last executing test programs: 957.719186ms ago: executing program 2 (id=3): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x1c) 823.419478ms ago: executing program 0 (id=1): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000040)='fib6_table_lookup\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r4, &(0x7f0000000180)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x280020}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x14004841) 769.608529ms ago: executing program 2 (id=6): r0 = socket(0x10, 0x803, 0x0) r1 = syz_io_uring_setup(0xef, &(0x7f0000000500)={0x0, 0xdeef, 0x10100, 0x0, 0xfffffffd}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socket(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) lsm_set_self_attr(0x64, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a0000010500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan1\x00', 0x0}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYRESHEX=r0], &(0x7f00000004c0)=""/54, 0x63, 0x36, 0x0, 0x7, 0x10000, @value=r0}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r6, @ANYBLOB='\r\x00'/20, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="03000000040000009900"/28], 0x50) r11 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_IO(r11, 0x2285, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) write$sndseq(r12, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote}], 0x38) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) write$sndseq(r12, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32={[0x0, 0x0, 0xffffffff]}}, {0x0, 0x0, 0x0, 0x0, @time={0x5, 0x6}, {}, {}, @ext={0x0, 0x0}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@tick=0x9}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @control}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @time, {0x0, 0x7}, {}, @connect={{0x6, 0x7}, {0xb2, 0xd8}}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0xc4) ioctl$SG_GET_REQUEST_TABLE(r12, 0x2286, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0xfffffffffffffe54, 0x0}}) io_uring_enter(r1, 0x27e2, 0x0, 0x0, 0x0, 0x0) 701.5343ms ago: executing program 0 (id=7): r0 = socket$kcm(0x11, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') read(r1, &(0x7f0000000b00)=""/193, 0xc1) close(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rt_sigpending(0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="08000000074abd61b5928a2e0a2000000000000056b180257e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x35) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000001010000000000008000000000003998", @ANYRES32, @ANYBLOB="ca9000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000006d0000001c00"/28, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r6, 0x8910, &(0x7f0000000000)={'vlan0\x00', @ifru_ivalue=0x7}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000170000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='kmem_cache_free\x00', r8}, 0x10) rename(&(0x7f0000000140)='./file1\x00', 0x0) ioctl$sock_netdev_private(r6, 0x8914, &(0x7f0000000000)) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000001340)=@hci={0x1f, 0xdd86, 0x2c}, 0x80, 0x0}, 0x4004021) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r4, 0x58, &(0x7f0000000480)}, 0x10) 667.573191ms ago: executing program 1 (id=2): r0 = socket(0x10, 0x803, 0x0) r1 = syz_io_uring_setup(0xef, &(0x7f0000000500)={0x0, 0xdeef, 0x10100, 0x0, 0xfffffffd}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socket(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) lsm_set_self_attr(0x64, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a0000010500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan1\x00', 0x0}) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYRESHEX=r0], &(0x7f00000004c0)=""/54, 0x63, 0x36, 0x0, 0x7, 0x10000, @value=r0}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r6, @ANYBLOB='\r\x00'/20, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="03000000040000009900"/28], 0x50) r11 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_IO(r11, 0x2285, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) write$sndseq(r12, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote}], 0x38) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) write$sndseq(r12, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32={[0x0, 0x0, 0xffffffff]}}, {0x0, 0x0, 0x0, 0x0, @time={0x5, 0x6}, {}, {}, @ext={0x0, 0x0}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@tick=0x9}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @control}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @time, {0x0, 0x7}, {}, @connect={{0x6, 0x7}, {0xb2, 0xd8}}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0xc4) ioctl$SG_GET_REQUEST_TABLE(r12, 0x2286, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0xfffffffffffffe54, 0x0}}) io_uring_enter(r1, 0x27e2, 0x0, 0x0, 0x0, 0x0) 591.978242ms ago: executing program 3 (id=4): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x1c) 536.991683ms ago: executing program 0 (id=8): ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0/../file0\x00'}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb01001800000000000000a0000000a000000008000000000000000800000d0000000002000000050000000c0000000100000002000000010000000d0000000100000006000000030000030c000000020000000e00000004000000080000000500000006000000040000930e0000000e00000004000000040000007f000000080000000400000007000000070000000600000009000000100400000900000010000000010000840600000008000000000000003b00000000305f61305f5f00"], &(0x7f0000000780)=""/211, 0xc0, 0xd3, 0xc, 0xe9, 0x10000, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffff001, 0x0, 0x0, 0x0, 0x6}, [@map_idx_val={0x18, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @generic={0xae, 0x9, 0x3, 0x2, 0x1000}]}, &(0x7f0000000340)='syzkaller\x00', 0x400, 0xe8, &(0x7f00000004c0)=""/232, 0x41100, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x1, 0xe, 0x1ff, 0xffff}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f00000005c0)=[{0x5, 0x2, 0x2, 0x6}, {0x3, 0x1, 0xd, 0x4}], 0x10, 0x6, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffc}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) pivot_root(&(0x7f0000000000)='.\x00', &(0x7f0000000080)='./file0/../file0\x00') 512.706473ms ago: executing program 3 (id=9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000100)="01d94e", 0x3, 0x14, 0x0, 0x0) shutdown(r0, 0x1) 432.835824ms ago: executing program 0 (id=10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_uring_setup(0xaab, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)='g', 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0x398, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='cdg\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000001280)="$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") truncate(0x0, 0x40) shutdown(r0, 0x1) 327.576375ms ago: executing program 1 (id=11): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_usb_connect(0x0, 0x5f, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000b1f203401e0903003bd7010203010902"], 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x80) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty, 0xffffffff}, 0x1c) 279.778306ms ago: executing program 2 (id=12): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x8, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x80040) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 239.240617ms ago: executing program 4 (id=5): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x60, 0x7, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) r2 = socket(0x200000000000011, 0x2, 0x0) bind$packet(r2, &(0x7f0000000080)={0x11, 0x802, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x32, &(0x7f00000002c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0000000000000802"], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x200}) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) accept4(r4, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000300)=0x80, 0x800) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x4000, r1}, 0x18) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000200)=r5, 0x4) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 108.746989ms ago: executing program 2 (id=13): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x24, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x0) 86.852539ms ago: executing program 0 (id=14): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000003c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) 0s ago: executing program 2 (id=15): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000004000000000010000000900010073797a30000000000900030073797a30000000006c000000060a010400000000000000000100000008000b400000000044000480400001800e000100627974656f726465720000002c000280080002400000000008000540000000000800034000000007080001401000000015a68fb8"], 0xe0}}, 0x240448d0) kernel console output (not intermixed with test programs): [ 21.638906][ T29] audit: type=1400 audit(1743402899.087:81): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.57' (ED25519) to the list of known hosts. [ 25.755212][ T29] audit: type=1400 audit(1743402903.197:82): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.756341][ T3292] cgroup: Unknown subsys name 'net' [ 25.777947][ T29] audit: type=1400 audit(1743402903.197:83): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.805377][ T29] audit: type=1400 audit(1743402903.237:84): avc: denied { unmount } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.956441][ T3292] cgroup: Unknown subsys name 'cpuset' [ 25.962747][ T3292] cgroup: Unknown subsys name 'rlimit' [ 26.073389][ T29] audit: type=1400 audit(1743402903.517:85): avc: denied { setattr } for pid=3292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.096798][ T29] audit: type=1400 audit(1743402903.517:86): avc: denied { create } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.117384][ T29] audit: type=1400 audit(1743402903.517:87): avc: denied { write } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.137899][ T29] audit: type=1400 audit(1743402903.517:88): avc: denied { read } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.145422][ T3294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.158181][ T29] audit: type=1400 audit(1743402903.517:89): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.191581][ T29] audit: type=1400 audit(1743402903.517:90): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.215180][ T29] audit: type=1400 audit(1743402903.617:91): avc: denied { relabelto } for pid=3294 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.249374][ T3292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.627530][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 28.687372][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 28.727227][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.734386][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.741802][ T3302] bridge_slave_0: entered allmulticast mode [ 28.748210][ T3302] bridge_slave_0: entered promiscuous mode [ 28.756115][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.763182][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.770402][ T3302] bridge_slave_1: entered allmulticast mode [ 28.776850][ T3302] bridge_slave_1: entered promiscuous mode [ 28.790534][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 28.842588][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.868866][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.886068][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.893158][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.900360][ T3313] bridge_slave_0: entered allmulticast mode [ 28.906683][ T3313] bridge_slave_0: entered promiscuous mode [ 28.922177][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 28.932545][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.939661][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.946940][ T3313] bridge_slave_1: entered allmulticast mode [ 28.953243][ T3313] bridge_slave_1: entered promiscuous mode [ 28.971281][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 28.980382][ T3302] team0: Port device team_slave_0 added [ 28.997621][ T3302] team0: Port device team_slave_1 added [ 29.010232][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.033400][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.040391][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.066330][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.082521][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.101379][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.108416][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.134414][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.158132][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.165240][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.172437][ T3303] bridge_slave_0: entered allmulticast mode [ 29.178888][ T3303] bridge_slave_0: entered promiscuous mode [ 29.209528][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.216637][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.224024][ T3303] bridge_slave_1: entered allmulticast mode [ 29.230538][ T3303] bridge_slave_1: entered promiscuous mode [ 29.245124][ T3313] team0: Port device team_slave_0 added [ 29.274490][ T3313] team0: Port device team_slave_1 added [ 29.280325][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.287419][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.294516][ T3307] bridge_slave_0: entered allmulticast mode [ 29.300906][ T3307] bridge_slave_0: entered promiscuous mode [ 29.312856][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.336929][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.344059][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.351399][ T3307] bridge_slave_1: entered allmulticast mode [ 29.357814][ T3307] bridge_slave_1: entered promiscuous mode [ 29.365942][ T3302] hsr_slave_0: entered promiscuous mode [ 29.371896][ T3302] hsr_slave_1: entered promiscuous mode [ 29.378845][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.388048][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.395094][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.402290][ T3310] bridge_slave_0: entered allmulticast mode [ 29.408734][ T3310] bridge_slave_0: entered promiscuous mode [ 29.415396][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.422408][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.448373][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.474158][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.481344][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.488626][ T3310] bridge_slave_1: entered allmulticast mode [ 29.495120][ T3310] bridge_slave_1: entered promiscuous mode [ 29.501657][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.508653][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.534680][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.549990][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.585415][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.595352][ T3303] team0: Port device team_slave_0 added [ 29.606553][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.625790][ T3303] team0: Port device team_slave_1 added [ 29.637168][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.647040][ T3307] team0: Port device team_slave_0 added [ 29.657186][ T3313] hsr_slave_0: entered promiscuous mode [ 29.663316][ T3313] hsr_slave_1: entered promiscuous mode [ 29.669203][ T3313] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.676790][ T3313] Cannot create hsr debugfs directory [ 29.698104][ T3307] team0: Port device team_slave_1 added [ 29.710951][ T3310] team0: Port device team_slave_0 added [ 29.735880][ T3310] team0: Port device team_slave_1 added [ 29.741781][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.748815][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.775199][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.802301][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.809300][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.835243][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.850794][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.857786][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.883718][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.906100][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.913128][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.939246][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.953326][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.960304][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.986545][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.013486][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.020482][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.046404][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.078632][ T3303] hsr_slave_0: entered promiscuous mode [ 30.084584][ T3303] hsr_slave_1: entered promiscuous mode [ 30.090774][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.098398][ T3303] Cannot create hsr debugfs directory [ 30.147645][ T3310] hsr_slave_0: entered promiscuous mode [ 30.153718][ T3310] hsr_slave_1: entered promiscuous mode [ 30.159590][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.167165][ T3310] Cannot create hsr debugfs directory [ 30.174382][ T3307] hsr_slave_0: entered promiscuous mode [ 30.180373][ T3307] hsr_slave_1: entered promiscuous mode [ 30.186309][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.193866][ T3307] Cannot create hsr debugfs directory [ 30.252602][ T3313] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.264366][ T3313] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.286188][ T3313] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.305773][ T3313] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.325767][ T3302] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.335045][ T3302] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.361326][ T3302] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.379760][ T3302] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.424525][ T3307] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.437800][ T3307] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.446909][ T3307] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.457161][ T3307] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.489718][ T3310] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.509034][ T3310] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.517839][ T3310] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.527223][ T3310] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.542606][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.563411][ T3303] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.572270][ T3303] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.581282][ T3303] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.590546][ T3303] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.602315][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.618379][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.625482][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.649789][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.656918][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.667881][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.688363][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.707551][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.719603][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.730380][ T1576] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.737552][ T1576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.747918][ T1576] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.754988][ T1576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.775341][ T1576] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.782516][ T1576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.791449][ T1576] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.798510][ T1576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.892459][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.928369][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.941016][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.950762][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.963673][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.970829][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.984426][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.992842][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.999928][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.010380][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.025070][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.032189][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.046317][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.060282][ T1576] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.067477][ T1576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.083545][ T3310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.093989][ T3310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.208537][ T3313] veth0_vlan: entered promiscuous mode [ 31.219677][ T3313] veth1_vlan: entered promiscuous mode [ 31.239286][ T3307] veth0_vlan: entered promiscuous mode [ 31.253930][ T3302] veth0_vlan: entered promiscuous mode [ 31.264815][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.275378][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.287708][ T3313] veth0_macvtap: entered promiscuous mode [ 31.296611][ T3302] veth1_vlan: entered promiscuous mode [ 31.313088][ T3313] veth1_macvtap: entered promiscuous mode [ 31.320415][ T3307] veth1_vlan: entered promiscuous mode [ 31.357561][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.371538][ T3302] veth0_macvtap: entered promiscuous mode [ 31.383768][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.394265][ T3302] veth1_macvtap: entered promiscuous mode [ 31.404565][ T3313] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.413381][ T3313] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.422226][ T3313] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.430967][ T3313] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.451588][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.462108][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.472737][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.485861][ T3310] veth0_vlan: entered promiscuous mode [ 31.499858][ T3307] veth0_macvtap: entered promiscuous mode [ 31.507459][ T3307] veth1_macvtap: entered promiscuous mode [ 31.513915][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.524376][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.534872][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.557003][ T3302] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.565874][ T3302] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.574688][ T3302] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.583439][ T3302] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.599231][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.609810][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.619669][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.630117][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.640736][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.651652][ T3310] veth1_vlan: entered promiscuous mode [ 31.656858][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 31.656873][ T29] audit: type=1400 audit(1743402909.097:110): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/root/syzkaller.XD42aK/syz-tmp" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.665467][ T3310] veth0_macvtap: entered promiscuous mode [ 31.687572][ T29] audit: type=1400 audit(1743402909.097:111): avc: denied { mount } for pid=3313 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.695107][ T3310] veth1_macvtap: entered promiscuous mode [ 31.715282][ T29] audit: type=1400 audit(1743402909.097:112): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/root/syzkaller.XD42aK/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.746287][ T29] audit: type=1400 audit(1743402909.097:113): avc: denied { mount } for pid=3313 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.768442][ T29] audit: type=1400 audit(1743402909.097:114): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/root/syzkaller.XD42aK/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.795115][ T29] audit: type=1400 audit(1743402909.097:115): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/root/syzkaller.XD42aK/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3510 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.822584][ T29] audit: type=1400 audit(1743402909.097:116): avc: denied { unmount } for pid=3313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.853928][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.864660][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.874524][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.884979][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.895939][ T29] audit: type=1400 audit(1743402909.297:117): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.918896][ T29] audit: type=1400 audit(1743402909.297:118): avc: denied { mount } for pid=3313 comm="syz-executor" name="/" dev="gadgetfs" ino=3511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 31.942005][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.944662][ T3313] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.972149][ T3307] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.980942][ T3307] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.989757][ T3307] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.998550][ T3307] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.016818][ T29] audit: type=1400 audit(1743402909.467:119): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.051253][ T3303] veth0_vlan: entered promiscuous mode [ 32.060355][ T3303] veth1_vlan: entered promiscuous mode [ 32.068508][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.079045][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.088903][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.099401][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.109363][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.119837][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.130515][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.139828][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.150374][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.160240][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.171037][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.180903][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.191358][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.202072][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.225243][ T3310] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.234030][ T3310] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.242851][ T3310] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.251708][ T3310] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.264666][ C0] hrtimer: interrupt took 26815 ns [ 32.299629][ T3303] veth0_macvtap: entered promiscuous mode [ 32.330976][ T3303] veth1_macvtap: entered promiscuous mode [ 32.354656][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.365305][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.375278][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.385747][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.395762][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.406260][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.416124][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.426595][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.443476][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.484816][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.495371][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.505280][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.516017][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.525978][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.536447][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.546509][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.557034][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.573387][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.615426][ T3303] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.624434][ T3303] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.633393][ T3303] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.642336][ T3303] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.690981][ T3462] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 32.719343][ T3460] loop0: detected capacity change from 0 to 8192 [ 32.720696][ T3462] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 32.742574][ T3460] ======================================================= [ 32.742574][ T3460] WARNING: The mand mount option has been deprecated and [ 32.742574][ T3460] and is ignored by this kernel. Remove the mand [ 32.742574][ T3460] option from the mount to silence this warning. [ 32.742574][ T3460] ======================================================= [ 32.780876][ T3462] netlink: 'syz.1.11': attribute type 10 has an invalid length. [ 32.797454][ T3462] batman_adv: batadv0: Adding interface: team0 [ 32.803656][ T3462] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.828969][ T3462] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 32.846011][ T3469] netlink: 'syz.1.11': attribute type 10 has an invalid length. [ 32.853807][ T3469] netlink: 2 bytes leftover after parsing attributes in process `syz.1.11'. [ 32.892253][ T3469] team0: entered promiscuous mode [ 32.897443][ T3469] team_slave_0: entered promiscuous mode [ 32.903203][ T3469] team_slave_1: entered promiscuous mode [ 32.940163][ T3469] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.948471][ T3469] batman_adv: batadv0: Interface activated: team0 [ 32.954998][ T3469] batman_adv: batadv0: Interface deactivated: team0 [ 32.961776][ T3469] batman_adv: batadv0: Removing interface: team0 [ 32.969411][ T3004] ================================================================== [ 32.977523][ T3004] BUG: KCSAN: data-race in atime_needs_update / inode_set_ctime_current [ 32.985883][ T3004] [ 32.988211][ T3004] write to 0xffff888119f47250 of 8 bytes by task 3295 on cpu 0: [ 32.995848][ T3004] inode_set_ctime_current+0x527/0x7a0 [ 33.001339][ T3004] shmem_unlink+0x114/0x170 [ 33.005849][ T3004] vfs_unlink+0x275/0x430 [ 33.010191][ T3004] do_unlinkat+0x21b/0x4b0 [ 33.014607][ T3004] __x64_sys_unlink+0x2e/0x40 [ 33.019285][ T3004] x64_sys_call+0x2358/0x2e10 [ 33.023960][ T3004] do_syscall_64+0xc9/0x1c0 [ 33.028473][ T3004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.034364][ T3004] [ 33.036684][ T3004] read to 0xffff888119f47250 of 8 bytes by task 3004 on cpu 1: [ 33.044236][ T3004] atime_needs_update+0x2ed/0x3e0 [ 33.049286][ T3004] touch_atime+0x4a/0x350 [ 33.053621][ T3004] do_readlinkat+0x12d/0x210 [ 33.058212][ T3004] __x64_sys_readlink+0x47/0x60 [ 33.063069][ T3004] x64_sys_call+0x2a81/0x2e10 [ 33.067743][ T3004] do_syscall_64+0xc9/0x1c0 [ 33.072239][ T3004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.078130][ T3004] [ 33.080446][ T3004] value changed: 0x0000000067ea379d -> 0x0000000067ea379e [ 33.087551][ T3004] [ 33.089867][ T3004] Reported by Kernel Concurrency Sanitizer on: [ 33.096020][ T3004] CPU: 1 UID: 0 PID: 3004 Comm: udevd Not tainted 6.14.0-syzkaller-10764-gaa918db707fb #0 PREEMPT(voluntary) [ 33.107667][ T3004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 33.117756][ T3004] ================================================================== [ 33.128747][ T3476] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15'. [ 33.141891][ T3469] bridge0: port 3(team0) entered blocking state [ 33.148414][ T3469] bridge0: port 3(team0) entered disabled state [ 33.181607][ T3469] team0: entered allmulticast mode [ 33.186946][ T3469] team_slave_0: entered allmulticast mode [ 33.192715][ T3469] team_slave_1: entered allmulticast mode [ 33.225862][ T3469] bridge0: port 3(team0) entered blocking state [ 33.232285][ T3469] bridge0: port 3(team0) entered forwarding state [ 33.761508][ T3469] syz.1.11 (3469) used greatest stack depth: 10784 bytes left