last executing test programs: 1.912166777s ago: executing program 0 (id=27): socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="05"], 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="050000000109"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0], 0x48}}, 0x40800) 1.834709673s ago: executing program 0 (id=29): pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r1, 0x6200}], 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x6, 0x1, "42341f9b1000007e4f0000001900"}) r2 = syz_open_pts(r1, 0x40000) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x0) 1.483601357s ago: executing program 1 (id=39): socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(0xffffffffffffffff, 0x8004550f, &(0x7f0000000100)=0xe) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0x1f400, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 1.462907879s ago: executing program 1 (id=41): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) timer_create(0x2, 0x0, &(0x7f0000bbdffc)) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8006, 0x6}, 0x12001, 0x10001, 0xda, 0x5, 0x3, 0x20007, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x10000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0x0}}, './file0\x00'}) fchown(r0, 0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="b501000000000000bd110000000000008510000002000000850000007600000095000000000000009500a5050000000077d8f3b4000000002be16ad10a48b243ccc40806d25dfd73a015e0ca7fc2506a0f68a7d06d75357f21699cdc6751dfb265a0e3ccae669e173a649c1cfd6587d472d64e7cc955d77578f4c35235138d5421f9453559c35da860e8ef14142b2a3e314422b854421eed734ceb1efeecb9c66854c3b3ffe1b4ce25d7c983c005c03b1d1ca4cb3e26e7a23129d6606fd28a697a9d552af6d9a9df2c3af333e2008e11bbec0727cb3f647535deb6277f5696833a71011a7d06602e2fd5234712596b696418f163d1a13ed38a682f87925bfa753f631cd027edd68149ee99eebc6f7d6dd4ae59af7588c8e1f4efab57644ccb1973d7879b70a70001040000000000000000d7900a820b63278f4e9a217b98ef7042ad2a923132f208fd8289eaf8cd00000000000009d27d753a300800000000000000a5686f2fccc33e3e34c3969c5ad781302d40e97a8ad10ce0cbe17366d5ac6af2fca2360a15b80400d52040ef7b28d300747877e176fe4c4b8e40dbf260f5a9f7eee30293c1b163b795d0aef4deb851a30000f569dc8f39943f889008e1ec914faa9e6cd0b3b4b3b5db666ebeb49d6a62019d76459e70b459543c4ac42e53b4ad4c77cff373ebd95848f01864e456969cd28000170996016aceb583df5ee4dd722e8c350af489f9a900000000a0dcc391a65c674a9cce0439f832a20d7cbdcda5dff3ba92dd66afb9dcd3e7784dbea1e51a15b0f1a040cc63177f8fafa3192fc8e5552da1a982ab8dfe31ad1a0968faa47c2069d6bf09c3aa4f0fc128cb578d99b08a150b4cc4b22f6a464c6398c952519818a44a1b450ff502df87865c276588ea478e328e8277e811b99ce1acfecaf8e2c55ccc4b8eae0a61635514e99ffd438784060f23ba74c0b30b1180d935832deb686d789ba1d436d116394534e88492a42b8bcab12fcc661a2dc50b3a1dcfbc871e5c27e3d7260f6fa589e40000b89db451ff994845f6b49c12e89291398bcb3c06ef1289f74e0b0e2cab592d35f82a69e7284223a171c616b1f0fee6c4711d7aecb69746064d2c096554975d605ebe646302bf3d5cf32a9a09915ae3f3d4eb96615d7b237da56cd5e9904a19e145f25b6d98eb2c019967f553b61d0e80d6913cee9f8d18469a654a239a84a85debbc0284c5a5d51f0e115ab159e3b513a68284d2efc30587e433431b2896a3bd48020af67e9ac071b2dd6dc3b9efae4ff03558fa619aea909c7f2416e7e7da1c51ccc7e6ac27412f728dc6d80da8adf317ca863ed683897321f8c8bb5a5d953d6783b7a06353ee496bbdff418de3e53234df87756eb99e330253cf5da4aa1a9648a38f07e2d302b4165983db4f7b8972923fffa8c03c288512a3a38fbd7c816a44634f7a03fab30811b7b93257bea4369ba46024dee5e9b0b2c3d3324e9b7c1f99ab9bb3f498b1485373b79ec84a67dad4e37575dab87ce55a9a69ed856a4c4410d1242ac1bd1539094a641cc086c2c53e363beafc74ab4e9ff320373705cbf5644586ffe60d293944fa2d9dc18b55f1af5c42f27747bef1ffd0c1766f062d47d61bf9f64e6ee288fa7fc12d48da526527b9f5c318c93ec447cb8b5eee7aa8a1e85696af3dfef96657c0545c8ebd96528d9c28828e5befd80d684b03b6d153da3e3cbd3bfbf4a9375b8ad04a1d241bcb775505cb6cc7a44e2e24bd0b1ca4879caaff59d0ce39dc7f3fea447f4e46967855208e63ec988bd2692afefbed2b001205e4b30ee8fe417defa566a73ace8f01f7181de0ef25f1744896a3c38859e6148c42454949cd64b1a888e7fe9c2d86bb01023b6dde4ab67f5eb038af3e460c771518a4126c338b0390d459361e03adf6e6b558b3651a0e33d101b5febfff82794203da18db6fcf89715c2d338f78d8b9220171b418528f857a7cb79ca990de1208777e13faaa9b9cb9e67797b07d9eb9e909410b50c5d981d9a72aa36498b630519d1530ef0000000000000000000037fcffffffffffffff8db8379bd2044c652dff399a9f8bfa4e9c507f049d18837464276830461ee203ba51f6102d262fc9a26bc3638ecce24e65c55da6efaa462f03e0d36c62785f32ecc294a8c7a522b59f5a7b44d018cb2648383073d9e032492cae44350bc0a85697f431392eb22cae093e85954af97d6d7b2e6e8f43353062275ad1578a431594243452a2bfb89f91d8eaac00000000000080014573789425c4c22da528d89356aa6d2ae6da082e756c80cf39053431080ea6cbf9997a5a0ddad0b9d12bc3f880476ab32f0feaac5f16e61f7b72b8c9082eec423c6b3eaecfdcc9ec72795e7696421c83b76c2d6bac19bc875d009679778d8ef97d7e05329649d97b0dc54bea9b650873de2d3d702690176e0b23ee5cb5e469a8d1612d611722e6200e3a297d92f8e1de98326c5ef2b89d4e2d47767c0700783e5d865e373338e96ceb8399f296c59b2d70ca27735ecaff62982616d3ac1ab041733bce119d8002a6c8a2b08b32551b2313b1a2ff41b3f04af61c69c85cb2da48215727271bac2ffdeb62d9f5dc4845f1c3f63dc806e615ee8d28d6d7f181e30807afa27f41d0364c746a65a47464db68f3c433d88dd625db35fded2c86d75af88efaf20c8b37c644b6c4e773a9589200faa553bc92f916b75ddbfa18ab73979f46947b35914286d2499a0b8c970000000000000000f4fe74e0c26ab52329bd600627b256ca44dd121ffc8dbb6e5f70cbe03efccac70375b30cc927574d254d1b46c607e8b1ca7d1511568c4d885723734a3ef4b6b885f4582bdcef74e5e010627fc8e4fe00000000000000000000869d9640f06b11df2971909b90133983308ea4f033de613763f32d913bcbe9dd082a6fff197a20730269e6cfd31275395833f1c2b8a50a94c30cceae2a11fe9b9b835d0da73891c0b3ce22dea6bf31e7f51808cf72f44b4455b77a778440795e152dc1b7bb0a5636aa4742ce4d331a47de5836539cdf289176527277b70c8162aaf6f9475418b478329f3565450acfaf07000000eab8cabfa97e35081967bb92a264b07e8003d2f15537e72a1e4ca5ec1e2aaaf8236ecdefbaf512c75e636b6b6f518ad20521f909b12e9bc97e408e0dc82f950d12705f35708bc862196abb27e8d7991b5273987f38c4706289ff4f6130cee76465d487a07a74452f87da2029bd3debd9870335d58d3fe1ac809c227aa25842f75981bc6f569ffdb10ba3f20a86d95128d13e0c778998d3b3114bfb07bd61e4bff8a5e2ce4aa572c63e09b44ca4a181bcfe4eec3ce843c65c4948169fe639a186acc2b4a96c6b8d4d2e6d53ab97bea01eab953e6e89e3af34d4ada217bc6fda0fb2095c49195d0d6f365ca80a955b9ec81240a84ef672afa369fcd097728955cf04fec692b01fadfc8e3d444ba35d0f51a0065a3b982d09dfc6874fc0d8079b185447cb8a695e132d4d613a529d9c77e2a8f7320ecf698e8a2b170fd601dc1a9767a38b10788e92d1356f6a6c1bcfb2d31b46e735db13f1be80bac1b6be04fd98610000000000000000000000000000139af5493f74751c5e2501a4936bc4a0fa516117f4ccadc692003adee0a080eba2f1059660c0ee0e9aec72d4d0fe095632e4f641b0e34c611c5b3e0ba05fa36542d40837dda323910672a9097d68398fd3539686e4288db0d6bf7cb8a1835f46dfe11865a66ef47e736dada06677a5bca133d6cbc8fe5c4557e51b006bdccd7c5f32ff1d9e8b130f77df09236870fb3de5b87b4f8acc13df534eba329b86670000000000000000b27a2616c03cdf6c009447a652bca9b325e73c0737d5b717945e4fe7a169c5e2c54fc71a4104aa7cf0f5d30e2fcd9503650edbd8a5971a9a1fde5e5df37469ae204a6e899eacc1e63034cbabc5604739881cb82604bed3e53696a0606b26b879ef232a1a038291389593d1575cb79aa8284cf01a7e1a456acab9d8d608ad69d4c4b56492af7004e7ed9d47c5db3d76a00bea7c804f3a3638408bc1636f1009b7f185f51606918eaa0ab61a19"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) 1.457141719s ago: executing program 2 (id=42): r0 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x18d03e, 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0xc2802, 0x100) ftruncate(r2, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2b, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) fallocate(r0, 0x0, 0x0, 0x400001) 1.340376037s ago: executing program 1 (id=43): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$tun(r0, &(0x7f0000000280)={@val={0x6f01, 0x800}, @val={0x1, 0x0, 0x27, 0x0, 0x27}, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x5, 0xb, 0x0, 0x0, 0x0, 0x28, {[@window={0x9, 0xfffffffffffffec4}, @timestamp={0x5, 0x2, 0x0, 0x700}, @generic={0x0, 0x2, "d58838000391"}]}}}}}}, 0xfd6c) 1.309357899s ago: executing program 2 (id=45): setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x298, 0x0, 0x168, 0x9, 0x0, 0xb, 0x250, 0x250, 0x250, 0x250, 0x250, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth0_to_bridge\x00', 'sit0\x00', {}, {}, 0x6c}, 0x6000000, 0xa8, 0xf0, 0x0, {0x0, 0x28e}}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast2, 'dvmrp0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{}, {0x2}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2f8) pselect6(0x40, &(0x7f0000000040)={0xc}, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0x8087, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 1.198805807s ago: executing program 2 (id=48): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) membarrier(0x10, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0}) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r1, 0x3, r2, 0x3, 0x80000}) 1.15095519s ago: executing program 3 (id=49): r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000100)='reno\x00', 0x5) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@cgroup=r2, r1, 0x12, 0x0, 0x0, @void, @value=0x0}, 0x20) write$tcp_congestion(r0, &(0x7f0000000300)='reno\x00', 0x5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@cgroup=r2, r1, 0x12, 0x0, 0x0, @void, @value=0x0}, 0x20) write$tcp_congestion(r0, &(0x7f0000000380)='reno\x00', 0x5) 1.135965501s ago: executing program 3 (id=50): semget$private(0x0, 0x4000, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffb, 0x1, @perf_config_ext={0x3fffffffc, 0xfffffffffffffffd}, 0x0, 0x3, 0x80, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x863, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x3, 0x4) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendto$inet(r0, &(0x7f0000000040)="0400", 0xffec, 0x0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) 1.108166413s ago: executing program 3 (id=51): unshare(0x6000400) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002ac0)={'syztnl0\x00', &(0x7f0000002a40)={'syztnl1\x00', 0x0, 0x4, 0x2, 0x8, 0x9, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x80, 0x10, 0xe, 0x8}}) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0xfd67, &(0x7f0000001400), 0x1}}], 0x4000210, 0x10002, 0x0) poll(&(0x7f00000002c0)=[{r0, 0x8504}], 0x1, 0xfffffffb) 1.093780674s ago: executing program 3 (id=52): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c00000015006b0300224ed86e6c1d0002117ea6e070d6064e22000300000001250002000f00000017d34460bc24eab556a705251e6182949a00003d3b48dfd8cdbf9767b4fa51f62a64c9f4060046d88037e786a6d0a5d700000017", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 1.071150536s ago: executing program 3 (id=53): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socket$packet(0x11, 0x2, 0x300) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000340)={0x14, r2, 0x4196ccce67868bab, 0x70bd2c}, 0x14}, 0x1, 0x0, 0x0, 0x20040890}, 0x4044) 1.043298998s ago: executing program 3 (id=54): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x28000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000005c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000b4bffc)=0x10, 0x4) write(r0, &(0x7f0000000000)='\"', 0x1) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 948.314224ms ago: executing program 0 (id=55): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x34328, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0xfffffff8, 0x3, 0x100008, 0x20007, 0x1, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)=0x0) timer_settime(r1, 0x1, &(0x7f0000000140)={{0x77359400}, {0x0, 0x3938700}}, 0x0) 775.138566ms ago: executing program 0 (id=56): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)=@newsa={0x138, 0x10, 0x1, 0x70bd2b, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@local, 0x1, 0x794, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x9, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x1f, 0x1ff}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0x2, 0x1, 0xfd, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8881}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=@newsa={0x138, 0x10, 0x1, 0xbffffffe, 0x100, {{@in=@empty, @in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x1, 0x394, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@remote, {0x0, 0x9, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0x6, 0x0, 0x1f, 0x1ff}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0xa, 0x1, 0xfd, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x10) socket$key(0xf, 0x3, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newsa={0x138, 0x18, 0x1, 0xfffffffe, 0x100, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x71c, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@dev={0xac, 0x14, 0x14, 0x25}, {0x0, 0x192, 0x9ba3, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffa, 0xfffffffc}, 0x80, 0x3500, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) 719.80076ms ago: executing program 0 (id=57): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1342, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 497.934895ms ago: executing program 0 (id=58): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x1, 0x0, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000000)={0x1, 0x0, 0x4}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) preadv(r3, &(0x7f0000004ec0)=[{&(0x7f0000004bc0)=""/68, 0x44}], 0x1, 0x8000, 0x0) 405.377822ms ago: executing program 4 (id=59): r0 = socket(0x2d, 0x2, 0x0) bind$xdp(r0, &(0x7f0000000080)={0x2d, 0x0, 0x0, 0xc}, 0x10) r1 = socket(0x2d, 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) bind$xdp(r1, &(0x7f0000000080)={0x2d, 0x0, r3, 0xc}, 0x10) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r4, 0xffffffffffffffff, 0x0) 369.848964ms ago: executing program 4 (id=60): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, '\x00\x00'}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="40000000210a018800000000000000000a0000010900020073797a31000000000900010073797a310000000014000380100000800c000180060001"], 0x40}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) 339.255576ms ago: executing program 2 (id=61): perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x22, 0x0, 0x9, 0x4, 0x0, 0x5, 0xa16ae, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x8884, 0xa2, 0x101, 0x7, 0x7f, 0x9b9c, 0x6, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x1) keyctl$set_reqkey_keyring(0xe, 0x7) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000200000000000000000000000000000a030000000000000000000002"], 0x0, 0x56}, 0x20) pipe2(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x1a, 0x4, 0x0, 0x1, 0x8000, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @value=r0}, 0x50) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) readv(r1, 0x0, 0x0) 288.62042ms ago: executing program 2 (id=62): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg(r1, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000002c0)=""/34, 0x56}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r3, &(0x7f0000000440)}, 0x20) 279.58824ms ago: executing program 4 (id=63): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, 0x0, &(0x7f0000000180)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\v\x00'], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2280, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff2) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) close(0x3) 243.816683ms ago: executing program 1 (id=64): sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xd, 0x2}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000700), 0x0) read(r1, &(0x7f0000000200)=""/202, 0xca) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x4058534c, &(0x7f00000003c0)={0x80, 0x1, {0x3, 0x3, 0x8b2c, 0x3, 0x2c7}}) tkill(r0, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f00000000c0)) 182.069447ms ago: executing program 4 (id=65): unshare(0x20000400) r0 = getpid() r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x10009, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x8, 0x100}, 0x204, 0x0, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) setuid(0xee01) r3 = syz_pidfd_open(r0, 0x0) setns(r3, 0x24020000) 83.078694ms ago: executing program 4 (id=66): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x10000) r4 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="10010000", @ANYRES16=r1, @ANYBLOB="050427bd7000fedbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="f400028061000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004"], 0x110}, 0x1, 0x0, 0x0, 0x4000401}, 0x2404c080) 57.214776ms ago: executing program 2 (id=67): socket$inet6_tcp(0xa, 0x1, 0x0) socket$qrtr(0x2a, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, 0x0}, 0x68) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4004045) r0 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0x0, 0x399}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xa}, 0x1c) io_uring_enter(r0, 0x8ae, 0x6933, 0x17, 0x0, 0xeffd) 23.336498ms ago: executing program 1 (id=68): io_uring_setup(0x167c, &(0x7f00000003c0)={0x0, 0x800000, 0x0, 0x2, 0x131}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='cmdline\x00') fcntl$setstatus(r0, 0x4, 0x40800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 5.148729ms ago: executing program 4 (id=69): r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x6, 0x4, 0xfff, 0x7, 0x88}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 0s ago: executing program 1 (id=70): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) pipe(0x0) dup2(0xffffffffffffffff, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000080), &(0x7f0000000240)=r2}, 0x20) prctl$PR_SET_THP_DISABLE(0x29, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x501, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x50) kernel console output (not intermixed with test programs): [ 19.724117][ T28] audit: type=1400 audit(1775849635.909:62): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.746256][ T28] audit: type=1400 audit(1775849635.909:63): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.770486][ T28] audit: type=1400 audit(1775849635.909:64): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.793663][ T28] audit: type=1400 audit(1775849635.909:65): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.817525][ T28] audit: type=1400 audit(1775849635.909:66): avc: denied { read open } for pid=3193 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.62' (ED25519) to the list of known hosts. [ 24.522473][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 24.522488][ T28] audit: type=1400 audit(1775849640.699:70): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.551481][ T28] audit: type=1400 audit(1775849640.729:71): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.552282][ T3298] cgroup: Unknown subsys name 'net' [ 24.579126][ T28] audit: type=1400 audit(1775849640.759:72): avc: denied { unmount } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.733988][ T3298] cgroup: Unknown subsys name 'cpuset' [ 24.740105][ T3298] cgroup: Unknown subsys name 'rlimit' [ 24.869512][ T28] audit: type=1400 audit(1775849641.049:73): avc: denied { setattr } for pid=3298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.893362][ T28] audit: type=1400 audit(1775849641.049:74): avc: denied { create } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.913959][ T28] audit: type=1400 audit(1775849641.049:75): avc: denied { write } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.921069][ T3302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.934557][ T28] audit: type=1400 audit(1775849641.049:76): avc: denied { read } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.963582][ T28] audit: type=1400 audit(1775849641.059:77): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 24.984735][ T28] audit: type=1400 audit(1775849641.059:78): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.009556][ T28] audit: type=1400 audit(1775849641.059:79): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.025410][ T3298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.074714][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 26.163673][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.170881][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.178191][ T3308] bridge_slave_0: entered allmulticast mode [ 26.184792][ T3308] bridge_slave_0: entered promiscuous mode [ 26.193237][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.200385][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.207832][ T3308] bridge_slave_1: entered allmulticast mode [ 26.214326][ T3308] bridge_slave_1: entered promiscuous mode [ 26.223151][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 26.250875][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 26.265565][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.279707][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.318243][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 26.336230][ T3308] team0: Port device team_slave_0 added [ 26.349643][ T3308] team0: Port device team_slave_1 added [ 26.384646][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 26.401808][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.408841][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.435227][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.450098][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.457295][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.483470][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.503517][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.510678][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.517860][ T3318] bridge_slave_0: entered allmulticast mode [ 26.524493][ T3318] bridge_slave_0: entered promiscuous mode [ 26.538121][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.545355][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.552431][ T3310] bridge_slave_0: entered allmulticast mode [ 26.558942][ T3310] bridge_slave_0: entered promiscuous mode [ 26.573972][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.581154][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.588446][ T3318] bridge_slave_1: entered allmulticast mode [ 26.594843][ T3318] bridge_slave_1: entered promiscuous mode [ 26.614563][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.621654][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.628906][ T3310] bridge_slave_1: entered allmulticast mode [ 26.635262][ T3310] bridge_slave_1: entered promiscuous mode [ 26.641722][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.649042][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.656192][ T3315] bridge_slave_0: entered allmulticast mode [ 26.662657][ T3315] bridge_slave_0: entered promiscuous mode [ 26.669176][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.676259][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.683648][ T3315] bridge_slave_1: entered allmulticast mode [ 26.690172][ T3315] bridge_slave_1: entered promiscuous mode [ 26.708504][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.723147][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.742203][ T3308] hsr_slave_0: entered promiscuous mode [ 26.748185][ T3308] hsr_slave_1: entered promiscuous mode [ 26.765975][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.783090][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.793255][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.803388][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.824893][ T3318] team0: Port device team_slave_0 added [ 26.843033][ T3315] team0: Port device team_slave_0 added [ 26.849716][ T3315] team0: Port device team_slave_1 added [ 26.856177][ T3318] team0: Port device team_slave_1 added [ 26.866003][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.873100][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.880250][ T3314] bridge_slave_0: entered allmulticast mode [ 26.886877][ T3314] bridge_slave_0: entered promiscuous mode [ 26.897922][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.905108][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.912347][ T3314] bridge_slave_1: entered allmulticast mode [ 26.919060][ T3314] bridge_slave_1: entered promiscuous mode [ 26.934280][ T3310] team0: Port device team_slave_0 added [ 26.943024][ T3310] team0: Port device team_slave_1 added [ 26.961250][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.968314][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.995117][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.019335][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.026436][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.052658][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.063789][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.070816][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.097120][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.115274][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.124766][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.131791][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.158045][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.175992][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.183221][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.209173][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.222951][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.237011][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.244253][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.270548][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.293898][ T3314] team0: Port device team_slave_0 added [ 27.300835][ T3314] team0: Port device team_slave_1 added [ 27.334149][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.341202][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.367816][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.387441][ T3318] hsr_slave_0: entered promiscuous mode [ 27.393729][ T3318] hsr_slave_1: entered promiscuous mode [ 27.399519][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 27.405311][ T3318] Cannot create hsr debugfs directory [ 27.416083][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.423038][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.449406][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.464837][ T3315] hsr_slave_0: entered promiscuous mode [ 27.470973][ T3315] hsr_slave_1: entered promiscuous mode [ 27.476930][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 27.482652][ T3315] Cannot create hsr debugfs directory [ 27.506143][ T3310] hsr_slave_0: entered promiscuous mode [ 27.512072][ T3310] hsr_slave_1: entered promiscuous mode [ 27.518017][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 27.523759][ T3310] Cannot create hsr debugfs directory [ 27.562241][ T3314] hsr_slave_0: entered promiscuous mode [ 27.568507][ T3314] hsr_slave_1: entered promiscuous mode [ 27.574613][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 27.580431][ T3314] Cannot create hsr debugfs directory [ 27.637936][ T3308] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 27.660000][ T3308] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 27.670996][ T3308] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 27.696372][ T3308] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 27.767921][ T3310] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 27.785790][ T3310] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 27.794531][ T3310] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 27.805198][ T3310] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 27.838214][ T3318] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 27.855781][ T3318] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 27.864934][ T3318] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 27.876985][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.886798][ T3318] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 27.923913][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 27.932909][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 27.945331][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 27.953143][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 27.963675][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 27.978745][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.985915][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.004657][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.011940][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.029179][ T3314] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.042203][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.051792][ T3314] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.060927][ T3314] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.070106][ T3314] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.098463][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.120044][ T250] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.127174][ T250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.139229][ T250] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.146567][ T250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.175212][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.192755][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.212239][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.224005][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.231171][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.249737][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.256908][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.282484][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.295805][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.317453][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.324622][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.345622][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.354460][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.361520][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.397176][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.406689][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.423179][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.430363][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.458082][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.476559][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.483909][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.534558][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.560158][ T3308] veth0_vlan: entered promiscuous mode [ 28.578264][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.593118][ T3308] veth1_vlan: entered promiscuous mode [ 28.614259][ T3308] veth0_macvtap: entered promiscuous mode [ 28.644970][ T3308] veth1_macvtap: entered promiscuous mode [ 28.677161][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.702254][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.725336][ T30] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.734238][ T30] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.744341][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.754963][ T3310] veth0_vlan: entered promiscuous mode [ 28.763992][ T30] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.772972][ T30] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.789004][ T3315] veth0_vlan: entered promiscuous mode [ 28.798984][ T3315] veth1_vlan: entered promiscuous mode [ 28.812876][ T3318] veth0_vlan: entered promiscuous mode [ 28.819149][ T3310] veth1_vlan: entered promiscuous mode [ 28.836026][ T3310] veth0_macvtap: entered promiscuous mode [ 28.855181][ T3318] veth1_vlan: entered promiscuous mode [ 28.864533][ T3310] veth1_macvtap: entered promiscuous mode [ 28.882008][ T3308] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.887643][ T3315] veth0_macvtap: entered promiscuous mode [ 28.906100][ T3315] veth1_macvtap: entered promiscuous mode [ 28.924253][ T3318] veth0_macvtap: entered promiscuous mode [ 28.933833][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.949327][ T3318] veth1_macvtap: entered promiscuous mode [ 28.959709][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.984565][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.000103][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.015820][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.028011][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.046304][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.075893][ T30] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.085148][ T30] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.101502][ T3314] veth0_vlan: entered promiscuous mode [ 29.111164][ T30] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.120434][ T30] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.131461][ T3314] veth1_vlan: entered promiscuous mode [ 29.167362][ T30] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.176730][ T30] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.201757][ T30] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.210755][ T30] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.230179][ T3487] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5'. [ 29.244294][ T3314] veth0_macvtap: entered promiscuous mode [ 29.251597][ T3314] veth1_macvtap: entered promiscuous mode [ 29.270826][ T30] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.280238][ T30] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.293848][ T30] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.303010][ T3487] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5'. [ 29.335657][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.353113][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.365878][ T40] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.375583][ T40] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.416153][ T30] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.429978][ T30] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.524989][ T3511] netlink: 28 bytes leftover after parsing attributes in process `syz.3.13'. [ 29.534013][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 29.534025][ T28] audit: type=1400 audit(1775849645.709:141): avc: denied { create } for pid=3507 comm="syz.4.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.575968][ T3511] netlink: 28 bytes leftover after parsing attributes in process `syz.3.13'. [ 29.595011][ T28] audit: type=1400 audit(1775849645.709:142): avc: denied { connect } for pid=3507 comm="syz.4.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.629657][ T28] audit: type=1400 audit(1775849645.709:143): avc: denied { read } for pid=3507 comm="syz.4.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.652787][ T28] audit: type=1400 audit(1775849645.759:144): avc: denied { write } for pid=3507 comm="syz.4.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.692621][ T3516] loop3: detected capacity change from 0 to 1024 [ 29.696349][ T28] audit: type=1400 audit(1775849645.759:145): avc: denied { create } for pid=3512 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.712425][ T3516] ======================================================= [ 29.712425][ T3516] WARNING: The mand mount option has been deprecated and [ 29.712425][ T3516] and is ignored by this kernel. Remove the mand [ 29.712425][ T3516] option from the mount to silence this warning. [ 29.712425][ T3516] ======================================================= [ 29.726359][ T28] audit: type=1400 audit(1775849645.769:146): avc: denied { connect } for pid=3512 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.778275][ T28] audit: type=1400 audit(1775849645.769:147): avc: denied { setopt } for pid=3512 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.800177][ T3516] EXT4-fs (loop3): can't mount with data=, fs mounted w/o journal [ 29.812160][ T28] audit: type=1400 audit(1775849645.769:148): avc: denied { bind } for pid=3512 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.831888][ T3523] netlink: 36 bytes leftover after parsing attributes in process `syz.2.16'. [ 29.868771][ T28] audit: type=1400 audit(1775849645.769:149): avc: denied { write } for pid=3512 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.894477][ T28] audit: type=1400 audit(1775849645.829:150): avc: denied { read } for pid=3512 comm="syz.2.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 29.965155][ C1] hrtimer: interrupt took 37867 ns [ 30.021062][ T3531] capability: warning: `syz.4.21' uses deprecated v2 capabilities in a way that may be insecure [ 30.176296][ T3533] loop4: detected capacity change from 0 to 512 [ 30.221281][ T3538] netlink: 8 bytes leftover after parsing attributes in process `syz.0.24'. [ 30.236423][ T3543] IPVS: sync thread started: state = BACKUP, mcast_ifn = vcan0, syncid = 0, id = 0 [ 30.285414][ T3533] FAT-fs (loop4): Directory bread(block 199916) failed [ 30.294850][ T3533] FAT-fs (loop4): Directory bread(block 199917) failed [ 30.304573][ T3533] FAT-fs (loop4): Directory bread(block 199918) failed [ 30.312337][ T3533] FAT-fs (loop4): Directory bread(block 199919) failed [ 30.322788][ T3533] FAT-fs (loop4): Directory bread(block 199920) failed [ 30.330982][ T3533] FAT-fs (loop4): Directory bread(block 199921) failed [ 30.341489][ T3533] FAT-fs (loop4): Directory bread(block 199922) failed [ 30.357996][ T3533] FAT-fs (loop4): Directory bread(block 199923) failed [ 30.681096][ T3570] netlink: 32 bytes leftover after parsing attributes in process `syz.3.37'. [ 30.775896][ T3579] mmap: syz.1.41 (3579) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 30.821027][ T3533] FAT-fs (loop4): FAT read failed (blocknr 128) [ 30.879302][ T3585] syz.1.43 uses obsolete (PF_INET,SOCK_PACKET) [ 31.058761][ T3602] raw_sendmsg: syz.3.50 forgot to set AF_INET. Fix it! [ 31.432778][ T3618] netlink: 64 bytes leftover after parsing attributes in process `syz.0.56'. [ 31.517219][ T3620] tipc: Started in network mode [ 31.522528][ T3620] tipc: Node identity 6ad8904ab48f, cluster identity 4711 [ 31.530110][ T3620] tipc: Enabled bearer , priority 0 [ 31.562029][ T3620] syzkaller0: entered promiscuous mode [ 31.567683][ T3620] syzkaller0: entered allmulticast mode [ 31.574369][ T3620] tipc: Resetting bearer [ 31.581715][ T30] tipc: Resetting bearer [ 31.595372][ T3619] tipc: Resetting bearer [ 31.608879][ T3619] tipc: Disabling bearer [ 32.117566][ T3644] netlink: 41 bytes leftover after parsing attributes in process `syz.4.66'. [ 32.133062][ T3644] netlink: 116 bytes leftover after parsing attributes in process `syz.4.66'. [ 32.220311][ T3651] ================================================================== [ 32.228690][ T3651] BUG: KCSAN: data-race in bq_flush_to_queue / cpu_map_kthread_run [ 32.236590][ T3651] [ 32.238916][ T3651] write to 0xffff8881052fe240 of 8 bytes by task 3653 on cpu 0: [ 32.246627][ T3651] cpu_map_kthread_run+0x4fe/0x1680 [ 32.251835][ T3651] kthread+0x22a/0x280 [ 32.255971][ T3651] ret_from_fork+0x150/0x360 [ 32.260738][ T3651] ret_from_fork_asm+0x1a/0x30 [ 32.265497][ T3651] [ 32.267810][ T3651] read to 0xffff8881052fe240 of 8 bytes by task 3651 on cpu 1: [ 32.275342][ T3651] bq_flush_to_queue+0x124/0x360 [ 32.280367][ T3651] __cpu_map_flush+0x47/0xa0 [ 32.285036][ T3651] xdp_do_flush+0xf8/0x160 [ 32.289465][ T3651] bpf_test_run_xdp_live+0xe8a/0x1360 [ 32.294858][ T3651] bpf_prog_test_run_xdp+0x57b/0xa10 [ 32.300235][ T3651] bpf_prog_test_run+0x204/0x340 [ 32.305167][ T3651] __sys_bpf+0x52e/0x7e0 [ 32.309429][ T3651] __x64_sys_bpf+0x41/0x50 [ 32.313939][ T3651] x64_sys_call+0x10cb/0x3020 [ 32.318709][ T3651] do_syscall_64+0x12c/0x370 [ 32.323311][ T3651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.329356][ T3651] [ 32.331684][ T3651] value changed: 0xffff88811bcb8070 -> 0x0000000000000000 [ 32.338880][ T3651] [ 32.341206][ T3651] Reported by Kernel Concurrency Sanitizer on: [ 32.347375][ T3651] CPU: 1 UID: 0 PID: 3651 Comm: syz.1.70 Not tainted syzkaller #0 PREEMPT(full) [ 32.356660][ T3651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 32.366804][ T3651] ==================================================================