last executing test programs: 781.124364ms ago: executing program 2 (id=3): unshare(0x40600) (async) socket$packet(0x11, 0x3, 0x300) (async) r0 = socket$tipc(0x1e, 0x2, 0x0) (async) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000000)=0x3, 0xfffffffffffffea8) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r0], 0x5c}}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x1ff}}, './file0\x00'}) ioctl$AUTOFS_IOC_CATATONIC(r2, 0x9362, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000540)=0x0, &(0x7f0000000580)=0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000800)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000680)={0x13c, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x120, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xc, 0x2, 0x8, 0x8e8c}]}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) dup3(r0, 0xffffffffffffffff, 0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) (async) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') (async) readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000012c0)=""/168, 0xff8c) openat$snapshot(0xffffffffffffff9c, 0x0, 0x901400, 0x0) (async) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) (async) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) (async) mremap(&(0x7f0000678000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f000084c000/0x3000)=nil) mremap(&(0x7f000040b000/0x1000)=nil, 0x1000, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) (async) r6 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='asymmetPic@\xe6u\x18\x8f\x8d\xd0\xb9\xb4d\x97\xee\x9bY\xb3\xa0dI$(\xed\x98S\xdcB\xdf\x99J\x9c&#m\xd0\xb0\x134m\xa7se\x8fvS\x84:\"-\x94\x84\xbd\xf4X\xf2F6\xe44\x1f\xa7f\x82\xd7aLt@%a\x8a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf\xb4\xc6m39\x9e)\xa5\xe7\xdb\xdc\xb3\xb6\x1f\x1d5\x13\xde\xab\x86\xf5`S<\xd5\xc7@-X0\xa9\xe4l\xab\xf0}\xf0\xeaco\x85kM\x8aS\x1bZ\xa1\xba\xb4E\xbc', r6) (async) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r7, &(0x7f0000000080)={0xa, 0x4e21, 0x7f, @ipv4={'\x00', '\xff\xff', @loopback}, 0xffff}, 0x1c) (async) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e21, 0x659, @empty, 0xff}, 0x1c) (async) setsockopt$inet6_IPV6_ADDRFORM(r7, 0x29, 0x1, &(0x7f0000000180), 0x4) (async) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)={0x28, 0x3, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) 740.304787ms ago: executing program 2 (id=6): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x64}, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x1c, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x17}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 648.008162ms ago: executing program 2 (id=7): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="70000000100001040000000000000000000000fe", @ANYRES32=r2, @ANYBLOB="31000000bf3f9f8008000a00", @ANYRES32=0x0, @ANYBLOB="34001280110001006272696467655f736c617665000000001c000580080022", @ANYRES32=0x0], 0x70}, 0x1, 0x0, 0x0, 0x20040800}, 0x0) 633.434833ms ago: executing program 4 (id=5): connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000200)={0x2, @long}, 0x8) r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e24, @remote}, 0x200, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000580)='batadv_slave_1\x00', 0x7, 0x10000000000, 0xdc}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x4, 0xee, &(0x7f0000000300)=""/238, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xe, 0x401, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000480)=[{0x3, 0x1, 0x6, 0x5}, {0x0, 0x2, 0xa, 0x9}], 0x10, 0x3}, 0x94) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x0, @empty}, {0x4, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x184, 0x0, 0x0, 0xfdffffffffffffff, 0x0, &(0x7f0000000180)='lo\x00', 0x3ff000000000}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x4c, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @private}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}) 366.829669ms ago: executing program 2 (id=8): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0xffff, 0x0, 0xa, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x0, 0x0, 0x9ac, 0xfffffc, 0x4000000000000000, 0xfffffffffffffffb}, {0x0, 0x0, 0x200000000000000}, 0x800}}, 0xb8}}, 0x2c000010) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="b8000000190001000000000000000000e00000020000000000000000000000000000000002000000000000000000000000000000000000000a00000029000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000900000000000000000000fbd94d023316ec5c0a3e4000000000000200000000000000ffffffffffffffff0000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff0700"/119], 0xb8}}, 0x10) 366.477199ms ago: executing program 4 (id=9): r0 = socket(0x10, 0x6, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000500)={'gre0\x00', &(0x7f0000000280)={'tunl0\x00', 0x0, 0x710, 0x8000, 0x5, 0x0, {{0x5, 0x4, 0x0, 0x1, 0x14, 0x0, 0x0, 0x5, 0x2f, 0x0, @empty, @broadcast}}}}) (async) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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", @ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x94) (async) msgget$private(0x0, 0x8) 352.65304ms ago: executing program 4 (id=10): set_mempolicy(0x3, &(0x7f0000000080)=0x1ff, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000001f95"], &(0x7f00000000c0)='syzkaller\x00'}, 0x94) 263.216585ms ago: executing program 2 (id=11): r0 = io_uring_setup(0x68af, &(0x7f0000000480)={0x0, 0x0, 0x1880, 0x1}) r1 = socket$qrtr(0x2a, 0x2, 0x0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="03040000b50000000100fefffeefffff"], 0xc8) sendmsg$sock(r1, &(0x7f0000000000)={&(0x7f0000000140)=@pppoe={0x2a, 0x0, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}, 'lo\x00'}}, 0x80, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) recvmmsg(r3, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010000, &(0x7f0000006900)={0x77359400}) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='dctcp', 0x5) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x2, 0x200, @empty, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r4, &(0x7f00000002c0)="a644aebac2", 0x5, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bic', 0x3) shutdown(r4, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) 262.730805ms ago: executing program 4 (id=12): perf_event_open(0x0, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x28, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="02070900040000002dbd7000ffdbdf2502000b"], 0x20}}, 0x4040014) 23.161489ms ago: executing program 1 (id=2): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000004000000000000000000001800000004000040000000000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000181000000006000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) 16.944199ms ago: executing program 3 (id=4): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x5c, 0x10, 0x401, 0x4000, 0x0, {0x0, 0x0, 0xffff, 0x0, 0x49108}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xf03b, 0x15}}]}]}}}, @IFLA_IFNAME={0x14, 0x3, 'vlan0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x81ffffff}, 0x0) 0s ago: executing program 2 (id=13): r0 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x650b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800004, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x1, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xf, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x64a0000, 0x0, 0x0, 0x0, 0x48, '\x00', r2, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000100)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r5, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x34000, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x1b, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000055a60701000000000000000018110000", @ANYRES32=r6, @ANYRESOCT=r1, @ANYRES32=r6, @ANYBLOB="0000000000000000b7020000030000088500000086000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) r8 = socket$nl_rdma(0x10, 0x3, 0x14) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r11 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r11, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r9, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000d80)=ANY=[@ANYBLOB, @ANYRES16=r10, @ANYBLOB="010029bd7000fddbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="04000280"], 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) sync_file_range(r12, 0x7, 0x0, 0x7) r13 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r13, 0x6, 0x0, 0x0, 0x0) r14 = fsmount(r13, 0x0, 0x0) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x9, 0xffffffff, 0x40}) setpriority(0x2, 0x0, 0xb842) openat$cgroup_subtree(r14, &(0x7f0000000380), 0x2, 0x0) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000007000000060000008c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000500000018110000", @ANYRES32=r15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.69' (ED25519) to the list of known hosts. [ 33.955568][ T29] audit: type=1400 audit(1769616823.984:66): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.978943][ T29] audit: type=1400 audit(1769616824.004:67): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.981256][ T3303] cgroup: Unknown subsys name 'net' [ 34.006735][ T29] audit: type=1400 audit(1769616824.034:68): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.185519][ T3303] cgroup: Unknown subsys name 'cpuset' [ 34.191826][ T3303] cgroup: Unknown subsys name 'rlimit' [ 34.363638][ T29] audit: type=1400 audit(1769616824.384:69): avc: denied { setattr } for pid=3303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.387172][ T29] audit: type=1400 audit(1769616824.394:70): avc: denied { create } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.407644][ T29] audit: type=1400 audit(1769616824.394:71): avc: denied { write } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.428062][ T29] audit: type=1400 audit(1769616824.394:72): avc: denied { read } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.448418][ T29] audit: type=1400 audit(1769616824.414:73): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.473343][ T29] audit: type=1400 audit(1769616824.414:74): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.496913][ T29] audit: type=1400 audit(1769616824.424:75): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 34.511452][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.557401][ T3303] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.777899][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 35.789847][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 35.876202][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 35.900835][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.908078][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.915572][ T3319] bridge_slave_0: entered allmulticast mode [ 35.922133][ T3319] bridge_slave_0: entered promiscuous mode [ 35.929147][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.936666][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.943889][ T3319] bridge_slave_1: entered allmulticast mode [ 35.950672][ T3319] bridge_slave_1: entered promiscuous mode [ 35.960418][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.967646][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.975022][ T3316] bridge_slave_0: entered allmulticast mode [ 35.981463][ T3316] bridge_slave_0: entered promiscuous mode [ 36.005864][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.012950][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.020172][ T3316] bridge_slave_1: entered allmulticast mode [ 36.026751][ T3316] bridge_slave_1: entered promiscuous mode [ 36.033410][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 36.048157][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.059921][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 36.082573][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.107380][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.122412][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.170672][ T3319] team0: Port device team_slave_0 added [ 36.181507][ T3316] team0: Port device team_slave_0 added [ 36.187179][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.194333][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.201605][ T3320] bridge_slave_0: entered allmulticast mode [ 36.208238][ T3320] bridge_slave_0: entered promiscuous mode [ 36.220933][ T3319] team0: Port device team_slave_1 added [ 36.232341][ T3316] team0: Port device team_slave_1 added [ 36.243148][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.250443][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.257717][ T3320] bridge_slave_1: entered allmulticast mode [ 36.264042][ T3320] bridge_slave_1: entered promiscuous mode [ 36.307963][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.314977][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.341038][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.351859][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.359019][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.366295][ T3315] bridge_slave_0: entered allmulticast mode [ 36.372971][ T3315] bridge_slave_0: entered promiscuous mode [ 36.379930][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.386964][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.413047][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.429595][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.438740][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.445871][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.453067][ T3322] bridge_slave_0: entered allmulticast mode [ 36.459628][ T3322] bridge_slave_0: entered promiscuous mode [ 36.466388][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.473361][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.499318][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.510303][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.517505][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.524867][ T3315] bridge_slave_1: entered allmulticast mode [ 36.531298][ T3315] bridge_slave_1: entered promiscuous mode [ 36.537917][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.544944][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.570897][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.582775][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.592048][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.599129][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.606576][ T3322] bridge_slave_1: entered allmulticast mode [ 36.613035][ T3322] bridge_slave_1: entered promiscuous mode [ 36.656339][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.675821][ T3320] team0: Port device team_slave_0 added [ 36.683365][ T3320] team0: Port device team_slave_1 added [ 36.691624][ T3316] hsr_slave_0: entered promiscuous mode [ 36.697649][ T3316] hsr_slave_1: entered promiscuous mode [ 36.704756][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.715604][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.748015][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.768409][ T3315] team0: Port device team_slave_0 added [ 36.774449][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.781456][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.807609][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.821052][ T3319] hsr_slave_0: entered promiscuous mode [ 36.827180][ T3319] hsr_slave_1: entered promiscuous mode [ 36.833098][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 36.838876][ T3319] Cannot create hsr debugfs directory [ 36.850589][ T3315] team0: Port device team_slave_1 added [ 36.863751][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.870813][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.896905][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.923956][ T3322] team0: Port device team_slave_0 added [ 36.948079][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.955132][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.981135][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.992763][ T3322] team0: Port device team_slave_1 added [ 37.018799][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.026183][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.052287][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.080373][ T3320] hsr_slave_0: entered promiscuous mode [ 37.086565][ T3320] hsr_slave_1: entered promiscuous mode [ 37.092414][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 37.098207][ T3320] Cannot create hsr debugfs directory [ 37.109800][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.116836][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.142792][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.186698][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.193695][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.219742][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.239900][ T3315] hsr_slave_0: entered promiscuous mode [ 37.246034][ T3315] hsr_slave_1: entered promiscuous mode [ 37.252012][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 37.257804][ T3315] Cannot create hsr debugfs directory [ 37.351965][ T3322] hsr_slave_0: entered promiscuous mode [ 37.358150][ T3322] hsr_slave_1: entered promiscuous mode [ 37.364137][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 37.369943][ T3322] Cannot create hsr debugfs directory [ 37.432968][ T3316] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.456080][ T3316] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.472232][ T3316] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.486707][ T3316] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.516092][ T3319] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.524745][ T3319] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.536038][ T3319] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.547986][ T3319] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.575830][ T3320] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.585258][ T3320] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.606699][ T3320] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.616197][ T3320] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.638760][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.664605][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.673981][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.683449][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.709567][ T3322] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.718913][ T3322] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.730343][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.742262][ T3322] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.751596][ T3322] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.771520][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.784655][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.797492][ T417] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.804615][ T417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.813597][ T417] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.820685][ T417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.849212][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.878673][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.885849][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.923267][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.930397][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.943753][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.955838][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.987579][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.997933][ T3319] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.008531][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.029986][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.042874][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.057742][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.067287][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.074486][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.085541][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.092698][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.103130][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.110232][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.124748][ T1714] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.131873][ T1714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.149378][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.170141][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.177279][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.195625][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.209471][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.216661][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.253973][ T3322] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.264406][ T3322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.290242][ T3320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.300775][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.392268][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.436607][ T3319] veth0_vlan: entered promiscuous mode [ 38.456075][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.466310][ T3319] veth1_vlan: entered promiscuous mode [ 38.522355][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.541054][ T3316] veth0_vlan: entered promiscuous mode [ 38.549024][ T3319] veth0_macvtap: entered promiscuous mode [ 38.564832][ T3316] veth1_vlan: entered promiscuous mode [ 38.571944][ T3319] veth1_macvtap: entered promiscuous mode [ 38.585803][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.609833][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.632091][ T3315] veth0_vlan: entered promiscuous mode [ 38.644676][ T3316] veth0_macvtap: entered promiscuous mode [ 38.662156][ T3315] veth1_vlan: entered promiscuous mode [ 38.668875][ T310] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.678997][ T3316] veth1_macvtap: entered promiscuous mode [ 38.688312][ T310] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.720162][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.742640][ T3319] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.751549][ T3320] veth0_vlan: entered promiscuous mode [ 38.764108][ T310] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.776634][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.800535][ T3320] veth1_vlan: entered promiscuous mode [ 38.818401][ T310] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.841584][ T3315] veth0_macvtap: entered promiscuous mode [ 38.849638][ T310] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.865910][ T3322] veth0_vlan: entered promiscuous mode [ 38.882830][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.891960][ T3322] veth1_vlan: entered promiscuous mode [ 38.902952][ T3315] veth1_macvtap: entered promiscuous mode [ 38.913456][ T3320] veth0_macvtap: entered promiscuous mode [ 38.920662][ T37] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.941517][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.950131][ T3320] veth1_macvtap: entered promiscuous mode [ 38.959137][ T37] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.972985][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.987299][ T3493] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7'. [ 38.997120][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 38.997137][ T29] audit: type=1400 audit(1769616829.024:106): avc: denied { create } for pid=3492 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 39.028535][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.038901][ T417] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.052583][ T417] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.061471][ T3493] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7'. [ 39.070739][ T29] audit: type=1400 audit(1769616829.054:107): avc: denied { ioctl } for pid=3492 comm="syz.4.5" path="socket:[5229]" dev="sockfs" ino=5229 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 39.073262][ T3493] bridge_slave_0: left allmulticast mode [ 39.100709][ T3493] bridge_slave_0: left promiscuous mode [ 39.106467][ T3493] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.117865][ T3322] veth0_macvtap: entered promiscuous mode [ 39.125196][ T417] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.134738][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.165854][ T417] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.175452][ T3322] veth1_macvtap: entered promiscuous mode [ 39.190238][ T417] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.202562][ T29] audit: type=1400 audit(1769616829.224:108): avc: denied { create } for pid=3497 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 39.233262][ T29] audit: type=1400 audit(1769616829.254:109): avc: denied { write } for pid=3497 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 39.235400][ T417] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.253350][ T29] audit: type=1400 audit(1769616829.254:110): avc: denied { nlmsg_write } for pid=3497 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 39.291019][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.317388][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.342107][ T417] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.358261][ T29] audit: type=1400 audit(1769616829.354:111): avc: denied { allowed } for pid=3503 comm="syz.2.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 39.377551][ T29] audit: type=1400 audit(1769616829.354:112): avc: denied { create } for pid=3503 comm="syz.2.11" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 39.398685][ T29] audit: type=1400 audit(1769616829.364:113): avc: denied { create } for pid=3503 comm="syz.2.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 39.418305][ T29] audit: type=1400 audit(1769616829.364:114): avc: denied { read write } for pid=3503 comm="syz.2.11" name="qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.441882][ T29] audit: type=1400 audit(1769616829.364:115): avc: denied { open } for pid=3503 comm="syz.2.11" path="/dev/qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.478145][ T417] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.487331][ T417] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.499391][ T417] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.508618][ T417] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.517610][ T417] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.589143][ T3519] vlan0: entered promiscuous mode [ 39.610040][ T3417] ================================================================== [ 39.618180][ T3417] BUG: KCSAN: data-race in __mod_timer / __mod_timer [ 39.624916][ T3417] [ 39.627273][ T3417] write to 0xffff88811a18c470 of 8 bytes by task 3409 on cpu 1: [ 39.634928][ T3417] __mod_timer+0x86a/0x9c0 [ 39.639399][ T3417] mod_timer+0x1f/0x30 [ 39.643510][ T3417] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 39.650765][ T3417] wg_packet_rx_poll+0x7f5/0x10f0 [ 39.655826][ T3417] __napi_poll+0x5f/0x310 [ 39.660188][ T3417] napi_threaded_poll_loop+0x1b9/0x630 [ 39.665727][ T3417] napi_threaded_poll+0x15f/0x1f0 [ 39.670794][ T3417] kthread+0x488/0x510 [ 39.674915][ T3417] ret_from_fork+0x148/0x280 [ 39.679545][ T3417] ret_from_fork_asm+0x1a/0x30 [ 39.684334][ T3417] [ 39.686695][ T3417] read to 0xffff88811a18c470 of 8 bytes by task 3417 on cpu 0: [ 39.694250][ T3417] __mod_timer+0x69/0x9c0 [ 39.698620][ T3417] mod_timer+0x1f/0x30 [ 39.702714][ T3417] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 39.709970][ T3417] wg_packet_tx_worker+0xeb/0x330 [ 39.715013][ T3417] process_scheduled_works+0x4cd/0x9d0 [ 39.720490][ T3417] worker_thread+0x6bc/0x8b0 [ 39.725098][ T3417] kthread+0x488/0x510 [ 39.729203][ T3417] ret_from_fork+0x148/0x280 [ 39.733832][ T3417] ret_from_fork_asm+0x1a/0x30 [ 39.738618][ T3417] [ 39.740983][ T3417] value changed: 0x00000000ffffa164 -> 0x00000000ffffa17e [ 39.748112][ T3417] [ 39.750450][ T3417] Reported by Kernel Concurrency Sanitizer on: [ 39.756627][ T3417] CPU: 0 UID: 0 PID: 3417 Comm: kworker/0:5 Not tainted syzkaller #0 PREEMPT(voluntary) [ 39.766542][ T3417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 39.776707][ T3417] Workqueue: wg-crypt-wg2 wg_packet_tx_worker [ 39.782912][ T3417] ================================================================== [ 39.829676][ T3526] capability: warning: `syz.2.13' uses deprecated v2 capabilities in a way that may be insecure