0x20) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x7, 0x10, 0x7f12, 0x7, {{0x17, 0x4, 0x0, 0x17, 0x5c, 0x68, 0x0, 0x81, 0x2f, 0x0, @loopback, @broadcast, {[@timestamp_addr={0x44, 0xc, 0xf4, 0x1, 0x7, [{@multicast1, 0x10000}]}, @timestamp_prespec={0x44, 0x3c, 0x51, 0x3, 0x6, [{@dev={0xac, 0x14, 0x14, 0x15}, 0x4}, {@multicast1}, {@local, 0xfffffc00}, {@rand_addr=0x64010100, 0x1ed}, {@multicast2, 0x2e3}, {@local}, {@remote, 0xfffff11b}]}]}}}}}) (async) mknodat$null(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x200, 0x103) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@ipv4_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP={0x10, 0x9, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x9, 0x8, 0x0, 0x1, @LWTUNNEL_IP_OPTS_GENEVE={0x8, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_DATA={0x4}}}}]}, 0x2c}}, 0x0) (async) r7 = socket(0x10, 0x803, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in6=@empty, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6}, {}, {0x0, 0x0, 0x200000}, 0x0, 0x0, 0x1}, [@tmpl={0x84, 0x5, [{{@in6=@local, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, {{@in=@remote}, 0x0, @in6=@private1, 0x0, 0x4, 0x0, 0x6}]}]}, 0x13c}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r7) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x71, 0x11, 0x7d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call]}, 0x0, 0x8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x90) 891.734587ms ago: executing program 2 (id=27): socket$inet6(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_pidfd_open(r2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xe, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="891000000000000095"], &(0x7f0000000280)='GPL\x00'}, 0x90) ioctl$EXT4_IOC_MIGRATE(r3, 0xff0a) r4 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000280)='./control\x00', 0x0) close(r4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) r5 = inotify_init1(0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) r6 = syz_io_uring_setup(0x690a, &(0x7f0000000340)={0x0, 0x0, 0x10100}, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_setup(0x6d6f, &(0x7f0000000540), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r8, r7, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r6, 0x184c, 0x0, 0x0, 0x0, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) r10 = socket$packet(0x11, 0x2, 0x300) bind$packet(r10, &(0x7f0000000200)={0x11, 0xf, 0x0, 0x1, 0xfd, 0x6, @remote}, 0x14) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r11, &(0x7f0000000000)=[{&(0x7f0000000480)=""/187, 0xbb}], 0x1, 0xf00, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, 0x0}, 0x90) setsockopt$packet_int(r9, 0x107, 0xf, &(0x7f0000000080)=0xf3e, 0x62) r12 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_FAIL_OVER_MAC={0x5}]}}}]}, 0x3c}}, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r1, 0xc0286687, &(0x7f00000002c0)={0x2, 0x5, 0xb, &(0x7f00000001c0)=""/11}) 872.489518ms ago: executing program 3 (id=28): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x58, 0x0, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local={0xac, 0x44}}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}]}, 0x58}}, 0x0) 854.51942ms ago: executing program 2 (id=29): r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = syz_clone(0x42188400, &(0x7f00000004c0)="eafc18657b949ab25237eec203eb113a00268b7689878207bd04bf63cd9e482d48840d713a5cb1f8b14e1fd15577f2a9a41fcf3a4b643eb0bf75c2a532e1bdb45fcaf3ebcaaf2195507fac19c56ca7b6aa9a48889501e13cb9441552f4dc0fe2cbb0a665cebca77892bd20c2f3aac3cbbbc6a5aa29eb1007ffe7f0193c648a00c2e6daf9082856138a76ef68cbade7d75dac94272f777e90c5f1f04051cba42fe04db736a480200171b07319c0bca67ceb843ac9297fda26c68be91b400305eb1193a28354a2774d525de3c2fdb60f58ce", 0xd1, &(0x7f0000000080), &(0x7f0000000180), &(0x7f0000000600)="9d8c3ee3f71a5a8a610f144052e22d1945ea67b5610491dc46576a3fb6efff36f2eba9f1a71db457199344d39c29553e631007b448cfe38240c4084c05298d3a74321f379a5d733d2c852fef202b97755f2dd5c33500e3f8008f17a367c4a539780028fcfe7793144e95aed43b425a43442a1e714aaf21171913ccbd333ea3de402217f6237d7035033db9187f113fd49a599dc4bc0169d1d433964a6bdb90b01ce83251ac61d62a31baca7b73d644b5ec11a9f74584c16dbdc8fca32510ce4544a81ab99dc20c6023d71c77a760a0666ca0b3488d54f3476ff4c8fd4f763bd2c5722743bc07b6ae89b0fb30") r4 = perf_event_open(0x0, r3, 0x0, r0, 0x0) syz_read_part_table(0x5fd, &(0x7f0000000d00)="$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") creat(&(0x7f0000000480)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) unshare(0x24020400) r5 = open(&(0x7f00000005c0)='./bus\x00', 0x147842, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f00000001c0)={0x1, 0x1, 0x1, 0x4, 0x7ff, 0xde1e}) socket$inet6_mptcp(0xa, 0x1, 0x106) preadv2(r5, &(0x7f0000000040)=[{&(0x7f0000001200)=""/4096, 0xfffffdef}], 0x1, 0xa0600, 0x0, 0x0) 822.633732ms ago: executing program 3 (id=30): ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x4, 0x5, 0x0, 0x6, 0x50, @private2={0xfc, 0x2, '\x00', 0x1}, @private1, 0x700, 0x7800, 0x9, 0x1}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000108500000075000000a50000002300000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x31, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x45}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0x80, &(0x7f00000000c0)=""/15, &(0x7f0000000200)=0xf) socket$unix(0x1, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2ba, &(0x7f0000000f40)="$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") open(&(0x7f0000000140)='./bus\x00', 0x143142, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, "ef359f413bb90152f7d6d1ce5d29c3ee5e5ca9000f7c41499dc2aac63a01000000000000004faa2ad9c084a003ea00", "036c47c67808200400000000000000335263bdbcef549ba197fce47ddfdd753abd950100002a00ffffffffffffffff00000000e8f20000000200", "b7326736181c208220000000b9000000000000000000f0fffffffff2ff00"}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000140)={0x0, 0x3, 0xffffffffffffffff, 0x550}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0), 0x200000, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x0, 0x0, 0x0, {0x3}}], {0x14}}, 0x70}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00'}, 0x10) 552.465864ms ago: executing program 2 (id=31): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000001380), 0x4) sendmsg$inet(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000003c0)=""/245, 0xf5}, {0x0}, {&(0x7f00000005c0)=""/245, 0xf5}], 0x3, &(0x7f00000006c0)=""/201, 0xc9}, 0x26}, {{0x0, 0x0, &(0x7f0000000fc0), 0x0, &(0x7f0000001000)=""/250, 0xfa}, 0xffffff00}], 0x2, 0x40, 0x0) r1 = socket(0x1d, 0x2, 0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x7, 0x0) read(r4, &(0x7f0000032440)=""/102364, 0x18fdc) perf_event_open(&(0x7f0000001080)={0x3, 0x80, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RAUTH(r5, &(0x7f0000000240)={0x14}, 0x14) dup2(r2, r3) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) fcntl$setownex(r2, 0xf, &(0x7f00000001c0)={0x2}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) r6 = socket(0x1d, 0x2, 0x6) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[], 0x14}}, 0x0) io_uring_setup(0x32c7, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x20}) close_range(r1, 0xffffffffffffffff, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) 412.003646ms ago: executing program 4 (id=32): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x26, &(0x7f0000000080)={@local, @multicast, @val={@val={0x88a8, 0x7, 0x1, 0x1}, {0x8100, 0x4, 0x0, 0x1}}, {@can={0xc, {{0x0, 0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "720ab9ad942bd33c"}}}}, 0x0) 380.499649ms ago: executing program 3 (id=33): fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x1) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0xef4c982ac07fd03c) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32], 0x3c}}, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x20040) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x1010, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x1023, &(0x7f0000000280)={0x0, 0xe0d2, 0x800, 0x3, 0x1fc}, &(0x7f0000000440), &(0x7f0000000340)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000480)=@IORING_OP_MSG_RING={0x28, 0x74, 0x0, r1, 0xc39, &(0x7f0000000380)="63100315d8b4843967baed679f452a72acb15a10d9522a3db1c94df32308142f2b5928f099272a5ffd3dfca5a95aa0d7173d9b0cd5137e56fab9ce847fbd0c11a70fa471f1458cba2a7e19b8a19b2a74d0ec6e6363637e5778ddfd3e6b4d9d6501ab2b4bd60a3eaea4f916ded5848fcd70e66a91debd6d5cf65c1ecb54d5154bb7e9cc2b6c0f014c975cd19e340e2653c2e11907a2654d2129a3e82d717c03db5ea197d2c55b17ac78af1e26e6b03f139d5ef34644", 0xb5}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYBLOB="17000300ff6400000004"], 0xe) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000580)={'syz_tun\x00'}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000005c0), &(0x7f0000000600)=0x8) r2 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f0000000680)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000880)) connect$can_bcm(r2, &(0x7f00000006c0), 0x10) getsockname(r2, &(0x7f0000000740)=@in, &(0x7f00000007c0)=0x80) flistxattr(r1, 0xfffffffffffffffd, 0x0) 379.914779ms ago: executing program 4 (id=34): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_POWER_SAVE(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f00000005c0)={0xc, 0x0, 0x125, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6f}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x41) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000200)=0x7, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", ""]}, 0x2c}}, 0x8010) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=@acquire={0x128, 0x17, 0x0, 0x0, 0x0, {{@in=@broadcast}, @in6=@remote, {@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@mcast1}, {{@in=@loopback, @in6=@private2}}}}, 0x128}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000340)="926c242c391961a74a4626bed1b678801a4f54a272558f396d554863d5a949304f37326d148810e5a7512673db03638176e60294570d475dde", 0x39}], 0x1) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}]}}) write$P9_RLERRORu(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[], [], 0x6b}}) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r6 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0xffffffffffffffff, r7) chmod(&(0x7f0000000180)='./file0\x00', 0x0) 268.008208ms ago: executing program 2 (id=35): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x4040001) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a300000000008000340000000053000000002000008080003400000000808000340000000010c0006400000000020000004140000001100010000000000000000000000000a0000000000f0c7d6d8f802bb"], 0x94}}, 0x0) 232.079851ms ago: executing program 2 (id=36): perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x1}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0], 0xfb, 0x11ee, &(0x7f0000001280)="$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") r3 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000500), 0xbf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) sendfile(r3, r3, &(0x7f0000000240), 0x7f06) ftruncate(0xffffffffffffffff, 0x12081ff) syz_clone(0x88000000, &(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_emit_ethernet(0x36, &(0x7f0000000340)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x4}}}}}}, 0x0) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) write$nci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="61050905e504060605010a3d56332f077cecf90ab915e101260d"], 0x1a) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x802c550a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) 0s ago: executing program 3 (id=37): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f00000004c0)={[{@resuid}, {@init_itable}, {@stripe}, {@noblock_validity}]}, 0x3, 0x453, &(0x7f0000001f80)="$eJzs3M9vFFUcAPDvzHaLCNiKqPxS8Vck/mgpoHLwoEYTD5iY6EGPTVsIslBDayKEKBiDJ2NMvBuP/gt60Ysxnoxe9W5IiOECeFozuzN0d7u7tNsti93PJxl4b+ZN3/v2zdt9M2+3AQytfdk/ScTWiPgzIsbq2eYC++r/Xb96fubG1fMzSVSrb/+T1Mpdu3p+pihanLclz+xPI9LPktjTpt6Fs+dOTlcqc2fy/OTiqQ8mF86ee+7Eqenjc8fnTh88cuTwoakXXzj4fF/izNp0bffH83t3vfHeV28e/aIp/pY41mznpsYf3daT1WrfqrsTbGtIJyMDbAirUoqIrLvKtfE/FqVY6ryxeP3TgTYOWFfVarW6pfPhC1VgA0uiOW/Iw7Ao3uiz+99ia50EvLx+04+Bu/JK/QYoi/t6vtWPjESalym33N/2076IePfCv99kW/T7OQQAQBs/ZvOfZ9vN/9J4oKHcPfna0HhE3BsR2yPivojYERH3R9TKPhgRO1dZf+siyfL5T3q5p8BWKJv/vZSvbTXP/4rZX4yX8ty2Wvzl5NiJytyB/HeyP8qbsvxUlzp+eu2PLzsda5z/ZVtWfzEXzNtxeWRT8zmz04vTa4m50ZWLEbtH2sWf3FwJSCJiV0Ts7rGOE09/t7fTsVvH30Uf1pmq30Y8Ve//C9ESfyHpvj45eVdU5g5MFlfFcr/+dumtTvWvKf4+yPr/7rbX/834x5PG9dqF1ddx6a/PO97T9Hr9jybv1NKj+b6PphcXz0xFjCZH641u3H9w6dwiX5T/4ff6/nbjf3ss/Sb2RER2ET8UEQ9HxCN52x+NiMci4vEu8f/y6hPv9x7/+sr6f3ZV/b+UGI3WPe0TpZM/f99U6fiy+G907//DtdT+fM9KXv9W0q7ermYAAAD4/0kjYmsk6cTNdJpOTNQ/L78jIq3MLyw+c2z+w9Oz9e8IjEc5LZ50jTU8D53Kb+vr+YsRUf9oQXH8UP7c+OvS5lp+Yma+Mjvo4GHIbekw/jN/lwbdOmDd+b4WDC/jH4aX8Q/Dy/iH4dVm/G8eRDuA26/d+/8nA2gHcPu1jH/LfjBE3P/D8Oo4/jfyX/4Barz/w1Ba2By3/pJ810Txk3o8fcMmonxHNGPtiWrStnMjHXTDJNYzMdjXJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgH75LwAA//8HW+BC") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB="6c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000003000128009000100766c616e00000000200002800c0002001c0000001f0000000600050088a80000060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000200aa"], 0x6c}}, 0x0) (fail_nth: 18) kernel console output (not intermixed with test programs): [ 20.400242][ T29] audit: type=1400 audit(1724239733.027:81): avc: denied { read } for pid=2944 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.20' (ED25519) to the list of known hosts. [ 26.549172][ T29] audit: type=1400 audit(1724239739.177:82): avc: denied { mounton } for pid=3250 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.550369][ T3250] cgroup: Unknown subsys name 'net' [ 26.571980][ T29] audit: type=1400 audit(1724239739.177:83): avc: denied { mount } for pid=3250 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.599393][ T29] audit: type=1400 audit(1724239739.207:84): avc: denied { unmount } for pid=3250 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.856666][ T3250] cgroup: Unknown subsys name 'rlimit' [ 26.949569][ T29] audit: type=1400 audit(1724239739.577:85): avc: denied { setattr } for pid=3250 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.973258][ T29] audit: type=1400 audit(1724239739.577:86): avc: denied { create } for pid=3250 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.993754][ T29] audit: type=1400 audit(1724239739.577:87): avc: denied { write } for pid=3250 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.014671][ T29] audit: type=1400 audit(1724239739.577:88): avc: denied { read } for pid=3250 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.023973][ T3253] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.034984][ T29] audit: type=1400 audit(1724239739.587:89): avc: denied { mounton } for pid=3250 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.068339][ T29] audit: type=1400 audit(1724239739.587:90): avc: denied { mount } for pid=3250 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.091613][ T29] audit: type=1400 audit(1724239739.667:91): avc: denied { relabelto } for pid=3253 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.121333][ T3250] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.303895][ T3260] chnl_net:caif_netlink_parms(): no params data found [ 28.423786][ T3260] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.430995][ T3260] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.438114][ T3260] bridge_slave_0: entered allmulticast mode [ 28.444535][ T3260] bridge_slave_0: entered promiscuous mode [ 28.453081][ T3260] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.460200][ T3260] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.467499][ T3260] bridge_slave_1: entered allmulticast mode [ 28.473855][ T3260] bridge_slave_1: entered promiscuous mode [ 28.485113][ T3261] chnl_net:caif_netlink_parms(): no params data found [ 28.493914][ T3265] chnl_net:caif_netlink_parms(): no params data found [ 28.512478][ T3260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.526817][ T3263] chnl_net:caif_netlink_parms(): no params data found [ 28.535728][ T3267] chnl_net:caif_netlink_parms(): no params data found [ 28.548828][ T3260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.621218][ T3260] team0: Port device team_slave_0 added [ 28.641828][ T3260] team0: Port device team_slave_1 added [ 28.657388][ T3263] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.664599][ T3263] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.671725][ T3263] bridge_slave_0: entered allmulticast mode [ 28.678296][ T3263] bridge_slave_0: entered promiscuous mode [ 28.695115][ T3260] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.702075][ T3260] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.728114][ T3260] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.750979][ T3263] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.758074][ T3263] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.765223][ T3263] bridge_slave_1: entered allmulticast mode [ 28.771638][ T3263] bridge_slave_1: entered promiscuous mode [ 28.777793][ T3261] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.784861][ T3261] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.791918][ T3261] bridge_slave_0: entered allmulticast mode [ 28.798373][ T3261] bridge_slave_0: entered promiscuous mode [ 28.805025][ T3260] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.812021][ T3260] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.837984][ T3260] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.861856][ T3261] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.869028][ T3261] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.876352][ T3261] bridge_slave_1: entered allmulticast mode [ 28.882683][ T3261] bridge_slave_1: entered promiscuous mode [ 28.896312][ T3265] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.903478][ T3265] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.910711][ T3265] bridge_slave_0: entered allmulticast mode [ 28.916986][ T3265] bridge_slave_0: entered promiscuous mode [ 28.923317][ T3267] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.930412][ T3267] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.937609][ T3267] bridge_slave_0: entered allmulticast mode [ 28.943955][ T3267] bridge_slave_0: entered promiscuous mode [ 28.957112][ T3263] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.967661][ T3263] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.981319][ T3265] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.988415][ T3265] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.995601][ T3265] bridge_slave_1: entered allmulticast mode [ 29.002023][ T3265] bridge_slave_1: entered promiscuous mode [ 29.008111][ T3267] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.015332][ T3267] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.022497][ T3267] bridge_slave_1: entered allmulticast mode [ 29.028907][ T3267] bridge_slave_1: entered promiscuous mode [ 29.046741][ T3261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.075398][ T3261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.094879][ T3267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.104674][ T3263] team0: Port device team_slave_0 added [ 29.120709][ T3265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.130381][ T3261] team0: Port device team_slave_0 added [ 29.137920][ T3260] hsr_slave_0: entered promiscuous mode [ 29.143979][ T3260] hsr_slave_1: entered promiscuous mode [ 29.150916][ T3267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.160739][ T3263] team0: Port device team_slave_1 added [ 29.167432][ T3265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.182471][ T3261] team0: Port device team_slave_1 added [ 29.212786][ T3265] team0: Port device team_slave_0 added [ 29.223375][ T3267] team0: Port device team_slave_0 added [ 29.239269][ T3265] team0: Port device team_slave_1 added [ 29.245166][ T3261] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.252130][ T3261] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.278128][ T3261] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.289330][ T3261] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.296329][ T3261] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.322252][ T3261] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.333597][ T3267] team0: Port device team_slave_1 added [ 29.339693][ T3263] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.346645][ T3263] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.372578][ T3263] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.383903][ T3263] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.390910][ T3263] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.416805][ T3263] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.465264][ T3265] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.472225][ T3265] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.498275][ T3265] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.512961][ T3267] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.519992][ T3267] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.545939][ T3267] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.557763][ T3267] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.564738][ T3267] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.590650][ T3267] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.601572][ T3265] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.608534][ T3265] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.634656][ T3265] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.668180][ T3263] hsr_slave_0: entered promiscuous mode [ 29.674225][ T3263] hsr_slave_1: entered promiscuous mode [ 29.680134][ T3263] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.687739][ T3263] Cannot create hsr debugfs directory [ 29.723965][ T3267] hsr_slave_0: entered promiscuous mode [ 29.730011][ T3267] hsr_slave_1: entered promiscuous mode [ 29.735890][ T3267] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.743453][ T3267] Cannot create hsr debugfs directory [ 29.756011][ T3261] hsr_slave_0: entered promiscuous mode [ 29.761940][ T3261] hsr_slave_1: entered promiscuous mode [ 29.767868][ T3261] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.775438][ T3261] Cannot create hsr debugfs directory [ 29.791814][ T3265] hsr_slave_0: entered promiscuous mode [ 29.797903][ T3265] hsr_slave_1: entered promiscuous mode [ 29.803811][ T3265] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.811395][ T3265] Cannot create hsr debugfs directory [ 29.937425][ T3260] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.960138][ T3260] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.983233][ T3260] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.003890][ T3260] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.049010][ T3265] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.057666][ T3265] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.066376][ T3265] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.077515][ T3265] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.103471][ T3263] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.112239][ T3263] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.123069][ T3263] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.133975][ T3263] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.158456][ T3261] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.167094][ T3261] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.185469][ T3261] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.194210][ T3261] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.218702][ T3260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.242347][ T3260] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.254377][ T3267] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.266040][ T3267] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.275444][ T3267] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.286580][ T3267] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.296661][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.303763][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.320341][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.327449][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.367670][ T3265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.388502][ T3263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.399484][ T3265] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.416571][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.423733][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.436755][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.443843][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.478583][ T3263] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.488610][ T3260] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.513753][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.520852][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.532501][ T3267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.541913][ T3265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.558659][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.565743][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.587609][ T3261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.610997][ T3267] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.620247][ T3263] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.639560][ T3261] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.653932][ T3260] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.664882][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.671964][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.702291][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.709412][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.720002][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.727107][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.736038][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.743142][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.759646][ T3261] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.780474][ T3267] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.790951][ T3267] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.855889][ T3263] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.870650][ T3260] veth0_vlan: entered promiscuous mode [ 30.878931][ T3265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.891561][ T3260] veth1_vlan: entered promiscuous mode [ 30.904545][ T3267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.937831][ T3261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.991557][ T3260] veth0_macvtap: entered promiscuous mode [ 31.007008][ T3260] veth1_macvtap: entered promiscuous mode [ 31.031674][ T3263] veth0_vlan: entered promiscuous mode [ 31.058608][ T3260] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.075706][ T3263] veth1_vlan: entered promiscuous mode [ 31.082554][ T3265] veth0_vlan: entered promiscuous mode [ 31.102827][ T3260] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.111486][ T3260] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.120241][ T3260] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.128976][ T3260] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.137691][ T3260] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.154613][ T3263] veth0_macvtap: entered promiscuous mode [ 31.161358][ T3265] veth1_vlan: entered promiscuous mode [ 31.170505][ T3263] veth1_macvtap: entered promiscuous mode [ 31.195333][ T3263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.206057][ T3263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.217046][ T3263] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.229877][ T3263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.240413][ T3263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.251044][ T3263] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.258935][ T3261] veth0_vlan: entered promiscuous mode [ 31.271299][ T3263] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.280058][ T3263] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.288891][ T3263] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.297621][ T3263] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.314953][ T3261] veth1_vlan: entered promiscuous mode [ 31.321527][ T3265] veth0_macvtap: entered promiscuous mode [ 31.332568][ T3265] veth1_macvtap: entered promiscuous mode [ 31.357917][ T3261] veth0_macvtap: entered promiscuous mode [ 31.382383][ T3261] veth1_macvtap: entered promiscuous mode [ 31.390534][ T3267] veth0_vlan: entered promiscuous mode [ 31.404886][ T3267] veth1_vlan: entered promiscuous mode [ 31.415313][ T3265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.426001][ T3265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.435877][ T3265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.446338][ T3265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.467847][ T3265] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.476282][ T3261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.486780][ T3261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.496665][ T3261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.507104][ T3261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.517089][ T3261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.527601][ T3261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.539759][ T3261] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.556949][ T3265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.567465][ T3265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.577317][ T3265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.587770][ T3265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.598838][ T3265] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.606819][ T3261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.617278][ T3261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.620860][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 31.620874][ T29] audit: type=1400 audit(1724239744.247:121): avc: denied { prog_load } for pid=3402 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.627087][ T3261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.627105][ T3261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.627134][ T3261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.633202][ T29] audit: type=1400 audit(1724239744.247:122): avc: denied { bpf } for pid=3402 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 31.651900][ T3261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.662332][ T29] audit: type=1400 audit(1724239744.247:123): avc: denied { perfmon } for pid=3402 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 31.677346][ T3261] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.699981][ T3403] loop0: detected capacity change from 0 to 128 [ 31.703266][ T29] audit: type=1400 audit(1724239744.307:124): avc: denied { create } for pid=3402 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 31.724101][ T3267] veth0_macvtap: entered promiscuous mode [ 31.733035][ T29] audit: type=1400 audit(1724239744.307:125): avc: denied { getopt } for pid=3402 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 31.767746][ T3267] veth1_macvtap: entered promiscuous mode [ 31.800453][ T3265] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.809207][ T3265] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.817966][ T3265] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.826686][ T3265] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.836527][ T29] audit: type=1400 audit(1724239744.467:126): avc: denied { mount } for pid=3402 comm="syz.0.1" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 31.860076][ T3261] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.868830][ T3261] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.877577][ T3261] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.886322][ T3261] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.910931][ T29] audit: type=1400 audit(1724239744.477:127): avc: denied { unmount } for pid=3263 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 31.930948][ T29] audit: type=1400 audit(1724239744.537:128): avc: denied { prog_run } for pid=3404 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.949600][ T29] audit: type=1400 audit(1724239744.537:129): avc: denied { map_create } for pid=3404 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.957684][ T3405] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 31.968389][ T29] audit: type=1400 audit(1724239744.537:130): avc: denied { map_read map_write } for pid=3404 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.001802][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.012314][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.022171][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.032632][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.042511][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.052949][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.062771][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.073314][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.084131][ T3267] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.098499][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.109077][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.119056][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.129511][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.139324][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.149750][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.159590][ T3267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.170072][ T3267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.180964][ T3267] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.211608][ T3267] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.220527][ T3267] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.229432][ T3267] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.238226][ T3267] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.261922][ T3409] loop1: detected capacity change from 0 to 512 [ 32.864574][ T3409] EXT4-fs: Ignoring removed i_version option [ 33.234767][ T3409] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.394734][ T3409] ext4 filesystem being mounted at /1/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 38.004325][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 38.004362][ T29] audit: type=1400 audit(1724239750.627:150): avc: denied { create } for pid=3406 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 42.234300][ T29] audit: type=1400 audit(1724239754.857:151): avc: denied { map } for pid=3408 comm="syz.1.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 42.258103][ T29] audit: type=1400 audit(1724239754.857:152): avc: denied { read write } for pid=3408 comm="syz.1.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 49.734308][ T29] audit: type=1400 audit(1724239762.357:153): avc: denied { ioctl } for pid=3406 comm="syz.0.7" path="socket:[2817]" dev="sockfs" ino=2817 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 62.833069][ T3409] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.893129][ T29] audit: type=1400 audit(1724239775.517:154): avc: denied { create } for pid=3426 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 62.953890][ T29] audit: type=1400 audit(1724239775.577:155): avc: denied { read } for pid=3426 comm="syz.4.5" path="socket:[2843]" dev="sockfs" ino=2843 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 62.998418][ T29] audit: type=1400 audit(1724239775.577:156): avc: denied { create } for pid=3425 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 63.017877][ T29] audit: type=1400 audit(1724239775.577:157): avc: denied { ioctl } for pid=3425 comm="syz.2.3" path="socket:[3776]" dev="sockfs" ino=3776 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 63.042349][ T29] audit: type=1400 audit(1724240031.601:158): avc: denied { name_connect } for pid=3426 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 63.067100][ T29] audit: type=1400 audit(1724240031.651:159): avc: denied { write } for pid=3425 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 63.086155][ T29] audit: type=1400 audit(1724240031.651:160): avc: denied { create } for pid=3425 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 63.106415][ T29] audit: type=1400 audit(1724240031.651:161): avc: denied { write } for pid=3425 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 63.126431][ T29] audit: type=1400 audit(1724240031.651:162): avc: denied { nlmsg_read } for pid=3425 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 63.127745][ T3440] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5'. [ 63.146917][ T29] audit: type=1400 audit(1724240031.671:163): avc: denied { shutdown } for pid=3426 comm="syz.4.5" lport=45106 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 63.181550][ T3437] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 63.195359][ T3437] vhci_hcd: invalid port number 23 [ 63.244582][ T3263] syz-executor (3263) used greatest stack depth: 11104 bytes left [ 63.286860][ T3449] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 63.340559][ T3460] loop3: detected capacity change from 0 to 2048 [ 63.363707][ T3449] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 63.378479][ T3466] loop2: detected capacity change from 0 to 2048 [ 63.408649][ T3460] loop3: p1 < > p4 [ 63.417767][ T3460] loop3: p4 size 8388608 extends beyond EOD, truncated [ 63.424947][ T3466] loop2: p1 < > p4 [ 63.426101][ T3449] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 63.429765][ T3466] loop2: p4 size 8388608 extends beyond EOD, truncated [ 63.538234][ T3449] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 63.617350][ T3475] usb usb7: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 63.626893][ T2962] loop3: p1 < > p4 [ 63.631432][ T2962] loop3: p4 size 8388608 extends beyond EOD, truncated [ 63.689266][ T2962] loop3: p1 < > p4 [ 63.705960][ T2962] loop3: p4 size 8388608 extends beyond EOD, truncated [ 63.772410][ T2962] loop3: p1 < > p4 [ 63.791300][ T2962] loop3: p4 size 8388608 extends beyond EOD, truncated [ 63.820331][ T3430] chnl_net:caif_netlink_parms(): no params data found [ 63.860131][ T3449] bridge_slave_1: left allmulticast mode [ 63.865908][ T3449] bridge_slave_1: left promiscuous mode [ 63.871697][ T3449] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.931870][ T3449] bridge_slave_0: left allmulticast mode [ 63.937649][ T3449] bridge_slave_0: left promiscuous mode [ 63.943360][ T3449] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.018600][ T3502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3502 comm=syz.4.18 [ 64.107216][ T3449] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 64.128091][ T3449] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 64.147714][ T3449] bond0 (unregistering): Released all slaves [ 64.173284][ T3433] chnl_net:caif_netlink_parms(): no params data found [ 64.189382][ T3492] netlink: 'syz.4.18': attribute type 7 has an invalid length. [ 64.223935][ T3499] bond0: (slave gretap1): Enslaving as an active interface with an up link [ 64.232809][ T3481] netlink: 12 bytes leftover after parsing attributes in process `syz.2.17'. [ 64.241706][ T3481] netlink: 12 bytes leftover after parsing attributes in process `syz.2.17'. [ 64.269197][ T3502] netlink: 'syz.4.18': attribute type 7 has an invalid length. [ 64.311935][ T3449] hsr_slave_0: left promiscuous mode [ 64.328929][ T3449] hsr_slave_1: left promiscuous mode [ 64.355126][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 64.362631][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 64.405202][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 64.412633][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 64.436325][ T3449] veth1_macvtap: left promiscuous mode [ 64.441864][ T3449] veth0_macvtap: left promiscuous mode [ 64.447697][ T3449] veth1_vlan: left promiscuous mode [ 64.452997][ T3449] veth0_vlan: left promiscuous mode [ 64.560566][ T3513] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3513 comm=syz.2.21 [ 64.629553][ T3449] team0 (unregistering): Port device team_slave_1 removed [ 64.654601][ T3449] team0 (unregistering): Port device team_slave_0 removed [ 64.754084][ T3511] netlink: 'syz.2.21': attribute type 7 has an invalid length. [ 64.779730][ T3509] netlink: 12 bytes leftover after parsing attributes in process `syz.4.20'. [ 64.788611][ T3509] netlink: 12 bytes leftover after parsing attributes in process `syz.4.20'. [ 64.832240][ T3516] netlink: 20 bytes leftover after parsing attributes in process `syz.3.22'. [ 64.889126][ T3512] bridge0: port 3(gretap1) entered blocking state [ 64.895734][ T3512] bridge0: port 3(gretap1) entered disabled state [ 64.902416][ T3512] gretap1: entered allmulticast mode [ 64.909951][ T3512] gretap1: entered promiscuous mode [ 64.920024][ T3513] netlink: 'syz.2.21': attribute type 7 has an invalid length. [ 64.938745][ T3521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3521 comm=syz.3.22 [ 64.973295][ T3525] netlink: 32 bytes leftover after parsing attributes in process `syz.2.24'. [ 64.987798][ T3525] netlink: 232 bytes leftover after parsing attributes in process `syz.2.24'. [ 64.988380][ T3430] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.996691][ T3525] netlink: 72 bytes leftover after parsing attributes in process `syz.2.24'. [ 64.998197][ T3525] Zero length message leads to an empty skb [ 65.003811][ T3430] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.027668][ T3430] bridge_slave_0: entered allmulticast mode [ 65.034118][ T3430] bridge_slave_0: entered promiscuous mode [ 65.048744][ T3521] netlink: 20 bytes leftover after parsing attributes in process `syz.3.22'. [ 65.059185][ T3430] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.066321][ T3430] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.078187][ T3430] bridge_slave_1: entered allmulticast mode [ 65.097864][ T3430] bridge_slave_1: entered promiscuous mode [ 65.122739][ T3433] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.129931][ T3433] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.137983][ T3433] bridge_slave_0: entered allmulticast mode [ 65.144953][ T3433] bridge_slave_0: entered promiscuous mode [ 65.165988][ T3433] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.173085][ T3433] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.180946][ T3433] bridge_slave_1: entered allmulticast mode [ 65.195697][ T3433] bridge_slave_1: entered promiscuous mode [ 65.210841][ T3430] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.272156][ T3430] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.288541][ T3433] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.342123][ T3433] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.352118][ T3560] Failed to initialize the IGMP autojoin socket (err -2) [ 65.364293][ T3430] team0: Port device team_slave_0 added [ 65.368541][ T3563] loop3: detected capacity change from 0 to 128 [ 65.371205][ T3430] team0: Port device team_slave_1 added [ 65.392035][ T3449] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.402408][ T3564] loop2: detected capacity change from 0 to 2048 [ 65.414313][ T3563] loop3: detected capacity change from 128 to 0 [ 65.421219][ T3563] syz.3.30: attempt to access beyond end of device [ 65.421219][ T3563] loop3: rw=0, sector=3, nr_sectors = 1 limit=0 [ 65.433991][ T3563] FAT-fs (loop3): Directory bread(block 3) failed [ 65.440468][ T3563] syz.3.30: attempt to access beyond end of device [ 65.440468][ T3563] loop3: rw=0, sector=4, nr_sectors = 1 limit=0 [ 65.444825][ T3564] loop2: p1 < > p4 [ 65.453626][ T3563] FAT-fs (loop3): Directory bread(block 4) failed [ 65.463424][ T3563] syz.3.30: attempt to access beyond end of device [ 65.463424][ T3563] loop3: rw=0, sector=5, nr_sectors = 1 limit=0 [ 65.464694][ T3564] loop2: p4 size 8388608 extends beyond EOD, truncated [ 65.477797][ T3563] FAT-fs (loop3): Directory bread(block 5) failed [ 65.489934][ T3563] syz.3.30: attempt to access beyond end of device [ 65.489934][ T3563] loop3: rw=0, sector=6, nr_sectors = 1 limit=0 [ 65.505081][ T3563] FAT-fs (loop3): Directory bread(block 6) failed [ 65.513321][ T3563] syz.3.30: attempt to access beyond end of device [ 65.513321][ T3563] loop3: rw=0, sector=1, nr_sectors = 1 limit=0 [ 65.515213][ T3433] team0: Port device team_slave_0 added [ 65.533248][ T3563] FAT-fs (loop3): FAT read failed (blocknr 1) [ 65.539440][ T3565] syz.3.30: attempt to access beyond end of device [ 65.539440][ T3565] loop3: rw=0, sector=3, nr_sectors = 1 limit=0 [ 65.555953][ T3565] FAT-fs (loop3): Directory bread(block 3) failed [ 65.562535][ T3565] syz.3.30: attempt to access beyond end of device [ 65.562535][ T3565] loop3: rw=0, sector=4, nr_sectors = 1 limit=0 [ 65.579996][ T3449] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.583399][ T3565] FAT-fs (loop3): Directory bread(block 4) failed [ 65.592451][ T2962] loop2: p1 < > p4 [ 65.597531][ T3565] syz.3.30: attempt to access beyond end of device [ 65.597531][ T3565] loop3: rw=0, sector=5, nr_sectors = 1 limit=0 [ 65.613149][ T2962] loop2: p4 size 8388608 extends beyond EOD, truncated [ 65.622762][ T3430] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.629772][ T3430] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.633891][ T3565] FAT-fs (loop3): Directory bread(block 5) failed [ 65.656066][ T3430] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.674189][ T3565] syz.3.30: attempt to access beyond end of device [ 65.674189][ T3565] loop3: rw=0, sector=6, nr_sectors = 1 limit=0 [ 65.679051][ T3430] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.689455][ T3565] FAT-fs (loop3): Directory bread(block 6) failed [ 65.693801][ T3430] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.726180][ T3430] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.738352][ T3433] team0: Port device team_slave_1 added [ 65.740503][ T3490] udevd[3490]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 65.750724][ T3495] udevd[3495]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 65.778664][ T3449] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.789075][ T3265] syz-executor: attempt to access beyond end of device [ 65.789075][ T3265] loop3: rw=0, sector=3, nr_sectors = 1 limit=0 [ 65.802566][ T3265] FAT-fs (loop3): Directory bread(block 3) failed [ 65.819016][ T3265] FAT-fs (loop3): unable to read boot sector to mark fs as dirty [ 65.840229][ T3449] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.852811][ C1] hrtimer: interrupt took 38720 ns [ 65.919285][ T3430] hsr_slave_0: entered promiscuous mode [ 65.935122][ T3430] hsr_slave_1: entered promiscuous mode [ 65.944313][ T3430] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 65.951884][ T3430] Cannot create hsr debugfs directory [ 65.968404][ T3433] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.975437][ T3433] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.001390][ T3433] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 66.029062][ T3594] loop2: detected capacity change from 0 to 8192 [ 66.041808][ T3433] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 66.044707][ T3594] ======================================================= [ 66.044707][ T3594] WARNING: The mand mount option has been deprecated and [ 66.044707][ T3594] and is ignored by this kernel. Remove the mand [ 66.044707][ T3594] option from the mount to silence this warning. [ 66.044707][ T3594] ======================================================= [ 66.048884][ T3433] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.109664][ T3433] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 66.123449][ T3265] syz-executor (3265) used greatest stack depth: 10984 bytes left [ 66.196561][ T3594] ================================================================== [ 66.204713][ T3594] BUG: KCSAN: data-race in mark_buffer_dirty_inode / sync_mapping_buffers [ 66.213278][ T3594] [ 66.215611][ T3594] write to 0xffff8881068f2878 of 8 bytes by task 3604 on cpu 0: [ 66.223255][ T3594] sync_mapping_buffers+0x162/0x7e0 [ 66.228494][ T3594] fat_file_fsync+0xad/0x100 [ 66.233137][ T3594] vfs_fsync_range+0x122/0x140 [ 66.237920][ T3594] generic_file_write_iter+0x191/0x1d0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 66.243414][ T3594] iter_file_splice_write+0x5e6/0x970 [ 66.248820][ T3594] direct_splice_actor+0x16c/0x2c0 [ 66.253958][ T3594] splice_direct_to_actor+0x305/0x670 [ 66.259356][ T3594] do_splice_direct+0xd7/0x150 [ 66.264141][ T3594] do_sendfile+0x3ab/0x950 [ 66.268615][ T3594] __x64_sys_sendfile64+0xbd/0x150 [ 66.273765][ T3594] x64_sys_call+0xed5/0x2d60 [ 66.278388][ T3594] do_syscall_64+0xc9/0x1c0 [ 66.282915][ T3594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.288859][ T3594] [ 66.291199][ T3594] read to 0xffff8881068f2878 of 8 bytes by task 3594 on cpu 1: [ 66.298758][ T3594] mark_buffer_dirty_inode+0x96/0x1c0 [ 66.304159][ T3594] fat16_ent_put+0x4f/0x60 [ 66.308631][ T3594] fat_alloc_clusters+0x4c9/0xa80 [ 66.313688][ T3594] fat_get_block+0x25c/0x5e0 [ 66.318308][ T3594] __block_write_begin_int+0x417/0xfa0 [ 66.323788][ T3594] block_write_begin+0x7b/0x170 [ 66.328672][ T3594] cont_write_begin+0x486/0x6b0 [ 66.333551][ T3594] fat_write_begin+0x61/0xf0 [ 66.338162][ T3594] generic_perform_write+0x1b4/0x580 [ 66.343501][ T3594] __generic_file_write_iter+0xa1/0x120 [ 66.349093][ T3594] generic_file_write_iter+0x7d/0x1d0 [ 66.354509][ T3594] vfs_write+0x78f/0x900 [ 66.358786][ T3594] ksys_write+0xeb/0x1b0 [ 66.363061][ T3594] __x64_sys_write+0x42/0x50 [ 66.367686][ T3594] x64_sys_call+0x27dd/0x2d60 [ 66.372383][ T3594] do_syscall_64+0xc9/0x1c0 [ 66.376935][ T3594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.382872][ T3594] [ 66.385207][ T3594] value changed: 0xffff888106844208 -> 0x0000000000000000 [ 66.392320][ T3594] [ 66.394651][ T3594] Reported by Kernel Concurrency Sanitizer on: [ 66.400815][ T3594] CPU: 1 UID: 0 PID: 3594 Comm: syz.2.36 Not tainted 6.11.0-rc4-syzkaller-00019-gb311c1b497e5 #0 [ 66.411335][ T3594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 66.421414][ T3594] ================================================================== [ 66.504676][ T3449] bridge_slave_1: left allmulticast mode [ 66.510357][ T3449] bridge_slave_1: left promiscuous mode [ 66.516178][ T3449] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.525131][ T3449] bridge_slave_0: left allmulticast mode [ 66.530778][ T3449] bridge_slave_0: left promiscuous mode [ 66.536467][ T3449] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.686822][ T3449] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 66.697703][ T3449] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 66.708958][ T3449] bond0 (unregistering): Released all slaves [ 66.897649][ T3449] hsr_slave_0: left promiscuous mode [ 66.903506][ T3449] hsr_slave_1: left promiscuous mode [ 66.910741][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 66.918200][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 66.927216][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 66.934670][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 66.943504][ T3449] veth1_macvtap: left promiscuous mode [ 66.949130][ T3449] veth0_macvtap: left promiscuous mode [ 66.954737][ T3449] veth1_vlan: left promiscuous mode [ 66.959950][ T3449] veth0_vlan: left promiscuous mode [ 67.043376][ T3449] team0 (unregistering): Port device team_slave_1 removed [ 67.053769][ T3449] team0 (unregistering): Port device team_slave_0 removed [ 67.389457][ T3449] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.428672][ T3449] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.487304][ T3449] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.558164][ T3449] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.654571][ T3449] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.708639][ T3449] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.767533][ T3449] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.808734][ T3449] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.855300][ T3449] bridge_slave_1: left allmulticast mode [ 67.860970][ T3449] bridge_slave_1: left promiscuous mode [ 67.866649][ T3449] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.879681][ T3449] bridge_slave_0: left allmulticast mode [ 67.885437][ T3449] bridge_slave_0: left promiscuous mode [ 67.891174][ T3449] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.899676][ T3449] gretap1: left allmulticast mode [ 67.904744][ T3449] gretap1: left promiscuous mode [ 67.909887][ T3449] bridge0: port 3(gretap1) entered disabled state [ 67.916965][ T3449] bridge_slave_1: left allmulticast mode [ 67.922604][ T3449] bridge_slave_1: left promiscuous mode [ 67.928331][ T3449] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.936665][ T3449] bridge_slave_0: left allmulticast mode [ 67.942323][ T3449] bridge_slave_0: left promiscuous mode [ 67.948025][ T3449] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.956197][ T3449] bridge_slave_1: left allmulticast mode [ 67.961848][ T3449] bridge_slave_1: left promiscuous mode [ 67.967535][ T3449] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.975240][ T3449] bridge_slave_0: left allmulticast mode [ 67.980879][ T3449] bridge_slave_0: left promiscuous mode [ 67.986525][ T3449] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.994542][ T3449] bridge_slave_1: left allmulticast mode [ 68.000206][ T3449] bridge_slave_1: left promiscuous mode [ 68.005889][ T3449] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.013731][ T3449] bridge_slave_0: left allmulticast mode [ 68.019492][ T3449] bridge_slave_0: left promiscuous mode [ 68.025276][ T3449] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.336281][ T3449] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 68.346053][ T3449] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 68.356133][ T3449] bond0 (unregistering): Released all slaves [ 68.365597][ T3449] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 68.375955][ T3449] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 68.385856][ T3449] bond0 (unregistering): Released all slaves [ 68.394838][ T3449] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 68.404672][ T3449] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 68.414656][ T3449] bond0 (unregistering): Released all slaves [ 68.423890][ T3449] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 68.433914][ T3449] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 68.443838][ T3449] bond0 (unregistering): Released all slaves [ 68.636097][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 68.643655][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 68.654351][ T3449] hsr_slave_0: left promiscuous mode [ 68.660001][ T3449] hsr_slave_1: left promiscuous mode [ 68.666991][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 68.674647][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 68.682170][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 68.689636][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 68.698447][ T3449] hsr_slave_0: left promiscuous mode [ 68.704124][ T3449] hsr_slave_1: left promiscuous mode [ 68.709863][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 68.717484][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 68.726674][ T3449] hsr_slave_0: left promiscuous mode [ 68.732281][ T3449] hsr_slave_1: left promiscuous mode [ 68.738071][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 68.745500][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 68.753002][ T3449] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 68.760467][ T3449] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 68.770947][ T3449] veth1_macvtap: left promiscuous mode [ 68.776542][ T3449] veth0_macvtap: left promiscuous mode [ 68.782134][ T3449] veth1_vlan: left promiscuous mode [ 68.787380][ T3449] veth0_vlan: left promiscuous mode [ 68.793138][ T3449] veth1_macvtap: left promiscuous mode [ 68.798648][ T3449] veth0_macvtap: left promiscuous mode [ 68.804355][ T3449] veth1_vlan: left promiscuous mode [ 68.809621][ T3449] veth0_vlan: left promiscuous mode [ 68.918643][ T3449] team0 (unregistering): Port device team_slave_1 removed [ 68.930105][ T3449] team0 (unregistering): Port device team_slave_0 removed [ 68.991228][ T3449] team0 (unregistering): Port device team_slave_1 removed [ 69.001419][ T3449] team0 (unregistering): Port device team_slave_0 removed [ 69.061238][ T3449] team0 (unregistering): Port device team_slave_1 removed [ 69.070924][ T3449] team0 (unregistering): Port device team_slave_0 removed [ 69.131171][ T3449] team0 (unregistering): Port device team_slave_1 removed [ 69.141520][ T3449] team0 (unregistering): Port device team_slave_0 removed