face: batadv_slave_0 [ 1201.996471] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1202.021739] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1202.046220] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1202.054742] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1202.061092] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1202.086881] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1202.100492] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1202.112753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1202.125887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1202.152768] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1202.159989] team0: Port device team_slave_0 added [ 1202.178114] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1202.185427] team0: Port device team_slave_1 added [ 1202.233541] device hsr_slave_0 entered promiscuous mode [ 1202.280369] device hsr_slave_1 entered promiscuous mode [ 1202.335343] device bridge_slave_1 left promiscuous mode [ 1202.340920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1202.381213] device bridge_slave_0 left promiscuous mode [ 1202.386712] bridge0: port 1(bridge_slave_0) entered disabled state [ 1202.443102] device veth1_macvtap left promiscuous mode [ 1202.448430] device veth0_macvtap left promiscuous mode [ 1202.454003] device veth1_vlan left promiscuous mode [ 1202.459073] device veth0_vlan left promiscuous mode [ 1202.584337] device hsr_slave_1 left promiscuous mode [ 1202.623840] device hsr_slave_0 left promiscuous mode [ 1202.668475] team0 (unregistering): Port device team_slave_1 removed [ 1202.677838] team0 (unregistering): Port device team_slave_0 removed [ 1202.688055] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1202.733191] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1202.807778] bond0 (unregistering): Released all slaves [ 1202.855155] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1202.867322] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1202.884312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1202.890644] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1202.917619] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1202.937393] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1202.944999] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1202.970893] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1202.981594] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1202.989406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1203.053641] device hsr_slave_0 entered promiscuous mode [ 1203.101096] device hsr_slave_1 entered promiscuous mode [ 1203.157242] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1203.166931] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1203.183216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1203.327696] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1203.348157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1203.371489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1203.403947] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1203.416277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1203.424666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1203.451253] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1203.457363] 8021q: adding VLAN 0 to HW filter on device team0 [ 1203.473267] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1203.492437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1203.501937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1203.520539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1203.529258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1203.541329] bridge0: port 1(bridge_slave_0) entered blocking state [ 1203.547784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1203.560907] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1203.571573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1203.591734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1203.598942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1203.607704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1203.618012] bridge0: port 2(bridge_slave_1) entered blocking state [ 1203.624462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1203.638434] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1203.646454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1203.661053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1203.668598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1203.680623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1203.691501] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1203.697606] 8021q: adding VLAN 0 to HW filter on device team0 [ 1203.713034] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1203.724089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1203.738771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1203.751909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1203.767182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1203.775016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1203.783727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1203.793336] bridge0: port 1(bridge_slave_0) entered blocking state [ 1203.799776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1203.807632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1203.816066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1203.827378] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1203.835801] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1203.846221] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1203.853965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1203.863245] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1203.870824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1203.878763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1203.890082] bridge0: port 2(bridge_slave_1) entered blocking state [ 1203.896472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1203.908032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1203.916275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1203.930399] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1203.939113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1203.953450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1203.961426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1203.968468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1203.976367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1203.985616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1203.993652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1204.004090] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1204.010886] 8021q: adding VLAN 0 to HW filter on device team0 [ 1204.022387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1204.031021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1204.038040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1204.047786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1204.056011] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.062398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1204.069451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1204.077582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1204.086351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1204.095553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1204.102780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1204.114122] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1204.121955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1204.130836] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1204.136931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1204.145205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1204.153208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1204.161036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1204.168847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1204.176588] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.183010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1204.192695] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1204.210970] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1204.218980] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1204.226874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1204.240740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1204.248669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1204.256949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1204.263826] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1204.273711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1204.285488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1204.293107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1204.299946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1204.311049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1204.318645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1204.328724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1204.340434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1204.347570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1204.356771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1204.364768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1204.374032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1204.383841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1204.391153] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1204.398228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1204.406522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1204.414105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1204.422006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1204.431797] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1204.437860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1204.449474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1204.457454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1204.466288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1204.478365] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1204.490975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1204.499662] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1204.511329] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1204.517421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1204.525350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1204.539556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1204.553870] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1204.563635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1204.571235] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1204.585754] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1204.599762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1204.612364] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1204.622215] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1204.629484] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1204.636775] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1204.651540] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1204.659513] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1204.667056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1204.678240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1204.751899] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1204.759270] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1204.774743] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1204.787833] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1204.800855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1204.808353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1204.817298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1204.824823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1204.836307] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1204.844421] device veth0_vlan entered promiscuous mode [ 1204.859704] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1204.869927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1204.881694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1204.892364] device veth1_vlan entered promiscuous mode [ 1204.898542] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1204.910637] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1204.928412] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1204.940522] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1204.948241] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1204.955993] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1204.965685] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1204.975718] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1204.983370] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1204.990822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1204.998442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1205.007756] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1205.016049] device veth0_macvtap entered promiscuous mode [ 1205.022489] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1205.031124] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1205.039542] device veth1_macvtap entered promiscuous mode [ 1205.047037] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1205.053531] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1205.060978] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1205.068107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1205.075702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1205.083809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1205.091141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1205.100362] device veth0_vlan entered promiscuous mode [ 1205.107067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1205.117971] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1205.129733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1205.140563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1205.151472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1205.164474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1205.174377] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.186088] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1205.193788] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1205.204962] device veth1_vlan entered promiscuous mode [ 1205.211296] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1205.218058] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1205.226179] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1205.239707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1205.249797] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1205.261584] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.272834] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1205.279722] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1205.291058] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1205.298811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1205.307950] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1205.315384] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1205.322519] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1205.337447] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1205.347221] device veth0_vlan entered promiscuous mode [ 1205.353759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1205.361872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1205.369379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1205.377066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1205.385241] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1205.395629] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1205.413505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1205.421549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1205.434055] device veth1_vlan entered promiscuous mode [ 1205.441227] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1205.449980] device veth0_macvtap entered promiscuous mode [ 1205.456921] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1205.466354] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1205.476800] device veth1_macvtap entered promiscuous mode [ 1205.483502] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1205.496011] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1205.507181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1205.522083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1205.532522] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.541893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1205.551706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.562365] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1205.569344] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1205.579753] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1205.587787] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1205.595825] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1205.603251] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1205.610755] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1205.618464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1205.627539] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1205.637609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1205.647522] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.656918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1205.667429] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.677813] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1205.684852] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1205.695657] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1205.703774] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1205.711888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1205.719785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1205.727609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1205.756926] device veth0_macvtap entered promiscuous mode [ 1205.769887] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1205.779805] device veth1_macvtap entered promiscuous mode [ 1205.787269] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1205.797099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1205.808186] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1205.817990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1205.827993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.837608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1205.847429] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.857103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1205.866901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.877576] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1205.885043] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1205.895085] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1205.902973] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1205.910597] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1205.910934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1205.931728] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1205.945297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.955081] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1205.965186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.974334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1205.984234] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1205.994710] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1206.002680] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1206.014851] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1206.025327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1206.049829] tc_dump_action: action bad kind [ 1206.091190] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1206.098106] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1206.115365] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1206.122475] batman_adv: batadv0: Removing interface: batadv_slave_1 20:15:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1206.367804] tc_dump_action: action bad kind 20:15:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1206.453067] tc_dump_action: action bad kind [ 1206.618624] tc_dump_action: action bad kind [ 1206.653525] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1206.667649] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1206.716079] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1206.726381] batman_adv: batadv0: Removing interface: batadv_slave_1 20:15:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4af", 0xe, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1207.014173] tc_dump_action: action bad kind 20:15:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1207.250698] tc_dump_action: action bad kind [ 1207.306739] device bridge_slave_1 left promiscuous mode [ 1207.317368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.370899] device bridge_slave_0 left promiscuous mode [ 1207.377631] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.413927] device veth1_macvtap left promiscuous mode [ 1207.423761] device veth0_macvtap left promiscuous mode [ 1207.434677] device veth1_vlan left promiscuous mode [ 1207.446153] device veth0_vlan left promiscuous mode [ 1207.672849] device hsr_slave_1 left promiscuous mode [ 1207.723864] device hsr_slave_0 left promiscuous mode [ 1207.796166] team0 (unregistering): Port device team_slave_1 removed [ 1207.825019] team0 (unregistering): Port device team_slave_0 removed [ 1207.836009] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1207.864916] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1207.967225] bond0 (unregistering): Released all slaves [ 1209.731549] IPVS: ftp: loaded support on port[0] = 21 [ 1210.492993] IPVS: ftp: loaded support on port[0] = 21 [ 1210.551803] chnl_net:caif_netlink_parms(): no params data found [ 1210.646276] chnl_net:caif_netlink_parms(): no params data found [ 1210.694860] bridge0: port 1(bridge_slave_0) entered blocking state [ 1210.708396] bridge0: port 1(bridge_slave_0) entered disabled state [ 1210.716300] device bridge_slave_0 entered promiscuous mode [ 1210.725014] bridge0: port 2(bridge_slave_1) entered blocking state [ 1210.736976] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.745221] device bridge_slave_1 entered promiscuous mode [ 1210.766069] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1210.775573] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1210.800130] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1210.807251] team0: Port device team_slave_0 added [ 1210.823819] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1210.830964] team0: Port device team_slave_1 added [ 1210.835993] bridge0: port 1(bridge_slave_0) entered blocking state [ 1210.842800] bridge0: port 1(bridge_slave_0) entered disabled state [ 1210.849704] device bridge_slave_0 entered promiscuous mode [ 1210.873865] bridge0: port 2(bridge_slave_1) entered blocking state [ 1210.880288] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.887183] device bridge_slave_1 entered promiscuous mode [ 1210.894101] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1210.902098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1210.927932] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1210.951704] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1210.957964] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1210.984144] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1210.998381] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1211.008352] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1211.016527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1211.024377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1211.057058] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1211.065971] team0: Port device team_slave_0 added [ 1211.103536] device hsr_slave_0 entered promiscuous mode [ 1211.161949] device hsr_slave_1 entered promiscuous mode [ 1211.200640] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1211.201121] team0: Port device team_slave_1 added [ 1211.218053] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1211.234068] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1211.242896] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1211.249137] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1211.275337] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1211.294446] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1211.300875] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1211.326219] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1211.336879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1211.348108] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1211.422287] device hsr_slave_0 entered promiscuous mode [ 1211.460360] device hsr_slave_1 entered promiscuous mode [ 1211.503565] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1211.516716] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1211.623311] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1211.638168] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1211.693671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1211.708381] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1211.718110] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1211.725287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1211.732506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1211.743435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1211.751680] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1211.757806] 8021q: adding VLAN 0 to HW filter on device team0 [ 1211.769974] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1211.777307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1211.787716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1211.796313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1211.804760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1211.812527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.818884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1211.825849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1211.834098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1211.841823] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.848221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1211.855705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1211.867252] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1211.875497] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1211.882592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1211.889623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1211.897165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1211.906981] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1211.913884] 8021q: adding VLAN 0 to HW filter on device team0 [ 1211.925859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1211.935242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1211.942576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1211.950873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1211.958655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1211.966651] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.973059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1211.980930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1211.989463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1212.001701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1212.009413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1212.017210] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1212.026783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1212.035399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1212.043259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1212.056516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1212.065653] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1212.075442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1212.083658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1212.091905] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.098266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.106199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1212.114212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1212.124242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1212.134848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1212.142633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1212.151636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1212.159825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1212.169013] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1212.175657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1212.184977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1212.195702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1212.205256] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1212.215875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1212.223990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1212.234098] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1212.242825] device bridge_slave_1 left promiscuous mode [ 1212.248304] bridge0: port 2(bridge_slave_1) entered disabled state [ 1212.281369] device bridge_slave_0 left promiscuous mode [ 1212.286911] bridge0: port 1(bridge_slave_0) entered disabled state [ 1212.343782] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1212.350599] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1212.358244] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1212.365049] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1212.372755] device bridge_slave_1 left promiscuous mode [ 1212.378236] bridge0: port 2(bridge_slave_1) entered disabled state [ 1212.420970] device bridge_slave_0 left promiscuous mode [ 1212.426506] bridge0: port 1(bridge_slave_0) entered disabled state [ 1212.484040] device veth1_macvtap left promiscuous mode [ 1212.489365] device veth0_macvtap left promiscuous mode [ 1212.494817] device veth1_vlan left promiscuous mode [ 1212.499875] device veth0_vlan left promiscuous mode [ 1212.505347] device veth1_macvtap left promiscuous mode [ 1212.510747] device veth0_macvtap left promiscuous mode [ 1212.516054] device veth1_vlan left promiscuous mode [ 1212.521352] device veth0_vlan left promiscuous mode [ 1212.683803] device hsr_slave_1 left promiscuous mode [ 1212.723908] device hsr_slave_0 left promiscuous mode [ 1212.777324] team0 (unregistering): Port device team_slave_1 removed [ 1212.786611] team0 (unregistering): Port device team_slave_0 removed [ 1212.795826] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1212.842979] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1212.918626] bond0 (unregistering): Released all slaves [ 1213.022801] device hsr_slave_1 left promiscuous mode [ 1213.062845] device hsr_slave_0 left promiscuous mode [ 1213.108031] team0 (unregistering): Port device team_slave_1 removed [ 1213.117844] team0 (unregistering): Port device team_slave_0 removed [ 1213.127085] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1213.173403] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1213.249620] bond0 (unregistering): Released all slaves [ 1213.287791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1213.295089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1213.302623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1213.310497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1213.318858] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1213.336231] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1213.343403] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1213.352598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1213.361563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1213.369152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1213.380274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1213.387436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1213.395395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1213.405650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1213.417193] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1213.423692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1213.439613] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1213.448011] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1213.454909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1213.462708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1213.475587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1213.565330] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1213.576160] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1213.591044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1213.599601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1213.682560] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1213.693705] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1213.701210] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1213.713718] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1213.720865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1213.728738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1213.739794] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1213.746785] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1213.760220] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1213.767236] device veth0_vlan entered promiscuous mode [ 1213.781636] device veth1_vlan entered promiscuous mode [ 1213.787675] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1213.799721] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1213.807956] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1213.815737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1213.823907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1213.834254] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1213.861716] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1213.880391] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1213.887294] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1213.895288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1213.903648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1213.914255] device veth0_macvtap entered promiscuous mode [ 1213.927740] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1213.938260] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1213.946671] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1213.953907] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1213.963199] device veth1_macvtap entered promiscuous mode [ 1213.969522] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1213.980455] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1213.987145] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1213.995475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1214.003352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1214.011593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1214.021893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1214.032939] device veth0_vlan entered promiscuous mode [ 1214.041075] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1214.048098] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1214.058394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1214.069350] device veth1_vlan entered promiscuous mode [ 1214.076617] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1214.085905] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1214.096626] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1214.107125] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1214.115871] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1214.128538] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1214.136026] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1214.144095] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1214.151888] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1214.159632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1214.169692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1214.179952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1214.191335] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1214.198271] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1214.210215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1214.218006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1214.228733] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1214.248251] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1214.255588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1214.264231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1214.275510] device veth0_macvtap entered promiscuous mode [ 1214.282691] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1214.292807] device veth1_macvtap entered promiscuous mode [ 1214.299092] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1214.306751] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1214.315054] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1214.326067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1214.343818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1214.356010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1214.366359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1214.375958] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1214.385760] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1214.395875] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1214.403262] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1214.412504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1214.420874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1214.431239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1214.441267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1214.451920] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1214.461756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1214.473318] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1214.480580] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1214.492567] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1214.501141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1215.607631] tc_dump_action: action bad kind [ 1215.618416] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1215.625554] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1215.645637] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1215.655531] batman_adv: batadv0: Removing interface: batadv_slave_1 20:15:20 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4af", 0xe, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1215.898335] tc_dump_action: action bad kind 20:15:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4af", 0xe, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:20 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) tkill(0x0, 0x0) [ 1216.103818] tc_dump_action: action bad kind 20:15:20 executing program 4: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1216.481885] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1216.488618] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1216.511664] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1216.518422] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1216.541939] device bridge_slave_1 left promiscuous mode [ 1216.557725] bridge0: port 2(bridge_slave_1) entered disabled state [ 1216.600871] device bridge_slave_0 left promiscuous mode [ 1216.606452] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.663121] device veth1_macvtap left promiscuous mode [ 1216.678741] device veth0_macvtap left promiscuous mode [ 1216.684167] device veth1_vlan left promiscuous mode [ 1216.701328] device veth0_vlan left promiscuous mode [ 1216.872714] device hsr_slave_1 left promiscuous mode [ 1216.913804] device hsr_slave_0 left promiscuous mode [ 1216.970700] team0 (unregistering): Port device team_slave_1 removed [ 1216.992616] team0 (unregistering): Port device team_slave_0 removed [ 1217.003143] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1217.035374] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1217.099275] bond0 (unregistering): Released all slaves [ 1218.801098] IPVS: ftp: loaded support on port[0] = 21 [ 1219.630623] IPVS: ftp: loaded support on port[0] = 21 [ 1219.692405] chnl_net:caif_netlink_parms(): no params data found [ 1219.784047] chnl_net:caif_netlink_parms(): no params data found [ 1219.828141] bridge0: port 1(bridge_slave_0) entered blocking state [ 1219.834791] bridge0: port 1(bridge_slave_0) entered disabled state [ 1219.841952] device bridge_slave_0 entered promiscuous mode [ 1219.849025] bridge0: port 2(bridge_slave_1) entered blocking state [ 1219.855940] bridge0: port 2(bridge_slave_1) entered disabled state [ 1219.863081] device bridge_slave_1 entered promiscuous mode [ 1219.884521] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1219.900454] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1219.928699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1219.935319] bridge0: port 1(bridge_slave_0) entered disabled state [ 1219.942410] device bridge_slave_0 entered promiscuous mode [ 1219.949016] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1219.956787] team0: Port device team_slave_0 added [ 1219.962114] bridge0: port 2(bridge_slave_1) entered blocking state [ 1219.969085] bridge0: port 2(bridge_slave_1) entered disabled state [ 1219.976589] device bridge_slave_1 entered promiscuous mode [ 1219.985933] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1219.993612] team0: Port device team_slave_1 added [ 1220.018177] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1220.028107] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1220.036823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1220.043268] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1220.068600] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1220.084929] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1220.091372] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1220.116772] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1220.133385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1220.144000] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1220.151452] team0: Port device team_slave_0 added [ 1220.156851] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1220.164251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1220.172241] team0: Port device team_slave_1 added [ 1220.253427] device hsr_slave_0 entered promiscuous mode [ 1220.290453] device hsr_slave_1 entered promiscuous mode [ 1220.331028] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1220.338444] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1220.344828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1220.370272] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1220.381568] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1220.387833] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1220.413219] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1220.423609] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1220.434300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1220.446398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1220.502430] device hsr_slave_0 entered promiscuous mode [ 1220.560352] device hsr_slave_1 entered promiscuous mode [ 1220.603477] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1220.616497] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1220.728462] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1220.736956] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1220.784860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1220.795456] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1220.804635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1220.814795] device bridge_slave_1 left promiscuous mode [ 1220.820570] bridge0: port 2(bridge_slave_1) entered disabled state [ 1220.841524] device bridge_slave_0 left promiscuous mode [ 1220.847039] bridge0: port 1(bridge_slave_0) entered disabled state [ 1220.911962] device veth1_macvtap left promiscuous mode [ 1220.917295] device veth0_macvtap left promiscuous mode [ 1220.922752] device veth1_vlan left promiscuous mode [ 1220.927848] device veth0_vlan left promiscuous mode [ 1221.052637] device hsr_slave_1 left promiscuous mode [ 1221.103310] device hsr_slave_0 left promiscuous mode [ 1221.185425] team0 (unregistering): Port device team_slave_1 removed [ 1221.194875] team0 (unregistering): Port device team_slave_0 removed [ 1221.204443] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1221.253167] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1221.327361] bond0 (unregistering): Released all slaves [ 1221.356551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1221.364730] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1221.372043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1221.378964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1221.387991] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1221.395431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1221.402912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1221.411461] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1221.417656] 8021q: adding VLAN 0 to HW filter on device team0 [ 1221.428403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1221.435818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1221.443811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1221.451694] bridge0: port 1(bridge_slave_0) entered blocking state [ 1221.458094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1221.466085] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1221.472316] 8021q: adding VLAN 0 to HW filter on device team0 [ 1221.479020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1221.491117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1221.498837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1221.506780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1221.514844] bridge0: port 2(bridge_slave_1) entered blocking state [ 1221.521290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1221.530517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1221.539263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1221.547660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1221.555506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1221.563757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1221.572065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1221.579890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1221.587758] bridge0: port 1(bridge_slave_0) entered blocking state [ 1221.594236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1221.602342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1221.612186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1221.652198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1221.659302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1221.667281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1221.675424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1221.683448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1221.691731] bridge0: port 2(bridge_slave_1) entered blocking state [ 1221.698218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1221.705728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1221.714744] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1221.724709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1221.732917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1221.743118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1221.753558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1221.766204] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1221.776813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1221.788119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1221.797215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1221.806735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1221.818216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1221.829799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1221.839763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1221.849831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1221.858430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1221.868672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1221.877972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1221.889231] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1221.896530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1221.908040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1221.924772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1221.934579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1221.953533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1221.963871] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1221.971938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1221.982231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1221.992793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1222.004106] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1222.014117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1222.025171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1222.032892] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1222.039658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1222.051559] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1222.057657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1222.070722] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1222.092484] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1222.119128] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1222.128662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1222.136708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1222.151987] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1222.284051] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1222.305440] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1222.312586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1222.330902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1222.386619] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1222.403146] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1222.410331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1222.418511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1222.431114] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1222.438476] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1222.445779] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1222.456086] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1222.463254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1222.472016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1222.479463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1222.487073] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1222.496215] device veth0_vlan entered promiscuous mode [ 1222.507397] device veth1_vlan entered promiscuous mode [ 1222.520179] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1222.531256] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1222.541530] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1222.549786] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1222.557943] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1222.570442] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1222.577271] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1222.584872] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1222.592269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1222.599689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1222.609791] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1222.618954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1222.626218] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1222.633796] device veth0_vlan entered promiscuous mode [ 1222.644485] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1222.652797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1222.661106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1222.673456] device veth1_vlan entered promiscuous mode [ 1222.679409] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1222.686782] device veth0_macvtap entered promiscuous mode [ 1222.696359] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1222.706331] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1222.713858] device veth1_macvtap entered promiscuous mode [ 1222.722838] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1222.733773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1222.745824] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1222.753865] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1222.763869] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1222.771656] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1222.781486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1222.792146] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1222.802437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1222.812223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1222.822775] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1222.829788] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1222.839958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1222.848021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1222.856929] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1222.877526] device veth0_macvtap entered promiscuous mode [ 1222.883815] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1222.890843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1222.901293] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1222.911442] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1222.918351] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1222.925414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1222.933331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1222.942249] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1222.950117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1222.965321] device veth1_macvtap entered promiscuous mode [ 1222.972184] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1222.978937] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1223.000750] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1223.012750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1223.026738] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1223.038702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1223.049018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1223.058906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1223.069197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1223.079219] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1223.086846] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1223.096344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1223.104720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1223.114378] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1223.124264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1223.133772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1223.143878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1223.153972] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1223.161136] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1223.170752] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1223.178601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1224.166556] tc_dump_action: action bad kind [ 1224.183636] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1224.190973] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1224.202512] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1224.209357] batman_adv: batadv0: Removing interface: batadv_slave_1 20:15:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:29 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd703", 0x10, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0x0, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f00000000c0)={0xd, 0x6}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r2, 0x8, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000000c0)=""/37) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f00000016c0)=[{{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000240)=@v2={0x2000000, [{0x6b, 0x7}, {0x3}]}, 0x14, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r6, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) accept(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0x80) ioctl$int_in(r1, 0x5452, &(0x7f0000000200)=0x5) 20:15:29 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:29 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1225.182160] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1225.199156] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1225.220424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1225.227172] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1225.241754] device bridge_slave_1 left promiscuous mode [ 1225.260246] bridge0: port 2(bridge_slave_1) entered disabled state [ 1225.302103] device bridge_slave_0 left promiscuous mode [ 1225.307672] bridge0: port 1(bridge_slave_0) entered disabled state [ 1225.382847] device veth1_macvtap left promiscuous mode [ 1225.388199] device veth0_macvtap left promiscuous mode [ 1225.411546] device veth1_vlan left promiscuous mode [ 1225.416649] device veth0_vlan left promiscuous mode [ 1225.625400] device hsr_slave_1 left promiscuous mode [ 1225.693712] device hsr_slave_0 left promiscuous mode [ 1225.757691] team0 (unregistering): Port device team_slave_1 removed [ 1225.767503] team0 (unregistering): Port device team_slave_0 removed [ 1225.777240] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1225.823389] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1225.891861] bond0 (unregistering): Released all slaves [ 1227.581202] IPVS: ftp: loaded support on port[0] = 21 [ 1228.461885] IPVS: ftp: loaded support on port[0] = 21 [ 1228.522224] chnl_net:caif_netlink_parms(): no params data found [ 1228.581449] IPVS: ftp: loaded support on port[0] = 21 [ 1228.628987] chnl_net:caif_netlink_parms(): no params data found [ 1228.656570] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.663145] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.670413] device bridge_slave_0 entered promiscuous mode [ 1228.682469] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.688886] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.696115] device bridge_slave_1 entered promiscuous mode [ 1228.725640] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1228.743821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1228.772695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1228.782634] team0: Port device team_slave_0 added [ 1228.793188] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1228.802819] team0: Port device team_slave_1 added [ 1228.868339] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.875249] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.882870] device bridge_slave_0 entered promiscuous mode [ 1228.899024] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.906106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.913449] device bridge_slave_1 entered promiscuous mode [ 1228.924204] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1228.930710] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1228.956314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1228.972488] chnl_net:caif_netlink_parms(): no params data found [ 1228.987659] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1228.994054] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1229.019360] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1229.041223] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1229.054472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1229.062704] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1229.081849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1229.106060] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1229.114381] team0: Port device team_slave_0 added [ 1229.130556] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1229.137801] team0: Port device team_slave_1 added [ 1229.182474] device hsr_slave_0 entered promiscuous mode [ 1229.220367] device hsr_slave_1 entered promiscuous mode [ 1229.298042] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1229.305767] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1229.312202] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1229.337572] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1229.347981] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1229.365392] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1229.372567] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1229.397860] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1229.414954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1229.435460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1229.458928] bridge0: port 1(bridge_slave_0) entered blocking state [ 1229.467396] bridge0: port 1(bridge_slave_0) entered disabled state [ 1229.474695] device bridge_slave_0 entered promiscuous mode [ 1229.493356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1229.499834] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.508585] device bridge_slave_1 entered promiscuous mode [ 1229.542273] device hsr_slave_0 entered promiscuous mode [ 1229.580414] device hsr_slave_1 entered promiscuous mode [ 1229.637508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1229.645670] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1229.655671] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1229.666193] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1229.713213] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1229.720612] team0: Port device team_slave_0 added [ 1229.734500] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1229.742055] team0: Port device team_slave_1 added [ 1229.778706] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1229.785113] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1229.810712] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1229.825653] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1229.832342] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1229.858050] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1229.868668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1229.878601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1229.906524] device bridge_slave_1 left promiscuous mode [ 1229.912237] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.981067] device bridge_slave_0 left promiscuous mode [ 1229.986714] bridge0: port 1(bridge_slave_0) entered disabled state [ 1230.043096] device veth1_macvtap left promiscuous mode [ 1230.048416] device veth0_macvtap left promiscuous mode [ 1230.053872] device veth1_vlan left promiscuous mode [ 1230.058974] device veth0_vlan left promiscuous mode [ 1230.181837] device hsr_slave_1 left promiscuous mode [ 1230.222610] device hsr_slave_0 left promiscuous mode [ 1230.268534] team0 (unregistering): Port device team_slave_1 removed [ 1230.278963] team0 (unregistering): Port device team_slave_0 removed [ 1230.287908] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1230.323106] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1230.387381] bond0 (unregistering): Released all slaves [ 1230.512281] device hsr_slave_0 entered promiscuous mode [ 1230.550346] device hsr_slave_1 entered promiscuous mode [ 1230.604210] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1230.612773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1230.634144] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1230.646392] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1230.815363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1230.826586] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1230.847908] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1230.858161] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1230.868372] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1230.878631] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1230.888730] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1230.895746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1230.903993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1230.911127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1230.918114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1230.932704] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1230.938820] 8021q: adding VLAN 0 to HW filter on device team0 [ 1230.949175] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1230.956110] 8021q: adding VLAN 0 to HW filter on device team0 [ 1230.968787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1230.982865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1230.989972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1230.999690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1231.009911] bridge0: port 1(bridge_slave_0) entered blocking state [ 1231.016479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1231.028335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1231.036569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1231.047884] bridge0: port 2(bridge_slave_1) entered blocking state [ 1231.054337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1231.065942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1231.074526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1231.085184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1231.095186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1231.106177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1231.115228] bridge0: port 1(bridge_slave_0) entered blocking state [ 1231.121620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1231.132489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1231.144907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1231.155808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1231.163224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1231.174145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1231.182276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1231.189929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1231.196374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1231.208367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1231.225754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1231.243515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1231.252885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1231.272872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1231.290762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1231.299544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1231.309122] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1231.324089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1231.340705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1231.348683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1231.357087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1231.367312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1231.377085] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1231.387473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1231.398752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1231.407185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1231.418382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1231.426289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1231.439673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1231.448634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1231.461916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1231.473874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1231.481653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1231.489544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1231.500987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1231.508759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1231.522182] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1231.535216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1231.543542] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1231.549606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1231.558348] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1231.564545] 8021q: adding VLAN 0 to HW filter on device team0 [ 1231.570805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1231.577738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1231.585793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1231.593605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1231.603646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1231.616946] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1231.625876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1231.633540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1231.644764] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1231.651292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1231.667187] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1231.676599] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1231.686046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1231.694721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1231.705802] bridge0: port 1(bridge_slave_0) entered blocking state [ 1231.712222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1231.720940] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1231.727801] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1231.738973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1231.748589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1231.756379] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1231.763374] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1231.770721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1231.777506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1231.784628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1231.792728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1231.800503] bridge0: port 2(bridge_slave_1) entered blocking state [ 1231.806861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1231.817315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1231.826222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1231.849291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1231.863631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1231.874554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1231.888506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1231.913351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1231.923242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1231.932083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1231.942800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1231.953253] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1231.961303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1231.969121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1231.983022] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1231.993903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1232.007581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1232.018060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1232.030810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1232.040943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1232.051357] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1232.057454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1232.077087] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1232.085469] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1232.094910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1232.104388] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1232.125015] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1232.143461] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1232.158038] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1232.165964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1232.174478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1232.185739] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1232.197831] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1232.208546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1232.217192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1232.257026] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1232.267572] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1232.276988] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1232.287789] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1232.297796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1232.305945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1232.318215] device veth0_vlan entered promiscuous mode [ 1232.327716] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1232.339132] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1232.346333] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1232.352717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1232.359723] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1232.374053] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1232.382459] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1232.391172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1232.398613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1232.406388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1232.413429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1232.424448] device veth1_vlan entered promiscuous mode [ 1232.430917] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1232.438258] device veth0_vlan entered promiscuous mode [ 1232.445627] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1232.456211] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1232.464763] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1232.472809] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1232.480488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1232.488302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1232.501050] device veth1_vlan entered promiscuous mode [ 1232.507108] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1232.518801] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1232.529796] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1232.543347] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1232.556251] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1232.564062] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1232.571570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1232.579189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1232.591164] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1232.601130] device veth0_macvtap entered promiscuous mode [ 1232.607413] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1232.615855] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1232.623685] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1232.631331] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1232.639554] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1232.649586] device veth1_macvtap entered promiscuous mode [ 1232.656093] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1232.663063] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1232.672375] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1232.679576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1232.687529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1232.697987] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1232.707239] device veth0_macvtap entered promiscuous mode [ 1232.714332] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1232.721495] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1232.728832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1232.736449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1232.744429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1232.752190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1232.761344] device veth0_vlan entered promiscuous mode [ 1232.772830] device veth1_vlan entered promiscuous mode [ 1232.781394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1232.795805] device veth1_macvtap entered promiscuous mode [ 1232.805782] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1232.817646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1232.827515] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1232.837866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1232.848372] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1232.855949] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1232.868798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1232.876726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1232.884609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1232.896113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1232.906658] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1232.916877] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1232.924418] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1232.933588] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1232.942624] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1232.951356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1232.961136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1232.971215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1232.980786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1232.990560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.001035] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1233.007980] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1233.024269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1233.034826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.044879] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1233.054946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.065017] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1233.072356] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1233.080590] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1233.088279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1233.096287] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1233.104096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1233.115305] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1233.128284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1233.137644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1233.147305] device veth0_macvtap entered promiscuous mode [ 1233.153793] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1233.165860] device veth1_macvtap entered promiscuous mode [ 1233.176834] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1233.187859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1233.204608] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1233.215437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1233.225700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.235232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1233.245375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.254605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1233.264438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.274492] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1233.281740] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1233.292038] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1233.299358] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1233.313048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1233.321310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1233.331613] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1233.342106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.352147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1233.362033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.371565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1233.381708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1233.392678] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1233.399661] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1233.411239] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1233.419165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1234.612137] tc_dump_action: action bad kind 20:15:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:39 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1234.637055] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1234.644645] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1234.658896] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1234.666474] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1234.739478] tc_dump_action: action bad kind 20:15:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd703", 0x10, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) io_submit(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r2 = dup2(r1, r1) write$P9_RMKNOD(r2, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) lseek(0xffffffffffffffff, 0x0, 0x0) 20:15:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) getpid() r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_getoverrun(0x0) 20:15:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd703", 0x10, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:39 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) getpid() r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:15:40 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a", 0x11, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1235.443151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1235.454688] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1235.481251] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1235.489865] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1235.562681] device bridge_slave_1 left promiscuous mode [ 1235.568280] bridge0: port 2(bridge_slave_1) entered disabled state [ 1235.650854] device bridge_slave_0 left promiscuous mode [ 1235.656427] bridge0: port 1(bridge_slave_0) entered disabled state [ 1235.714573] device veth1_macvtap left promiscuous mode [ 1235.720788] device veth0_macvtap left promiscuous mode [ 1235.726175] device veth1_vlan left promiscuous mode [ 1235.732672] device veth0_vlan left promiscuous mode [ 1235.893485] device hsr_slave_1 left promiscuous mode [ 1235.935299] device hsr_slave_0 left promiscuous mode [ 1236.007511] team0 (unregistering): Port device team_slave_1 removed [ 1236.038091] team0 (unregistering): Port device team_slave_0 removed [ 1236.071800] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1236.124422] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1236.236176] bond0 (unregistering): Released all slaves [ 1237.891460] IPVS: ftp: loaded support on port[0] = 21 [ 1238.653065] IPVS: ftp: loaded support on port[0] = 21 [ 1238.714223] chnl_net:caif_netlink_parms(): no params data found [ 1238.793605] IPVS: ftp: loaded support on port[0] = 21 [ 1238.827050] chnl_net:caif_netlink_parms(): no params data found [ 1238.896458] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.903218] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.910267] device bridge_slave_0 entered promiscuous mode [ 1238.926900] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.933444] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.940861] device bridge_slave_1 entered promiscuous mode [ 1238.962687] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1238.972186] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1239.043625] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1239.053781] team0: Port device team_slave_0 added [ 1239.058939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1239.065893] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.074494] device bridge_slave_0 entered promiscuous mode [ 1239.097456] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1239.104684] team0: Port device team_slave_1 added [ 1239.109739] bridge0: port 2(bridge_slave_1) entered blocking state [ 1239.116305] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.123730] device bridge_slave_1 entered promiscuous mode [ 1239.158948] chnl_net:caif_netlink_parms(): no params data found [ 1239.175006] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1239.187037] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1239.196033] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1239.202383] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1239.227847] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1239.261464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1239.267751] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1239.293503] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1239.307112] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1239.314678] team0: Port device team_slave_0 added [ 1239.326210] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1239.333694] team0: Port device team_slave_1 added [ 1239.338952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1239.347175] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1239.402971] device hsr_slave_0 entered promiscuous mode [ 1239.440832] device hsr_slave_1 entered promiscuous mode [ 1239.491051] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1239.498549] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1239.504926] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1239.530659] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1239.541754] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1239.548013] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1239.573425] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1239.588669] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1239.606685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1239.628377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1239.643517] bridge0: port 1(bridge_slave_0) entered blocking state [ 1239.650265] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.657198] device bridge_slave_0 entered promiscuous mode [ 1239.715106] device hsr_slave_0 entered promiscuous mode [ 1239.780367] device hsr_slave_1 entered promiscuous mode [ 1239.820325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1239.831662] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.838606] device bridge_slave_1 entered promiscuous mode [ 1239.855396] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1239.874456] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1239.897779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1239.909932] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1239.949858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1239.957137] team0: Port device team_slave_0 added [ 1239.969769] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1239.977939] team0: Port device team_slave_1 added [ 1240.015957] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1240.023116] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1240.048810] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1240.062533] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1240.068805] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1240.094329] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1240.114845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1240.133466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1240.204959] device hsr_slave_0 entered promiscuous mode [ 1240.250524] device hsr_slave_1 entered promiscuous mode [ 1240.290944] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1240.306111] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1240.324269] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1240.338910] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1240.434349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1240.444984] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1240.455238] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1240.465382] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1240.471736] 8021q: adding VLAN 0 to HW filter on device team0 [ 1240.478469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1240.485699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1240.496730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1240.508135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1240.517941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1240.528353] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1240.535867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1240.544119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1240.551915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1240.558304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1240.565769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1240.578224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1240.587396] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1240.594223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1240.602650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1240.611202] bridge0: port 2(bridge_slave_1) entered blocking state [ 1240.617556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1240.625679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1240.633432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1240.649657] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1240.656010] 8021q: adding VLAN 0 to HW filter on device team0 [ 1240.662914] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1240.669831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1240.683799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1240.692826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1240.702782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1240.710549] bridge0: port 1(bridge_slave_0) entered blocking state [ 1240.716925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1240.724468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1240.732919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1240.744936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1240.752456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1240.760608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1240.768392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1240.776197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1240.782579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1240.793314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1240.803400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1240.811979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1240.819653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1240.827487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1240.835734] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1240.844886] device bridge_slave_1 left promiscuous mode [ 1240.850530] bridge0: port 2(bridge_slave_1) entered disabled state [ 1240.900880] device bridge_slave_0 left promiscuous mode [ 1240.906361] bridge0: port 1(bridge_slave_0) entered disabled state [ 1240.953381] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1240.960185] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1240.967655] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1240.974463] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1240.983015] device bridge_slave_1 left promiscuous mode [ 1240.988490] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.030824] device bridge_slave_0 left promiscuous mode [ 1241.036284] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.093282] device veth1_macvtap left promiscuous mode [ 1241.098599] device veth0_macvtap left promiscuous mode [ 1241.104082] device veth1_vlan left promiscuous mode [ 1241.109124] device veth0_vlan left promiscuous mode [ 1241.114613] device veth1_macvtap left promiscuous mode [ 1241.119900] device veth0_macvtap left promiscuous mode [ 1241.125331] device veth1_vlan left promiscuous mode [ 1241.130692] device veth0_vlan left promiscuous mode [ 1241.285306] device hsr_slave_1 left promiscuous mode [ 1241.342468] device hsr_slave_0 left promiscuous mode [ 1241.386922] team0 (unregistering): Port device team_slave_1 removed [ 1241.397521] team0 (unregistering): Port device team_slave_0 removed [ 1241.406530] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1241.444770] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1241.498081] bond0 (unregistering): Released all slaves [ 1241.602945] device hsr_slave_1 left promiscuous mode [ 1241.642916] device hsr_slave_0 left promiscuous mode [ 1241.686998] team0 (unregistering): Port device team_slave_1 removed [ 1241.697900] team0 (unregistering): Port device team_slave_0 removed [ 1241.706899] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1241.743665] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1241.818699] bond0 (unregistering): Released all slaves [ 1241.875171] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1241.883532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1241.895110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1241.904541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1241.915915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1241.923610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1241.931513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1241.939241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1241.947081] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1241.957490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1241.967917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1241.975680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1241.984167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1241.995107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1242.004836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1242.012428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1242.019773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1242.027850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1242.041634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1242.053961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1242.062143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1242.071050] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1242.077097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1242.086046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1242.097771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1242.105839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1242.113829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1242.123286] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1242.129393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1242.137986] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1242.149576] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1242.158275] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1242.166796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1242.174038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1242.186481] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1242.197249] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1242.206866] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1242.216555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1242.223906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1242.236297] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1242.243206] 8021q: adding VLAN 0 to HW filter on device team0 [ 1242.251462] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1242.257866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1242.265194] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1242.324814] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1242.380197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1242.388124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1242.396433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.402849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1242.412737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1242.422489] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1242.431261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1242.438511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1242.447119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1242.458141] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.464616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1242.485813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1242.494476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1242.507530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1242.526042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1242.544178] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1242.554223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1242.564114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1242.575106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1242.586681] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1242.599333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1242.607852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1242.617782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1242.637794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1242.656706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1242.667057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1242.679182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1242.687821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1242.702586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1242.721787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1242.740389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1242.748126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1242.763996] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1242.770212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1242.797963] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1242.807243] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1242.822552] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1242.835946] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1242.848540] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1242.856290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1242.865571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1242.874948] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1242.884323] device veth0_vlan entered promiscuous mode [ 1242.892050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1242.899586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1242.908016] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1242.917944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1242.935099] device veth1_vlan entered promiscuous mode [ 1242.946408] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1242.956462] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1242.983847] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1242.993352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1243.008664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1243.027011] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1243.066749] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1243.085951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1243.096804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1243.108730] device veth0_macvtap entered promiscuous mode [ 1243.125945] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1243.139660] device veth1_macvtap entered promiscuous mode [ 1243.146840] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1243.163513] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1243.175650] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1243.182657] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1243.192709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1243.217169] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1243.231514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1243.244532] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1243.252744] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1243.259829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1243.269197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1243.276975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1243.284525] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1243.292823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1243.305421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.316285] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1243.323382] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1243.334335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1243.343501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1243.353255] device veth0_vlan entered promiscuous mode [ 1243.359226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1243.369644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.381012] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1243.387939] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1243.399766] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1243.407722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1243.417033] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1243.430850] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1243.438543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1243.458261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1243.469383] device veth1_vlan entered promiscuous mode [ 1243.475791] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1243.495705] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1243.521511] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1243.534470] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1243.541634] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1243.548873] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1243.558038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1243.566008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1243.577595] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1243.584916] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1243.594379] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1243.603374] device veth0_macvtap entered promiscuous mode [ 1243.609697] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1243.621405] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1243.628622] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1243.636413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1243.644943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1243.656153] device veth1_macvtap entered promiscuous mode [ 1243.663435] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1243.669864] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1243.678511] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1243.686329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1243.694772] device veth0_vlan entered promiscuous mode [ 1243.709715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1243.728640] device veth1_vlan entered promiscuous mode [ 1243.735087] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1243.745322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1243.766223] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1243.775703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1243.786715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.800769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1243.812503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.823601] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1243.831609] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1243.848219] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1243.855775] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1243.863396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1243.871405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1243.881046] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1243.889450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1243.899649] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.909032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1243.919505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.929743] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1243.936835] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1243.946991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1243.955019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1243.967409] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1243.976043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1243.987036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1243.998383] device veth0_macvtap entered promiscuous mode [ 1244.006748] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1244.026335] device veth1_macvtap entered promiscuous mode [ 1244.036537] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1244.054929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1244.083485] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1244.097643] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.116486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.126162] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.136787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.147058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.157219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.167788] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1244.175393] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1244.187744] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1244.201657] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1244.212121] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1244.219824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1244.229691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1244.240737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.249893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1244.260252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.269378] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1244.279145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.289989] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1244.297403] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1244.313535] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1244.321691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:15:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:15:49 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:49 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) getpid() r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:15:49 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1244.886497] tc_dump_action: action bad kind [ 1244.893130] tc_dump_action: action bad kind [ 1244.925680] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1244.941043] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1244.971259] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1244.984224] batman_adv: batadv0: Removing interface: batadv_slave_1 20:15:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:49 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:49 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:15:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a", 0x11, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x2800) 20:15:50 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:50 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1245.436260] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1245.453896] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1245.464159] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1245.473181] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1245.482066] device bridge_slave_1 left promiscuous mode [ 1245.487932] bridge0: port 2(bridge_slave_1) entered disabled state [ 1245.532753] device bridge_slave_0 left promiscuous mode [ 1245.539501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.595565] device veth1_macvtap left promiscuous mode [ 1245.605536] device veth0_macvtap left promiscuous mode 20:15:50 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/37) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1245.655554] device veth1_vlan left promiscuous mode [ 1245.660820] device veth0_vlan left promiscuous mode 20:15:50 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1245.922073] device hsr_slave_1 left promiscuous mode [ 1245.984048] device hsr_slave_0 left promiscuous mode [ 1246.138481] team0 (unregistering): Port device team_slave_1 removed [ 1246.166676] team0 (unregistering): Port device team_slave_0 removed [ 1246.187841] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1246.247462] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1246.310746] bond0 (unregistering): Released all slaves [ 1247.981465] IPVS: ftp: loaded support on port[0] = 21 [ 1248.761181] IPVS: ftp: loaded support on port[0] = 21 [ 1248.825612] chnl_net:caif_netlink_parms(): no params data found [ 1248.913016] chnl_net:caif_netlink_parms(): no params data found [ 1248.973170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1248.979630] bridge0: port 1(bridge_slave_0) entered disabled state [ 1248.987595] device bridge_slave_0 entered promiscuous mode [ 1248.995495] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.002028] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.008949] device bridge_slave_1 entered promiscuous mode [ 1249.036679] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1249.046543] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1249.064990] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.071521] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.078442] device bridge_slave_0 entered promiscuous mode [ 1249.096155] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.104145] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.111543] device bridge_slave_1 entered promiscuous mode [ 1249.117741] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1249.125371] team0: Port device team_slave_0 added [ 1249.131569] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1249.138798] team0: Port device team_slave_1 added [ 1249.166134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1249.174551] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1249.180948] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1249.206775] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1249.225496] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1249.233738] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1249.239988] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1249.265335] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1249.276395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1249.294634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1249.301964] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1249.309055] team0: Port device team_slave_0 added [ 1249.323254] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1249.330610] team0: Port device team_slave_1 added [ 1249.372254] device hsr_slave_0 entered promiscuous mode [ 1249.410485] device hsr_slave_1 entered promiscuous mode [ 1249.474904] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1249.482312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1249.488557] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1249.514418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1249.524757] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1249.538386] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1249.544718] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1249.572268] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1249.587452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1249.595494] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1249.663581] device hsr_slave_0 entered promiscuous mode [ 1249.701223] device hsr_slave_1 entered promiscuous mode [ 1249.744435] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1249.758016] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1249.860632] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1249.871195] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1249.928399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1249.936397] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1249.946226] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1249.954315] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1249.966808] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1249.974306] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1249.980678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1249.987589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1249.995120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1250.002034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1250.015610] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1250.021751] 8021q: adding VLAN 0 to HW filter on device team0 [ 1250.029063] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1250.036119] 8021q: adding VLAN 0 to HW filter on device team0 [ 1250.045635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1250.056154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1250.065527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1250.073095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1250.081299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1250.088829] bridge0: port 1(bridge_slave_0) entered blocking state [ 1250.095254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1250.102316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1250.109997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1250.118115] bridge0: port 2(bridge_slave_1) entered blocking state [ 1250.124510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1250.131535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1250.139241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1250.146915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1250.153282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1250.163441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1250.171816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1250.178882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1250.186290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1250.199319] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1250.209062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1250.216083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1250.223896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1250.231556] bridge0: port 2(bridge_slave_1) entered blocking state [ 1250.237904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1250.245123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1250.255132] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1250.266026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1250.273358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1250.281314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1250.288873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1250.298038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1250.311673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1250.321381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1250.329858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1250.337070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1250.344904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1250.353116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1250.360988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1250.368316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1250.378567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1250.387371] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1250.394927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1250.402822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1250.410312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1250.417998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1250.425762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1250.438763] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1250.445028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1250.453272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1250.462194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1250.469932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1250.484570] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1250.495637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1250.503589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1250.512956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1250.522894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1250.530962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1250.544767] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1250.551369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1250.559842] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1250.569639] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1250.577726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1250.585247] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1250.599679] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1250.608092] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1250.614633] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1250.621458] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1250.631627] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1250.643895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1250.702347] device bridge_slave_1 left promiscuous mode [ 1250.707932] bridge0: port 2(bridge_slave_1) entered disabled state [ 1250.760840] device bridge_slave_0 left promiscuous mode [ 1250.766405] bridge0: port 1(bridge_slave_0) entered disabled state [ 1250.812602] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1250.819385] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1250.827054] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1250.833917] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1250.842433] device bridge_slave_1 left promiscuous mode [ 1250.847899] bridge0: port 2(bridge_slave_1) entered disabled state [ 1250.900936] device bridge_slave_0 left promiscuous mode [ 1250.906463] bridge0: port 1(bridge_slave_0) entered disabled state [ 1250.963835] device veth1_macvtap left promiscuous mode [ 1250.969167] device veth0_macvtap left promiscuous mode [ 1250.974606] device veth1_vlan left promiscuous mode [ 1250.979656] device veth0_vlan left promiscuous mode [ 1250.985217] device veth1_macvtap left promiscuous mode [ 1250.990637] device veth0_macvtap left promiscuous mode [ 1250.995934] device veth1_vlan left promiscuous mode [ 1251.001271] device veth0_vlan left promiscuous mode [ 1251.192446] device hsr_slave_1 left promiscuous mode [ 1251.243653] device hsr_slave_0 left promiscuous mode [ 1251.288257] team0 (unregistering): Port device team_slave_1 removed [ 1251.297543] team0 (unregistering): Port device team_slave_0 removed [ 1251.306620] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1251.345027] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1251.398395] bond0 (unregistering): Released all slaves [ 1251.504051] device hsr_slave_1 left promiscuous mode [ 1251.543607] device hsr_slave_0 left promiscuous mode [ 1251.608242] team0 (unregistering): Port device team_slave_1 removed [ 1251.617466] team0 (unregistering): Port device team_slave_0 removed [ 1251.627390] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1251.672899] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1251.728766] bond0 (unregistering): Released all slaves [ 1251.795900] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1251.806322] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1251.815407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1251.823572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1251.836238] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1251.846708] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1251.854156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1251.862766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1251.893298] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1251.900802] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1251.907636] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1251.917614] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1251.924552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1251.932309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1251.943410] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1251.950922] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1251.957460] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1251.963832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1251.971360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1251.979205] device veth0_vlan entered promiscuous mode [ 1251.993219] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1252.002958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1252.011225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1252.019034] device veth1_vlan entered promiscuous mode [ 1252.025341] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1252.035314] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1252.042640] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1252.049815] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1252.058189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1252.065123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1252.072798] device veth0_vlan entered promiscuous mode [ 1252.148235] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1252.162887] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1252.173383] device veth1_vlan entered promiscuous mode [ 1252.179414] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1252.186961] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1252.195416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1252.203440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1252.213217] device veth0_macvtap entered promiscuous mode [ 1252.219512] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1252.230668] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1252.240604] device veth1_macvtap entered promiscuous mode [ 1252.246845] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1252.259916] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1252.271038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1252.281969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1252.292475] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1252.300534] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1252.307797] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1252.316989] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1252.324358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1252.332530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1252.341584] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.352114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.365108] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1252.372154] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1252.383114] device veth0_macvtap entered promiscuous mode [ 1252.389376] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1252.398533] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1252.406240] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1252.416798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1252.427264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.440475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.451080] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1252.457984] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1252.469669] device veth1_macvtap entered promiscuous mode [ 1252.476540] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1252.485289] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1252.500589] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1252.508426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1252.521752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1252.532089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1252.554645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.564676] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.582378] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.594601] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.613523] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1252.621441] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1252.629915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1252.641510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1252.653216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.653222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.653230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.653234] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.654200] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1252.654215] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1252.759237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1252.781827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1254.076585] tc_dump_action: action bad kind 20:15:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x2800) 20:15:58 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:58 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a", 0x11, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1254.129243] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1254.139205] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1254.163754] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1254.171048] batman_adv: batadv0: Removing interface: batadv_slave_1 20:15:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x2800) 20:15:59 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:59 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:15:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:15:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:15:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:15:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) [ 1255.741589] device bridge_slave_1 left promiscuous mode [ 1255.747094] bridge0: port 2(bridge_slave_1) entered disabled state [ 1255.791256] device bridge_slave_0 left promiscuous mode [ 1255.796800] bridge0: port 1(bridge_slave_0) entered disabled state [ 1255.852485] device veth1_macvtap left promiscuous mode [ 1255.857841] device veth0_macvtap left promiscuous mode [ 1255.863266] device veth1_vlan left promiscuous mode [ 1255.868324] device veth0_vlan left promiscuous mode [ 1255.964786] device hsr_slave_1 left promiscuous mode [ 1256.003409] device hsr_slave_0 left promiscuous mode [ 1256.058660] team0 (unregistering): Port device team_slave_1 removed [ 1256.068526] team0 (unregistering): Port device team_slave_0 removed [ 1256.077945] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1256.113956] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1256.178102] bond0 (unregistering): Released all slaves [ 1257.881451] IPVS: ftp: loaded support on port[0] = 21 [ 1258.070881] NOHZ: local_softirq_pending 08 [ 1258.675803] chnl_net:caif_netlink_parms(): no params data found [ 1258.735439] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.741917] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.748864] device bridge_slave_0 entered promiscuous mode [ 1258.756165] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.762678] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.769538] device bridge_slave_1 entered promiscuous mode [ 1258.785630] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1258.794547] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1258.816618] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1258.823851] team0: Port device team_slave_0 added [ 1258.829503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1258.836892] team0: Port device team_slave_1 added [ 1258.855179] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1258.861596] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1258.886945] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1258.901977] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1258.908345] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1258.933729] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1258.944133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1258.952038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1259.022155] device hsr_slave_0 entered promiscuous mode [ 1259.090465] device hsr_slave_1 entered promiscuous mode [ 1259.140866] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1259.151187] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1259.211397] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.217756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.224465] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.230891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.265580] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1259.271934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1259.280335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1259.288861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1259.296348] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.303133] bridge0: port 2(bridge_slave_1) entered disabled state [ 1259.316035] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1259.322953] 8021q: adding VLAN 0 to HW filter on device team0 [ 1259.332145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1259.339833] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.346270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.360885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1259.368496] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.374922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.387295] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1259.396195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1259.406408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1259.416809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1259.428588] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1259.439441] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1259.445805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1259.453209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1259.466022] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1259.477388] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1259.484560] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1259.491752] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1259.501457] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1259.508201] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1259.515991] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1259.522905] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1259.530677] device bridge_slave_1 left promiscuous mode [ 1259.536198] bridge0: port 2(bridge_slave_1) entered disabled state [ 1259.581032] device bridge_slave_0 left promiscuous mode [ 1259.586564] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.642024] device veth1_macvtap left promiscuous mode [ 1259.647356] device veth0_macvtap left promiscuous mode [ 1259.652827] device veth1_vlan left promiscuous mode [ 1259.657885] device veth0_vlan left promiscuous mode [ 1259.765101] device hsr_slave_1 left promiscuous mode [ 1259.813261] device hsr_slave_0 left promiscuous mode [ 1259.877087] team0 (unregistering): Port device team_slave_1 removed [ 1259.887397] team0 (unregistering): Port device team_slave_0 removed [ 1259.896800] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1259.952855] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1260.018535] bond0 (unregistering): Released all slaves [ 1260.065497] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1260.121673] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1260.132154] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1260.139370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1260.147643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1260.181600] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1260.188735] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1260.195683] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1260.204919] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1260.212554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1260.219883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1260.227606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1260.234983] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1260.244294] device veth0_vlan entered promiscuous mode [ 1260.293608] device veth1_vlan entered promiscuous mode [ 1260.299663] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1260.309689] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1260.327555] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1260.339447] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1260.346892] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1260.356498] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1260.364470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1260.373928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1260.384412] device veth0_macvtap entered promiscuous mode [ 1260.393955] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1260.403492] device veth1_macvtap entered promiscuous mode [ 1260.409914] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1260.422104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1260.432697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1260.444727] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1260.454597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.466799] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1260.473917] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1260.485481] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1260.493361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1260.502548] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1260.510738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1260.520891] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1260.533085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.544025] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1260.552807] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1260.560206] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1260.568822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1261.972576] tc_dump_action: action bad kind [ 1261.984639] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1261.992922] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1262.003280] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1262.011142] batman_adv: batadv0: Removing interface: batadv_slave_1 20:16:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000000000000000000000000000007f000001000000000000000000000000000000000000000000000000030000000000d28a0f6c487cf649ac000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000002000000000000000400008001e0000001f00000000000000666c617465000000000000000000000000000000000000000000002ec1710147f37e7b01370564c7d08e03000000000000000000000000000000665d6ed5e8b38e21ba9a815732f0b000000200000c04b300000000000000f3168ab74c1ec12ac90000000020dbd44355722d3cbb68b7772ad1ce0adf4239613190e15b4d3fd3b5584b08b3270ae7f1cae570e2a781e105de"], 0x2}}, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:06 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:06 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r1, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:07 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:07 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') fcntl$setown(r1, 0x8, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:07 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) [ 1263.141945] device bridge_slave_1 left promiscuous mode [ 1263.147597] bridge0: port 2(bridge_slave_1) entered disabled state [ 1263.201549] device bridge_slave_0 left promiscuous mode [ 1263.210573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1263.263862] device veth1_macvtap left promiscuous mode [ 1263.279449] device veth0_macvtap left promiscuous mode [ 1263.285646] device veth1_vlan left promiscuous mode [ 1263.300365] device veth0_vlan left promiscuous mode [ 1263.462592] device hsr_slave_1 left promiscuous mode [ 1263.503759] device hsr_slave_0 left promiscuous mode [ 1263.556984] team0 (unregistering): Port device team_slave_1 removed [ 1263.566122] team0 (unregistering): Port device team_slave_0 removed [ 1263.575529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1263.623309] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1263.676572] bond0 (unregistering): Released all slaves [ 1265.391170] IPVS: ftp: loaded support on port[0] = 21 [ 1266.171700] IPVS: ftp: loaded support on port[0] = 21 [ 1266.173135] chnl_net:caif_netlink_parms(): no params data found [ 1266.261906] IPVS: ftp: loaded support on port[0] = 21 [ 1266.315527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.322178] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.329131] device bridge_slave_0 entered promiscuous mode [ 1266.335630] chnl_net:caif_netlink_parms(): no params data found [ 1266.350960] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.357489] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.364637] device bridge_slave_1 entered promiscuous mode [ 1266.404105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1266.416187] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1266.437397] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1266.444895] team0: Port device team_slave_0 added [ 1266.454352] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1266.461595] team0: Port device team_slave_1 added [ 1266.481536] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1266.487814] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1266.513545] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1266.526948] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1266.533702] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1266.559707] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1266.570517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1266.578096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1266.672219] device hsr_slave_0 entered promiscuous mode [ 1266.710313] device hsr_slave_1 entered promiscuous mode [ 1266.767788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1266.774656] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.781200] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.788156] device bridge_slave_0 entered promiscuous mode [ 1266.798437] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.804892] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.812038] device bridge_slave_1 entered promiscuous mode [ 1266.818557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1266.842378] chnl_net:caif_netlink_parms(): no params data found [ 1266.874011] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1266.886799] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1266.917038] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1266.925532] team0: Port device team_slave_0 added [ 1266.931575] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1266.938712] team0: Port device team_slave_1 added [ 1266.978287] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1266.987217] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1267.012603] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1267.028919] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1267.035364] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1267.060874] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1267.072160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1267.088352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1267.102734] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.109162] bridge0: port 1(bridge_slave_0) entered disabled state [ 1267.116232] device bridge_slave_0 entered promiscuous mode [ 1267.129527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1267.136565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1267.143622] device bridge_slave_1 entered promiscuous mode [ 1267.169363] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1267.223433] device hsr_slave_0 entered promiscuous mode [ 1267.260368] device hsr_slave_1 entered promiscuous mode [ 1267.313435] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1267.323400] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1267.331396] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1267.358182] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1267.374272] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1267.381830] team0: Port device team_slave_0 added [ 1267.395462] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1267.402712] team0: Port device team_slave_1 added [ 1267.430221] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1267.436501] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1267.462289] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1267.482836] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1267.489114] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1267.515430] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1267.535930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1267.544222] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1267.603505] device hsr_slave_0 entered promiscuous mode [ 1267.640342] device hsr_slave_1 entered promiscuous mode [ 1267.683265] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1267.691321] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1267.708041] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1267.743523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1267.769865] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1267.787612] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1267.798611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1267.805873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1267.820416] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1267.826566] 8021q: adding VLAN 0 to HW filter on device team0 [ 1267.841874] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1267.854807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1267.864859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1267.872737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1267.880693] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.887038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1267.898214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1267.906566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1267.917056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1267.925805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1267.933482] bridge0: port 2(bridge_slave_1) entered blocking state [ 1267.939824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1267.949336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1267.959486] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1267.967404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1267.975980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1267.986573] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1267.993073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1268.000689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1268.012523] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1268.021678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1268.031862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1268.040804] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1268.046906] 8021q: adding VLAN 0 to HW filter on device team0 [ 1268.053294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1268.061186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1268.069127] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1268.078936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1268.088584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1268.096607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1268.112168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1268.121283] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1268.129258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1268.137925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1268.146924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1268.154109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1268.163722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1268.171524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.177906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1268.184953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1268.192942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1268.200526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1268.208007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1268.217990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1268.227936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1268.236174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1268.243325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1268.251419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1268.258950] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.265369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1268.272501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1268.279350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1268.287475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1268.295468] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1268.301973] 8021q: adding VLAN 0 to HW filter on device team0 [ 1268.309472] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1268.315869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1268.323945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1268.334637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1268.344828] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1268.352031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1268.359954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1268.367859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1268.376154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.382616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1268.391138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1268.397980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1268.405223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1268.412965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1268.424799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1268.433093] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1268.443980] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1268.452525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1268.460774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1268.468428] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.474896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1268.483611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1268.491509] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1268.502387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1268.512651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1268.522410] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1268.528830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1268.536782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1268.544556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1268.554260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1268.563167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1268.573413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1268.581261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1268.588597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1268.596248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1268.604214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1268.612116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1268.620305] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1268.626546] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1268.634244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1268.641709] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1268.651623] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1268.657707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1268.667097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1268.677954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1268.685865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1268.694212] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1268.702193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1268.710943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1268.722377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1268.730369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1268.737942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1268.749254] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1268.758137] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1268.766346] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1268.773903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1268.784989] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1268.792322] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1268.799073] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1268.813560] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1268.827274] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1268.835886] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1268.843026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1268.850464] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1268.862739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1268.919269] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1268.931871] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1268.938983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1268.953505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1269.002209] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1269.015475] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1269.024282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1269.034537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1269.046429] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1269.054591] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1269.061552] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1269.072484] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1269.083598] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1269.091006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1269.098421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1269.108682] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1269.121372] device veth0_vlan entered promiscuous mode [ 1269.127149] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1269.135083] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1269.142265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1269.150284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1269.162213] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1269.169192] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1269.176609] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1269.186498] device veth1_vlan entered promiscuous mode [ 1269.192991] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1269.201044] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1269.209748] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1269.217717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1269.225475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1269.233831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1269.241065] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1269.248535] device veth0_vlan entered promiscuous mode [ 1269.257685] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1269.265489] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1269.272241] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1269.279448] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1269.293791] device veth1_vlan entered promiscuous mode [ 1269.299630] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1269.312488] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1269.322369] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1269.332058] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1269.342276] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1269.349488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1269.357379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1269.364735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1269.372674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1269.380338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1269.389169] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1269.396407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1269.403937] device veth0_vlan entered promiscuous mode [ 1269.412221] device veth0_macvtap entered promiscuous mode [ 1269.418323] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1269.434545] device veth1_macvtap entered promiscuous mode [ 1269.445424] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1269.454477] device veth1_vlan entered promiscuous mode [ 1269.466956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1269.477851] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1269.488437] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1269.496083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.506313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.516498] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1269.523575] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1269.534730] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1269.541958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1269.549463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1269.557357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1269.565156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1269.575429] device veth0_macvtap entered promiscuous mode [ 1269.581906] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1269.591398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.602716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.613057] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1269.619946] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1269.630428] device veth1_macvtap entered promiscuous mode [ 1269.636567] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1269.643573] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1269.652650] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1269.659794] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1269.667653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1269.687670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1269.701403] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1269.713021] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1269.722316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.733717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.742922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.753214] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.763233] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1269.770503] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1269.781189] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1269.791305] device veth0_macvtap entered promiscuous mode [ 1269.797409] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1269.804136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1269.812029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1269.819790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1269.827596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1269.835824] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1269.845088] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.855330] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.865171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1269.875030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.885050] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1269.892264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1269.901312] device veth1_macvtap entered promiscuous mode [ 1269.907413] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1269.916729] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1269.924357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1269.932834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1269.953415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1269.964962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1269.978328] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1269.988736] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1269.999719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1270.009657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1270.018840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1270.028867] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1270.039571] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1270.046654] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1270.056115] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1270.064445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1270.075132] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1270.085519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1270.095105] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1270.105249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1270.114665] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1270.125032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1270.135088] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1270.142236] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1270.153300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1270.161750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1271.264117] tc_dump_action: action bad kind [ 1271.318990] tc_dump_action: action bad kind 20:16:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:16 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:16:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1271.368427] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1271.377846] batman_adv: batadv0: Removing interface: batadv_slave_0 20:16:16 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1271.418734] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1271.427785] batman_adv: batadv0: Removing interface: batadv_slave_1 20:16:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:16:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:16 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:16:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:16 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) 20:16:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, 0x0, 0x0, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:17 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 1272.382205] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1272.395082] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1272.413485] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1272.430287] batman_adv: batadv0: Removing interface: batadv_slave_1 20:16:17 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1272.576529] device bridge_slave_1 left promiscuous mode [ 1272.601630] bridge0: port 2(bridge_slave_1) entered disabled state [ 1272.650925] device bridge_slave_0 left promiscuous mode [ 1272.657766] bridge0: port 1(bridge_slave_0) entered disabled state 20:16:17 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:17 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1272.723233] device veth1_macvtap left promiscuous mode [ 1272.736532] device veth0_macvtap left promiscuous mode [ 1272.773710] device veth1_vlan left promiscuous mode [ 1272.796630] device veth0_vlan left promiscuous mode [ 1273.123060] device hsr_slave_1 left promiscuous mode [ 1273.173994] device hsr_slave_0 left promiscuous mode [ 1273.235786] team0 (unregistering): Port device team_slave_1 removed [ 1273.255784] team0 (unregistering): Port device team_slave_0 removed [ 1273.280159] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1273.334200] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1273.461554] bond0 (unregistering): Released all slaves [ 1275.141504] IPVS: ftp: loaded support on port[0] = 21 [ 1275.924240] IPVS: ftp: loaded support on port[0] = 21 [ 1275.991609] chnl_net:caif_netlink_parms(): no params data found [ 1276.051895] IPVS: ftp: loaded support on port[0] = 21 [ 1276.103101] chnl_net:caif_netlink_parms(): no params data found [ 1276.144540] bridge0: port 1(bridge_slave_0) entered blocking state [ 1276.151598] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.159066] device bridge_slave_0 entered promiscuous mode [ 1276.168319] bridge0: port 2(bridge_slave_1) entered blocking state [ 1276.175072] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.182966] device bridge_slave_1 entered promiscuous mode [ 1276.216772] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1276.229638] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1276.259655] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1276.266980] team0: Port device team_slave_0 added [ 1276.275543] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1276.283565] team0: Port device team_slave_1 added [ 1276.318922] bridge0: port 1(bridge_slave_0) entered blocking state [ 1276.326341] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.333727] device bridge_slave_0 entered promiscuous mode [ 1276.341699] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1276.348146] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1276.374412] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1276.384468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1276.391714] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.398668] device bridge_slave_1 entered promiscuous mode [ 1276.405745] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1276.412356] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1276.439127] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1276.466119] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1276.476277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1276.484867] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1276.495698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1276.532469] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1276.539783] team0: Port device team_slave_0 added [ 1276.572586] device hsr_slave_0 entered promiscuous mode [ 1276.620645] device hsr_slave_1 entered promiscuous mode [ 1276.666589] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1276.673993] team0: Port device team_slave_1 added [ 1276.685841] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1276.695303] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1276.757548] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1276.764781] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1276.790272] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1276.801974] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1276.808398] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1276.833911] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1276.846798] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1276.857413] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1276.864859] chnl_net:caif_netlink_parms(): no params data found [ 1276.953420] device hsr_slave_0 entered promiscuous mode [ 1276.982281] device hsr_slave_1 entered promiscuous mode [ 1277.039622] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1277.054336] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1277.141989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1277.148645] bridge0: port 1(bridge_slave_0) entered disabled state [ 1277.156402] device bridge_slave_0 entered promiscuous mode [ 1277.166506] bridge0: port 2(bridge_slave_1) entered blocking state [ 1277.173324] bridge0: port 2(bridge_slave_1) entered disabled state [ 1277.180542] device bridge_slave_1 entered promiscuous mode [ 1277.215140] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1277.224551] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1277.237875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1277.265015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1277.272466] team0: Port device team_slave_0 added [ 1277.278976] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1277.287152] team0: Port device team_slave_1 added [ 1277.320800] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1277.327427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1277.353303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1277.365888] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1277.374492] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1277.400754] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1277.417292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1277.427467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1277.492605] device hsr_slave_0 entered promiscuous mode [ 1277.541611] device hsr_slave_1 entered promiscuous mode [ 1277.581158] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1277.589041] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1277.599709] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1277.687411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1277.710421] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1277.724211] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1277.732111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1277.739348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1277.758624] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1277.765704] 8021q: adding VLAN 0 to HW filter on device team0 [ 1277.783877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1277.796261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1277.807690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1277.816141] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1277.826523] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1277.833282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1277.841482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1277.849047] bridge0: port 1(bridge_slave_0) entered blocking state [ 1277.855709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1277.863434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1277.872484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1277.880152] bridge0: port 2(bridge_slave_1) entered blocking state [ 1277.886515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1277.893588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1277.900645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1277.907848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1277.918184] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1277.928239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1277.939643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1277.950363] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1277.956771] 8021q: adding VLAN 0 to HW filter on device team0 [ 1277.971139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1277.981281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1277.988522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1277.996837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1278.004997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1278.012921] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.019397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1278.026785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1278.037550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1278.047747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1278.056357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1278.064818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1278.072928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1278.081086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1278.088939] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.095680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.104309] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1278.116681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1278.126812] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1278.134070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1278.142561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1278.150863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1278.172095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1278.183297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1278.191045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1278.201004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1278.211982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1278.221092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1278.227827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1278.238865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1278.246595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1278.255741] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1278.262495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1278.273761] device bridge_slave_1 left promiscuous mode [ 1278.279352] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.330761] device bridge_slave_0 left promiscuous mode [ 1278.336432] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.392539] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1278.399842] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1278.408144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1278.415185] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1278.423799] device bridge_slave_1 left promiscuous mode [ 1278.429431] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.470775] device bridge_slave_0 left promiscuous mode [ 1278.476625] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.524412] device veth1_macvtap left promiscuous mode [ 1278.530672] device veth0_macvtap left promiscuous mode [ 1278.536140] device veth1_vlan left promiscuous mode [ 1278.541685] device veth0_vlan left promiscuous mode [ 1278.547087] device veth1_macvtap left promiscuous mode [ 1278.553799] device veth0_macvtap left promiscuous mode [ 1278.559136] device veth1_vlan left promiscuous mode [ 1278.566408] device veth0_vlan left promiscuous mode [ 1278.722659] device hsr_slave_1 left promiscuous mode [ 1278.765055] device hsr_slave_0 left promiscuous mode [ 1278.809025] team0 (unregistering): Port device team_slave_1 removed [ 1278.819065] team0 (unregistering): Port device team_slave_0 removed [ 1278.829029] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1278.864654] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1278.919503] bond0 (unregistering): Released all slaves [ 1279.025986] device hsr_slave_1 left promiscuous mode [ 1279.064776] device hsr_slave_0 left promiscuous mode [ 1279.108734] team0 (unregistering): Port device team_slave_1 removed [ 1279.118994] team0 (unregistering): Port device team_slave_0 removed [ 1279.130006] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1279.164798] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1279.239961] bond0 (unregistering): Released all slaves [ 1279.286691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1279.299994] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1279.307671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1279.316908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1279.325177] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1279.336646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1279.348392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1279.357615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1279.367751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1279.375680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1279.383308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1279.392576] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1279.401912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1279.415630] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1279.422326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1279.429576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1279.436965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1279.445125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1279.455056] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1279.462397] 8021q: adding VLAN 0 to HW filter on device team0 [ 1279.470441] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1279.476544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1279.485678] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1279.494285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1279.501941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1279.517793] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1279.526891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1279.539131] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1279.548270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1279.556582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1279.565232] bridge0: port 1(bridge_slave_0) entered blocking state [ 1279.572036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1279.579100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1279.587272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1279.595987] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1279.606199] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1279.617304] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1279.625528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1279.634124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1279.642800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1279.651093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1279.657775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1279.671432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1279.679246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1279.694871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1279.702510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1279.801625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1279.808998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1279.818263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1279.829645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1279.840978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1279.848563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1279.865949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1279.877628] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1279.886710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1279.896151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1279.907403] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1279.918016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1279.926192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1279.941155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1279.952161] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1279.965498] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1279.972718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1279.983183] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1279.991714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1280.001125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1280.023372] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1280.036063] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1280.051190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1280.059774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1280.078542] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1280.091758] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1280.098619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1280.118569] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1280.134008] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1280.143749] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1280.169127] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1280.183816] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1280.197383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1280.215427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1280.228269] device veth0_vlan entered promiscuous mode [ 1280.239137] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1280.254824] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1280.261841] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1280.268269] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1280.280747] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1280.293205] device veth1_vlan entered promiscuous mode [ 1280.299696] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1280.315490] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1280.323753] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1280.332684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1280.341052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1280.349140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1280.358193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1280.368415] device veth0_vlan entered promiscuous mode [ 1280.386729] device veth1_vlan entered promiscuous mode [ 1280.404287] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1280.429698] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1280.443032] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1280.451859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1280.462695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1280.480674] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1280.490882] device veth0_macvtap entered promiscuous mode [ 1280.497398] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1280.513920] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1280.524499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1280.533447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1280.547360] device veth0_macvtap entered promiscuous mode [ 1280.555412] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1280.565091] device veth1_macvtap entered promiscuous mode [ 1280.574151] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1280.593055] device veth1_macvtap entered promiscuous mode [ 1280.602868] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1280.613335] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1280.624404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1280.637424] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1280.652836] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1280.664864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1280.674123] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1280.681858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1280.689120] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1280.703129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1280.712231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1280.723146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1280.732333] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1280.744213] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.755661] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1280.763233] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1280.773726] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1280.784246] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.793978] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1280.803738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.813886] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1280.821343] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1280.829827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1280.839270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1280.847715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1280.856729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1280.867339] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1280.878083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.889830] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1280.897466] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1280.906976] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1280.917879] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.927620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1280.938143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.949739] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1280.957054] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1280.964722] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1280.972824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1280.981340] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1280.989176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1280.998546] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1281.006684] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1281.014218] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1281.042778] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1281.049687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1281.058519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1281.072053] device veth0_vlan entered promiscuous mode [ 1281.079165] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1281.087568] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1281.107268] device veth1_vlan entered promiscuous mode [ 1281.113779] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1281.129910] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1281.147695] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1281.159360] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1281.167448] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1281.175996] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1281.184438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1281.193475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1281.208337] device veth0_macvtap entered promiscuous mode [ 1281.215695] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1281.227117] device veth1_macvtap entered promiscuous mode [ 1281.233854] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1281.245469] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1281.257263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1281.267946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.278307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.289996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.300290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.309679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.320197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.332131] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1281.339369] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1281.349760] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1281.358678] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1281.366443] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1281.378172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1281.389455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.400847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.411426] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.421709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.431958] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.442438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.453116] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1281.460738] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1281.469793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1281.478906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1282.602621] tc_dump_action: action bad kind [ 1282.616351] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1282.624516] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1282.670895] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1282.678072] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1282.733073] tc_dump_action: action bad kind 20:16:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) 20:16:27 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:27 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, 0x0, 0x0, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:27 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:27 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:16:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:27 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:27 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:27 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000000000000000000000000000007f000001000000000000000000000000000000000000000000000000030000000000d28a0f6c487cf649ac000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000002000000000000000400008001e0000001f00000000000000666c617465000000000000000000000000000000000000000000002ec1710147f37e7b01370564c7d08e03000000000000000000000000000000665d6ed5e8b38e21ba9a815732f0b000000200000c04b300000000000000f3168ab74c1ec12ac90000000020dbd44355722d3cbb68b7772ad1ce0adf4239613190e15b4d3fd3b5584b08b3270ae7f1cae570e2a781e105de"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:16:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, 0x0, 0x0, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:27 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:28 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 1283.513009] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1283.530461] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1283.546145] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1283.554537] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1283.563600] device bridge_slave_1 left promiscuous mode [ 1283.569599] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.621686] device bridge_slave_0 left promiscuous mode [ 1283.627244] bridge0: port 1(bridge_slave_0) entered disabled state [ 1283.684858] device veth1_macvtap left promiscuous mode [ 1283.700440] device veth0_macvtap left promiscuous mode [ 1283.710423] device veth1_vlan left promiscuous mode [ 1283.715780] device veth0_vlan left promiscuous mode [ 1283.943969] device hsr_slave_1 left promiscuous mode [ 1283.983915] device hsr_slave_0 left promiscuous mode [ 1284.052772] team0 (unregistering): Port device team_slave_1 removed [ 1284.075074] team0 (unregistering): Port device team_slave_0 removed [ 1284.094079] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1284.144189] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1284.260780] bond0 (unregistering): Released all slaves [ 1286.010921] IPVS: ftp: loaded support on port[0] = 21 [ 1286.838957] chnl_net:caif_netlink_parms(): no params data found [ 1286.851886] IPVS: ftp: loaded support on port[0] = 21 [ 1286.898087] bridge0: port 1(bridge_slave_0) entered blocking state [ 1286.904832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1286.912667] device bridge_slave_0 entered promiscuous mode [ 1286.922959] bridge0: port 2(bridge_slave_1) entered blocking state [ 1286.929339] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.936798] device bridge_slave_1 entered promiscuous mode [ 1286.966959] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1286.977965] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1287.000713] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1287.007780] team0: Port device team_slave_0 added [ 1287.013893] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1287.021138] team0: Port device team_slave_1 added [ 1287.038984] IPVS: ftp: loaded support on port[0] = 21 [ 1287.043253] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1287.050551] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1287.076500] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1287.093073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1287.099333] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1287.126254] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1287.139223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1287.151684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1287.252488] device hsr_slave_0 entered promiscuous mode [ 1287.300440] device hsr_slave_1 entered promiscuous mode [ 1287.363856] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1287.373963] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1287.429977] chnl_net:caif_netlink_parms(): no params data found [ 1287.572493] chnl_net:caif_netlink_parms(): no params data found [ 1287.634984] bridge0: port 1(bridge_slave_0) entered blocking state [ 1287.641985] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.711855] device bridge_slave_0 entered promiscuous mode [ 1287.719125] bridge0: port 2(bridge_slave_1) entered blocking state [ 1287.725518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1287.732209] bridge0: port 1(bridge_slave_0) entered blocking state [ 1287.738556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1287.752424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1287.758823] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.765945] device bridge_slave_1 entered promiscuous mode [ 1287.788908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1287.803399] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1287.828841] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1287.836544] team0: Port device team_slave_0 added [ 1287.842097] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.848884] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.863375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1287.869760] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.877435] device bridge_slave_0 entered promiscuous mode [ 1287.884131] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1287.891557] team0: Port device team_slave_1 added [ 1287.901681] bridge0: port 2(bridge_slave_1) entered blocking state [ 1287.908079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.919976] device bridge_slave_1 entered promiscuous mode [ 1287.948491] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1287.958539] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1287.979224] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1287.985626] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1288.011386] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1288.031374] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1288.037639] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1288.063070] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1288.073392] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1288.081223] team0: Port device team_slave_0 added [ 1288.086444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1288.094906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1288.103899] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1288.111085] team0: Port device team_slave_1 added [ 1288.143314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1288.149581] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1288.175824] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1288.197464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1288.203800] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1288.229119] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1288.292396] device hsr_slave_0 entered promiscuous mode [ 1288.330429] device hsr_slave_1 entered promiscuous mode [ 1288.370578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1288.377786] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1288.385969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1288.393919] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1288.454211] device hsr_slave_0 entered promiscuous mode [ 1288.490457] device hsr_slave_1 entered promiscuous mode [ 1288.538477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1288.554800] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1288.564885] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1288.574948] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1288.605182] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1288.618783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1288.625986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1288.652723] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1288.658935] 8021q: adding VLAN 0 to HW filter on device team0 [ 1288.692523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1288.706407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1288.714503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1288.722263] bridge0: port 1(bridge_slave_0) entered blocking state [ 1288.728657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1288.764520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1288.777973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1288.786096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1288.794368] bridge0: port 2(bridge_slave_1) entered blocking state [ 1288.800782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1288.811370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1288.824177] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1288.837719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1288.849156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1288.858409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1288.869693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1288.884781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1288.892827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1288.903448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1288.913956] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1288.921692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1288.929497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1288.941269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1288.950558] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1288.957072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1288.964998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1288.991700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1289.003478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1289.012613] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1289.018966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1289.027122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1289.047375] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1289.055535] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1289.061821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1289.068793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1289.078988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1289.088977] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1289.096047] 8021q: adding VLAN 0 to HW filter on device team0 [ 1289.109824] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1289.120140] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1289.128960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1289.136498] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1289.149029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1289.158639] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1289.167607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1289.177903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1289.186359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1289.194466] bridge0: port 1(bridge_slave_0) entered blocking state [ 1289.200882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1289.211051] device bridge_slave_1 left promiscuous mode [ 1289.216578] bridge0: port 2(bridge_slave_1) entered disabled state [ 1289.262442] device bridge_slave_0 left promiscuous mode [ 1289.267981] bridge0: port 1(bridge_slave_0) entered disabled state [ 1289.312316] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1289.319037] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1289.326881] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1289.333750] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1289.341497] device bridge_slave_1 left promiscuous mode [ 1289.346964] bridge0: port 2(bridge_slave_1) entered disabled state [ 1289.390947] device bridge_slave_0 left promiscuous mode [ 1289.396429] bridge0: port 1(bridge_slave_0) entered disabled state [ 1289.454456] device veth1_macvtap left promiscuous mode [ 1289.459789] device veth0_macvtap left promiscuous mode [ 1289.465211] device veth1_vlan left promiscuous mode [ 1289.470361] device veth0_vlan left promiscuous mode [ 1289.475681] device veth1_macvtap left promiscuous mode [ 1289.481167] device veth0_macvtap left promiscuous mode [ 1289.486644] device veth1_vlan left promiscuous mode [ 1289.491810] device veth0_vlan left promiscuous mode [ 1289.662321] device hsr_slave_1 left promiscuous mode [ 1289.702707] device hsr_slave_0 left promiscuous mode [ 1289.747076] team0 (unregistering): Port device team_slave_1 removed [ 1289.757981] team0 (unregistering): Port device team_slave_0 removed [ 1289.767132] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1289.814741] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1289.899871] bond0 (unregistering): Released all slaves [ 1289.995173] device hsr_slave_1 left promiscuous mode [ 1290.042699] device hsr_slave_0 left promiscuous mode [ 1290.087233] team0 (unregistering): Port device team_slave_1 removed [ 1290.097925] team0 (unregistering): Port device team_slave_0 removed [ 1290.107317] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1290.173930] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1290.240203] bond0 (unregistering): Released all slaves [ 1290.285210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1290.294705] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1290.301433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1290.308625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1290.317072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1290.324975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1290.331478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1290.346786] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1290.357697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1290.368669] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1290.379553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1290.391297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1290.398451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1290.406148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1290.413449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1290.421325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1290.429657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1290.437568] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1290.447434] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1290.453963] 8021q: adding VLAN 0 to HW filter on device team0 [ 1290.463244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1290.473107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1290.481807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1290.490751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1290.503783] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1290.511298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1290.519090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1290.526760] bridge0: port 1(bridge_slave_0) entered blocking state [ 1290.533163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1290.540237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1290.547779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1290.557804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1290.567525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1290.575231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1290.583522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1290.591681] bridge0: port 2(bridge_slave_1) entered blocking state [ 1290.598051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1290.612451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1290.621435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1290.629839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1290.638397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1290.646405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1290.654044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1290.662264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1290.673817] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1290.679876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1290.688981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1290.699160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1290.708417] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1290.719457] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1290.727394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1290.735847] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1290.743893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1290.752061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1290.759678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1290.767800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1290.775830] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1290.787001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1290.795291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1290.805826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1290.817121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1290.826999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1290.835236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1290.845838] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1290.854923] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1290.863911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1290.872855] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1290.879557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1290.888235] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1290.903458] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1290.913164] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1290.920723] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1290.927463] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1290.961174] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1291.012823] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1291.024951] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1291.033066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1291.044388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1291.052768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1291.059555] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1291.077689] device veth0_vlan entered promiscuous mode [ 1291.089483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1291.103830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1291.124049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1291.134461] device veth1_vlan entered promiscuous mode [ 1291.150905] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1291.168722] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1291.195985] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1291.219753] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1291.231900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1291.239177] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1291.254284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1291.265749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1291.276441] device veth0_macvtap entered promiscuous mode [ 1291.283999] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1291.299952] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1291.311402] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1291.319883] device veth1_macvtap entered promiscuous mode [ 1291.331895] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1291.339553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1291.353719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1291.373530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1291.396217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1291.412980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1291.429516] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1291.451458] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1291.458469] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1291.474676] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1291.491144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1291.510735] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1291.527232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1291.538387] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1291.548380] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1291.562108] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1291.573350] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1291.585932] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1291.595570] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1291.606248] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1291.614863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1291.633395] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1291.647703] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1291.659446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1291.672022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1291.689428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1291.704017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1291.712994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1291.722632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1291.731918] device veth0_vlan entered promiscuous mode [ 1291.749027] device veth1_vlan entered promiscuous mode [ 1291.762848] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1291.785024] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1291.813588] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1291.824565] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1291.832713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1291.844675] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1291.852298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1291.863726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1291.876527] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1291.887457] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1291.894619] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1291.904117] device veth0_macvtap entered promiscuous mode [ 1291.913458] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1291.924442] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1291.933668] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1291.941640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1291.949027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1291.956717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1291.965286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1291.974910] device veth1_macvtap entered promiscuous mode [ 1291.981469] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1291.989054] device veth0_vlan entered promiscuous mode [ 1292.015178] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1292.027646] device veth1_vlan entered promiscuous mode [ 1292.038175] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1292.048681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1292.060992] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1292.071455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.082532] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.091718] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.101481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.111856] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1292.118823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1292.134199] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1292.141401] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1292.148532] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1292.156856] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1292.167259] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1292.175362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1292.185199] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.195424] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.204727] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.214527] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.224685] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1292.232145] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1292.243314] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1292.252623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1292.262206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1292.270225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1292.277845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1292.291933] device veth0_macvtap entered promiscuous mode [ 1292.298236] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1292.310970] device veth1_macvtap entered promiscuous mode [ 1292.317321] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1292.328180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1292.338452] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1292.347520] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1292.358673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1292.376425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.386924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.396356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.406539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.415767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1292.425575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.436217] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1292.444145] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1292.454494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1292.465451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1292.477747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.495674] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.507357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.517824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.527110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1292.536910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1292.547410] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1292.555520] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1292.568568] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1292.577402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:16:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:37 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000000000000000000000000000007f000001000000000000000000000000000000000000000000000000030000000000d28a0f6c487cf649ac000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000002000000000000000400008001e0000001f00000000000000666c617465000000000000000000000000000000000000000000002ec1710147f37e7b01370564c7d08e03000000000000000000000000000000665d6ed5e8b38e21ba9a815732f0b000000200000c04b300000000000000f3168ab74c1ec12ac90000000020dbd44355722d3cbb68b7772ad1ce0adf4239613190e15b4d3fd3b5584b08b3270ae7f1cae570e2a781e105de"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:37 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1293.553586] tc_dump_action: action bad kind [ 1293.575788] tc_dump_action: action bad kind [ 1293.627369] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1293.634499] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1293.644695] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1293.653885] batman_adv: batadv0: Removing interface: batadv_slave_1 20:16:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:38 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:38 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1293.713689] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1293.721727] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1293.730731] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1293.737610] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1293.747476] device bridge_slave_1 left promiscuous mode [ 1293.755957] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.811394] device bridge_slave_0 left promiscuous mode [ 1293.817893] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.883430] device veth1_macvtap left promiscuous mode [ 1293.894755] device veth0_macvtap left promiscuous mode [ 1293.906011] device veth1_vlan left promiscuous mode [ 1293.920416] device veth0_vlan left promiscuous mode [ 1294.162753] device hsr_slave_1 left promiscuous mode [ 1294.204203] device hsr_slave_0 left promiscuous mode [ 1294.279816] team0 (unregistering): Port device team_slave_1 removed [ 1294.306355] team0 (unregistering): Port device team_slave_0 removed [ 1294.325535] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1294.393675] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1294.462409] bond0 (unregistering): Released all slaves 20:16:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:39 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:39 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:16:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:39 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 1297.361290] IPVS: ftp: loaded support on port[0] = 21 [ 1298.122335] IPVS: ftp: loaded support on port[0] = 21 [ 1298.164020] chnl_net:caif_netlink_parms(): no params data found [ 1298.214711] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.221907] bridge0: port 1(bridge_slave_0) entered disabled state [ 1298.229173] device bridge_slave_0 entered promiscuous mode [ 1298.238482] bridge0: port 2(bridge_slave_1) entered blocking state [ 1298.245273] bridge0: port 2(bridge_slave_1) entered disabled state [ 1298.254075] device bridge_slave_1 entered promiscuous mode [ 1298.285730] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1298.297547] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1298.321352] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1298.328523] team0: Port device team_slave_0 added [ 1298.334788] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1298.342140] team0: Port device team_slave_1 added [ 1298.364723] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1298.371122] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1298.397869] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1298.409464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1298.415856] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1298.441165] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1298.451785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1298.470314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1298.572345] device hsr_slave_0 entered promiscuous mode [ 1298.630381] device hsr_slave_1 entered promiscuous mode [ 1298.690389] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1298.699811] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1298.713903] chnl_net:caif_netlink_parms(): no params data found [ 1298.814804] bridge0: port 2(bridge_slave_1) entered blocking state [ 1298.821361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1298.828015] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.834456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1298.858980] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.865666] bridge0: port 1(bridge_slave_0) entered disabled state [ 1298.873643] device bridge_slave_0 entered promiscuous mode [ 1298.880927] bridge0: port 2(bridge_slave_1) entered blocking state [ 1298.887440] bridge0: port 2(bridge_slave_1) entered disabled state [ 1298.894798] device bridge_slave_1 entered promiscuous mode [ 1298.918943] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1298.928548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1298.954221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1298.962966] team0: Port device team_slave_0 added [ 1298.968916] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1298.976399] team0: Port device team_slave_1 added [ 1298.995400] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1299.003535] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1299.029137] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1299.049063] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1299.055479] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1299.081211] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1299.092214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1299.099933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1299.172295] device hsr_slave_0 entered promiscuous mode [ 1299.210434] device hsr_slave_1 entered promiscuous mode [ 1299.251160] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.258093] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.266554] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1299.279611] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1299.294017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1299.303772] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1299.321593] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1299.327823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1299.335392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1299.354550] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1299.360780] 8021q: adding VLAN 0 to HW filter on device team0 [ 1299.383250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1299.393420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1299.403730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1299.411674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1299.419367] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.425784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1299.432810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1299.441253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1299.448880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1299.455356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1299.464351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1299.487657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1299.499166] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1299.509793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1299.530088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1299.543723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1299.551483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1299.561542] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1299.569316] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1299.576262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1299.584473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1299.592253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1299.602763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1299.613846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1299.621785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1299.646013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1299.653899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1299.662000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1299.677258] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1299.683599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1299.702659] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1299.713117] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1299.724041] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1299.732883] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1299.739585] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1299.748820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1299.756123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1299.763612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1299.770520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1299.779522] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1299.786576] 8021q: adding VLAN 0 to HW filter on device team0 [ 1299.798977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1299.807540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1299.817011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1299.826544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1299.834767] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.841148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1299.851424] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1299.867279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1299.874594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1299.882806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1299.890497] bridge0: port 2(bridge_slave_1) entered blocking state [ 1299.896878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1299.905778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1299.914333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1299.925151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1299.934923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1299.946743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1299.954417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1299.962665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1299.970986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1299.982010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1299.990984] device bridge_slave_1 left promiscuous mode [ 1299.996532] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.032168] device bridge_slave_0 left promiscuous mode [ 1300.037707] bridge0: port 1(bridge_slave_0) entered disabled state [ 1300.082186] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1300.088968] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1300.097341] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1300.104207] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1300.113149] device bridge_slave_1 left promiscuous mode [ 1300.118645] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.160774] device bridge_slave_0 left promiscuous mode [ 1300.166295] bridge0: port 1(bridge_slave_0) entered disabled state [ 1300.213990] device veth1_macvtap left promiscuous mode [ 1300.219323] device veth0_macvtap left promiscuous mode [ 1300.224815] device veth1_vlan left promiscuous mode [ 1300.229893] device veth0_vlan left promiscuous mode [ 1300.235561] device veth1_macvtap left promiscuous mode [ 1300.240978] device veth0_macvtap left promiscuous mode [ 1300.246307] device veth1_vlan left promiscuous mode [ 1300.251641] device veth0_vlan left promiscuous mode [ 1300.444097] device hsr_slave_1 left promiscuous mode [ 1300.492861] device hsr_slave_0 left promiscuous mode [ 1300.537677] team0 (unregistering): Port device team_slave_1 removed [ 1300.548211] team0 (unregistering): Port device team_slave_0 removed [ 1300.557315] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1300.605151] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1300.678677] bond0 (unregistering): Released all slaves [ 1300.774053] device hsr_slave_1 left promiscuous mode [ 1300.813967] device hsr_slave_0 left promiscuous mode [ 1300.867513] team0 (unregistering): Port device team_slave_1 removed [ 1300.878194] team0 (unregistering): Port device team_slave_0 removed [ 1300.887250] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1300.933096] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1300.999404] bond0 (unregistering): Released all slaves [ 1301.036242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1301.044032] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1301.054448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1301.062003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1301.069583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1301.082666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1301.093682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1301.101245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1301.110422] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1301.118109] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1301.124391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1301.144615] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1301.152573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1301.164755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1301.176588] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1301.186605] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1301.193302] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1301.201155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1301.213406] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1301.226991] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1301.235832] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1301.243330] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1301.258164] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1301.265045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1301.273339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1301.281301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1301.288184] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1301.330822] device veth0_vlan entered promiscuous mode [ 1301.374516] device veth1_vlan entered promiscuous mode [ 1301.383327] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1301.394215] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1301.417244] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1301.437232] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1301.453049] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1301.461558] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1301.469134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1301.477522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1301.488885] device veth0_macvtap entered promiscuous mode [ 1301.496214] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1301.506243] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1301.517191] device veth1_macvtap entered promiscuous mode [ 1301.524116] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1301.535112] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1301.543812] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1301.551795] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1301.559103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1301.574136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1301.583789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1301.595436] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1301.611721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1301.628335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1301.639530] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1301.649271] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1301.659733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1301.671310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1301.681454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1301.700491] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1301.715053] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1301.727954] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1301.738133] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1301.746493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1301.760666] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1301.767879] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1301.775668] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1301.796569] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1301.806022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1301.816592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1301.827775] device veth0_vlan entered promiscuous mode [ 1301.838436] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1301.846450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1301.859327] device veth1_vlan entered promiscuous mode [ 1301.866113] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1301.893066] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1301.909920] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1301.923860] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1301.931422] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1301.938648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1301.947770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1301.955642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1301.966910] device veth0_macvtap entered promiscuous mode [ 1301.973820] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1301.992817] device veth1_macvtap entered promiscuous mode [ 1301.999321] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1302.012982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1302.024913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1302.036057] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1302.046438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.056052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1302.066431] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.077520] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1302.085339] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1302.095314] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1302.103593] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1302.113479] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1302.122018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1302.135227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1302.145528] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.155558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1302.165406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.175600] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1302.182602] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1302.191280] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1302.199521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1303.204916] tc_dump_action: action bad kind 20:16:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:48 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:16:48 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:48 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1303.568208] IPVS: ftp: loaded support on port[0] = 21 [ 1304.389041] chnl_net:caif_netlink_parms(): no params data found [ 1304.447237] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.453843] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.461730] device bridge_slave_0 entered promiscuous mode [ 1304.468598] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.475127] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.482850] device bridge_slave_1 entered promiscuous mode [ 1304.501101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1304.510207] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1304.534273] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1304.541553] team0: Port device team_slave_0 added [ 1304.547212] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1304.554472] team0: Port device team_slave_1 added [ 1304.574333] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1304.580768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1304.606022] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1304.616883] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1304.623217] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1304.648643] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1304.663369] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1304.670895] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1304.733634] device hsr_slave_0 entered promiscuous mode [ 1304.780352] device hsr_slave_1 entered promiscuous mode [ 1304.843401] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1304.850816] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1304.919108] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.925501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1304.932286] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.938655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1304.975303] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1304.981999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1304.991711] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1305.000785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1305.008039] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.014985] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.028318] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1305.035404] 8021q: adding VLAN 0 to HW filter on device team0 [ 1305.045069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1305.052759] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.059717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1305.073238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1305.080915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.087277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1305.111873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1305.119605] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1305.127842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1305.135290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1305.143470] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1305.154787] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1305.162017] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1305.169460] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1305.176473] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1305.184584] device bridge_slave_1 left promiscuous mode [ 1305.190159] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.220912] device bridge_slave_0 left promiscuous mode [ 1305.226424] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.273860] device veth1_macvtap left promiscuous mode [ 1305.279204] device veth0_macvtap left promiscuous mode [ 1305.284597] device veth1_vlan left promiscuous mode [ 1305.289660] device veth0_vlan left promiscuous mode [ 1305.423762] device hsr_slave_1 left promiscuous mode [ 1305.463958] device hsr_slave_0 left promiscuous mode [ 1305.508688] team0 (unregistering): Port device team_slave_1 removed [ 1305.518460] team0 (unregistering): Port device team_slave_0 removed [ 1305.527784] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1305.573598] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1305.650575] bond0 (unregistering): Released all slaves [ 1305.685399] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1305.691645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1305.699802] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1305.716210] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1305.726240] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1305.735211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1305.742374] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1305.754206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1305.819641] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1305.829653] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1305.837396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1305.846316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1305.935799] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1305.945937] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1305.954159] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1305.967408] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1305.974641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1305.985121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1305.996177] device veth0_vlan entered promiscuous mode [ 1306.006202] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1306.014492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1306.027637] device veth1_vlan entered promiscuous mode [ 1306.034576] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1306.048451] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1306.065795] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1306.078615] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1306.088962] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1306.096925] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1306.107544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1306.115465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1306.128231] device veth0_macvtap entered promiscuous mode [ 1306.135487] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1306.149149] device veth1_macvtap entered promiscuous mode [ 1306.156158] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1306.169234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1306.184128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1306.193694] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1306.206209] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1306.216487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1306.228922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1306.239397] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1306.249655] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1306.259629] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1306.270173] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1306.277333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1306.287856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1306.297776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1306.308941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1306.318446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1306.328759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1306.339175] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1306.347264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1306.354668] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1306.363567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1307.683107] tc_dump_action: action bad kind [ 1307.698542] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1307.705706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1307.716581] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1307.724264] batman_adv: batadv0: Removing interface: batadv_slave_1 20:16:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:52 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000000000000000000000000000007f000001000000000000000000000000000000000000000000000000030000000000d28a0f6c487cf649ac000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000002000000000000000400008001e0000001f00000000000000666c617465000000000000000000000000000000000000000000002ec1710147f37e7b01370564c7d08e03000000000000000000000000000000665d6ed5e8b38e21ba9a815732f0b000000200000c04b300000000000000f3168ab74c1ec12ac90000000020dbd44355722d3cbb68b7772ad1ce0adf4239613190e15b4d3fd3b5584b08b3270ae7f1cae570e2a781e105de"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:52 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4af", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:52 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4af", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:16:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:53 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4af", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:16:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:16:53 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:16:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) [ 1309.061988] device bridge_slave_1 left promiscuous mode [ 1309.067559] bridge0: port 2(bridge_slave_1) entered disabled state [ 1309.140873] device bridge_slave_0 left promiscuous mode [ 1309.146446] bridge0: port 1(bridge_slave_0) entered disabled state [ 1309.202992] device veth1_macvtap left promiscuous mode [ 1309.208364] device veth0_macvtap left promiscuous mode [ 1309.230144] device veth1_vlan left promiscuous mode [ 1309.235248] device veth0_vlan left promiscuous mode [ 1309.482049] device hsr_slave_1 left promiscuous mode [ 1309.543515] device hsr_slave_0 left promiscuous mode [ 1309.598527] team0 (unregistering): Port device team_slave_1 removed [ 1309.608145] team0 (unregistering): Port device team_slave_0 removed [ 1309.617253] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1309.663065] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1309.748090] bond0 (unregistering): Released all slaves [ 1311.461001] IPVS: ftp: loaded support on port[0] = 21 [ 1312.210401] IPVS: ftp: loaded support on port[0] = 21 [ 1312.248098] chnl_net:caif_netlink_parms(): no params data found [ 1312.298261] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.305015] bridge0: port 1(bridge_slave_0) entered disabled state [ 1312.312824] device bridge_slave_0 entered promiscuous mode [ 1312.326726] bridge0: port 2(bridge_slave_1) entered blocking state [ 1312.333310] bridge0: port 2(bridge_slave_1) entered disabled state [ 1312.340344] device bridge_slave_1 entered promiscuous mode [ 1312.366734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1312.377741] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1312.400958] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1312.408123] team0: Port device team_slave_0 added [ 1312.415238] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1312.422373] team0: Port device team_slave_1 added [ 1312.439276] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1312.445672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1312.471229] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1312.482613] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1312.488857] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1312.514078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1312.525924] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1312.536761] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1312.623257] device hsr_slave_0 entered promiscuous mode [ 1312.660450] device hsr_slave_1 entered promiscuous mode [ 1312.720910] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1312.733830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1312.740641] chnl_net:caif_netlink_parms(): no params data found [ 1312.835716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.842685] bridge0: port 1(bridge_slave_0) entered disabled state [ 1312.849550] device bridge_slave_0 entered promiscuous mode [ 1312.857657] bridge0: port 2(bridge_slave_1) entered blocking state [ 1312.864173] bridge0: port 2(bridge_slave_1) entered disabled state [ 1312.871387] device bridge_slave_1 entered promiscuous mode [ 1312.891477] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1312.901198] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1312.914200] bridge0: port 2(bridge_slave_1) entered blocking state [ 1312.920584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1312.927222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.933786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1312.948772] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1312.955986] team0: Port device team_slave_0 added [ 1312.962134] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1312.969321] team0: Port device team_slave_1 added [ 1312.988093] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1312.994507] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1313.019789] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1313.031327] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1313.037611] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1313.062955] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1313.074543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1313.082333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1313.143293] device hsr_slave_0 entered promiscuous mode [ 1313.180444] device hsr_slave_1 entered promiscuous mode [ 1313.220979] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1313.228975] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1313.275587] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.282447] bridge0: port 2(bridge_slave_1) entered disabled state [ 1313.328597] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1313.337639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1313.348817] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1313.359578] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1313.366718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1313.373878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1313.385138] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1313.391398] 8021q: adding VLAN 0 to HW filter on device team0 [ 1313.400687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1313.408961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1313.416907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1313.424511] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.430916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1313.439730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1313.447768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1313.455942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1313.463783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.470159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1313.479578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1313.488521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1313.499158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1313.506101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1313.518536] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1313.526949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1313.535085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1313.543042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1313.561421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1313.569373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1313.579293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1313.586533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1313.594560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1313.602336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1313.609895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1313.619876] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1313.630688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1313.638535] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1313.644845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1313.652549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1313.659948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1313.667200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1313.676318] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1313.682868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1313.694121] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1313.700482] 8021q: adding VLAN 0 to HW filter on device team0 [ 1313.714472] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1313.722085] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1313.728774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1313.738427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1313.746269] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.752659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1313.760596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1313.769036] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1313.776149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1313.783024] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1313.791931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1313.799515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1313.807501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1313.815256] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.821710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1313.834417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1313.842468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1313.849556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1313.863624] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1313.870888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1313.882473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1313.890882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1313.898613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1313.907643] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1313.917201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1313.924713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1313.933043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1313.945031] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1313.952611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1313.960593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1313.972771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1313.979621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1313.988330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1313.998208] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1314.004679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1314.014011] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1314.027466] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1314.036032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1314.046877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1314.057491] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1314.065921] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1314.072916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1314.079662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1314.094473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1314.103974] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1314.111978] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1314.118831] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1314.129220] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1314.136199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1314.144420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1314.152311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1314.159174] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1314.168736] device veth0_vlan entered promiscuous mode [ 1314.181551] device veth1_vlan entered promiscuous mode [ 1314.187543] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1314.197565] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1314.212828] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1314.223621] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1314.230638] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1314.238097] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1314.245479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1314.253151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1314.265760] device veth0_macvtap entered promiscuous mode [ 1314.272142] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1314.279613] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1314.289606] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1314.299040] device veth1_macvtap entered promiscuous mode [ 1314.306668] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1314.317186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1314.329044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1314.340330] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1314.351009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1314.361468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1314.371580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.381289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1314.391672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.401643] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1314.408581] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1314.417610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1314.426817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1314.437226] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1314.444660] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1314.451961] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1314.460645] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1314.472791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.482016] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1314.492299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.502558] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1314.509477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1314.517385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1314.525184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1314.539550] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1314.546665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1314.555839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1314.564053] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1314.572303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1314.582527] device veth0_vlan entered promiscuous mode [ 1314.596393] device veth1_vlan entered promiscuous mode [ 1314.602555] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1314.613188] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1314.627953] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1314.638572] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1314.646786] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1314.654450] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1314.661749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1314.669277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1314.681069] device veth0_macvtap entered promiscuous mode [ 1314.687433] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1314.696892] device veth1_macvtap entered promiscuous mode [ 1314.703066] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1314.717550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1314.728255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1314.740959] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1314.751223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.760779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1314.770692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.779791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1314.789535] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.799773] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1314.806874] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1314.815428] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1314.823248] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1314.830777] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1314.838517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1314.847649] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1314.858820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.868125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1314.878241] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.887624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1314.897446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1314.907479] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1314.914768] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1314.924276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1314.932612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1315.207208] tc_dump_action: action bad kind [ 1315.221169] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1315.227964] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1315.244785] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1315.252258] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1315.300819] tc_dump_action: action bad kind [ 1315.328888] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1315.336149] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1315.346500] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1315.354108] batman_adv: batadv0: Removing interface: batadv_slave_1 20:17:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:00 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd703", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:00 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd703", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) [ 1315.591774] tc_dump_action: action bad kind 20:17:00 executing program 1: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, 0x0, &(0x7f0000000400), 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd703", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 1: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:00 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), 0x0, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1315.976688] tc_dump_action: action bad kind 20:17:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:01 executing program 1: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:01 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 1316.484273] audit: type=1400 audit(1581625021.177:53): avc: denied { map } for pid=28862 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:17:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:01 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:01 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:17:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1317.062739] device bridge_slave_1 left promiscuous mode [ 1317.078531] bridge0: port 2(bridge_slave_1) entered disabled state [ 1317.150952] device bridge_slave_0 left promiscuous mode [ 1317.156537] bridge0: port 1(bridge_slave_0) entered disabled state [ 1317.203457] device veth1_macvtap left promiscuous mode [ 1317.219074] device veth0_macvtap left promiscuous mode [ 1317.224556] device veth1_vlan left promiscuous mode [ 1317.239857] device veth0_vlan left promiscuous mode [ 1317.415138] device hsr_slave_1 left promiscuous mode [ 1317.464158] device hsr_slave_0 left promiscuous mode [ 1317.520838] team0 (unregistering): Port device team_slave_1 removed [ 1317.545598] team0 (unregistering): Port device team_slave_0 removed [ 1317.571965] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1317.604500] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1317.708747] bond0 (unregistering): Released all slaves [ 1319.361427] IPVS: ftp: loaded support on port[0] = 21 [ 1320.141218] IPVS: ftp: loaded support on port[0] = 21 [ 1320.205365] chnl_net:caif_netlink_parms(): no params data found [ 1320.273257] IPVS: ftp: loaded support on port[0] = 21 [ 1320.315041] chnl_net:caif_netlink_parms(): no params data found [ 1320.355712] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.362261] bridge0: port 1(bridge_slave_0) entered disabled state [ 1320.369187] device bridge_slave_0 entered promiscuous mode [ 1320.378326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1320.384795] bridge0: port 2(bridge_slave_1) entered disabled state [ 1320.391864] device bridge_slave_1 entered promiscuous mode [ 1320.420881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1320.438444] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1320.465939] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1320.473727] team0: Port device team_slave_0 added [ 1320.479744] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1320.487107] team0: Port device team_slave_1 added [ 1320.525278] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.531911] bridge0: port 1(bridge_slave_0) entered disabled state [ 1320.538962] device bridge_slave_0 entered promiscuous mode [ 1320.553601] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1320.559984] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1320.586018] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1320.620364] bridge0: port 2(bridge_slave_1) entered blocking state [ 1320.626729] bridge0: port 2(bridge_slave_1) entered disabled state [ 1320.634530] device bridge_slave_1 entered promiscuous mode [ 1320.641217] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1320.647458] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1320.672854] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1320.707556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1320.725362] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1320.747291] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1320.755119] chnl_net:caif_netlink_parms(): no params data found [ 1320.771295] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1320.823658] device hsr_slave_0 entered promiscuous mode [ 1320.860588] device hsr_slave_1 entered promiscuous mode [ 1320.901108] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1320.923190] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1320.930308] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1320.937460] team0: Port device team_slave_0 added [ 1320.954509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1320.961759] team0: Port device team_slave_1 added [ 1321.000868] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1321.007166] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1321.032772] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1321.049231] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1321.056088] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1321.081710] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1321.101766] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1321.124130] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1321.212384] device hsr_slave_0 entered promiscuous mode [ 1321.250356] device hsr_slave_1 entered promiscuous mode [ 1321.290331] bridge0: port 1(bridge_slave_0) entered blocking state [ 1321.296781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.303968] device bridge_slave_0 entered promiscuous mode [ 1321.311039] bridge0: port 2(bridge_slave_1) entered blocking state [ 1321.317421] bridge0: port 2(bridge_slave_1) entered disabled state [ 1321.324552] device bridge_slave_1 entered promiscuous mode [ 1321.335548] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1321.355098] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1321.376402] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1321.386812] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1321.422958] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1321.431865] team0: Port device team_slave_0 added [ 1321.445605] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1321.454483] team0: Port device team_slave_1 added [ 1321.465203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1321.491596] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1321.497870] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1321.523548] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1321.542797] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1321.549086] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1321.574597] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1321.595712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1321.603596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1321.692378] device hsr_slave_0 entered promiscuous mode [ 1321.730376] device hsr_slave_1 entered promiscuous mode [ 1321.781276] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1321.800442] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1321.827133] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1321.919262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1321.929990] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1321.941374] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1321.950451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1321.957369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1321.966969] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1321.979357] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1321.985579] 8021q: adding VLAN 0 to HW filter on device team0 [ 1321.995086] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1322.006187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1322.013327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1322.021327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1322.028952] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.035376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.042404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1322.050464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1322.058016] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.064425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.072819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1322.090769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1322.100614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1322.106809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1322.117753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1322.129307] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1322.139276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1322.149598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1322.157951] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1322.164571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1322.172587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1322.180587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1322.187584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1322.194737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1322.208189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1322.219378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1322.227452] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1322.234239] 8021q: adding VLAN 0 to HW filter on device team0 [ 1322.241160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1322.248832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1322.256716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1322.264347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1322.279411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1322.287992] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1322.299106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1322.307143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1322.315215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1322.323090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1322.331103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1322.338710] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.345105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.352401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1322.360807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1322.368385] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.374763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.382152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1322.391827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1322.399809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1322.412090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1322.421689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1322.433941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1322.442505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1322.450989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1322.458660] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1322.475773] device bridge_slave_1 left promiscuous mode [ 1322.481867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.510977] device bridge_slave_0 left promiscuous mode [ 1322.516501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.562789] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1322.569552] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1322.577284] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1322.584148] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1322.592617] device bridge_slave_1 left promiscuous mode [ 1322.598274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.630985] device bridge_slave_0 left promiscuous mode [ 1322.636467] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.694170] device veth1_macvtap left promiscuous mode [ 1322.699493] device veth0_macvtap left promiscuous mode [ 1322.704969] device veth1_vlan left promiscuous mode [ 1322.710357] device veth0_vlan left promiscuous mode [ 1322.715705] device veth1_macvtap left promiscuous mode [ 1322.721153] device veth0_macvtap left promiscuous mode [ 1322.726467] device veth1_vlan left promiscuous mode [ 1322.731964] device veth0_vlan left promiscuous mode [ 1322.892774] device hsr_slave_1 left promiscuous mode [ 1322.934100] device hsr_slave_0 left promiscuous mode [ 1322.978719] team0 (unregistering): Port device team_slave_1 removed [ 1322.988277] team0 (unregistering): Port device team_slave_0 removed [ 1322.997351] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1323.043043] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1323.119766] bond0 (unregistering): Released all slaves [ 1323.243411] device hsr_slave_1 left promiscuous mode [ 1323.282661] device hsr_slave_0 left promiscuous mode [ 1323.327190] team0 (unregistering): Port device team_slave_1 removed [ 1323.337863] team0 (unregistering): Port device team_slave_0 removed [ 1323.348143] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1323.382922] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1323.450809] bond0 (unregistering): Released all slaves [ 1323.487429] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1323.494862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1323.508584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1323.515188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1323.525201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1323.534100] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1323.546325] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1323.552998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1323.559766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1323.570513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1323.579424] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1323.588619] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1323.595617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1323.603787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1323.611975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1323.618879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1323.628475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1323.638576] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1323.645074] 8021q: adding VLAN 0 to HW filter on device team0 [ 1323.653193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1323.664937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1323.674941] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1323.685815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1323.704336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1323.713808] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1323.724647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1323.733202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1323.741038] bridge0: port 1(bridge_slave_0) entered blocking state [ 1323.747403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1323.756701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1323.765966] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1323.773098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1323.780643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1323.788558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1323.796352] bridge0: port 2(bridge_slave_1) entered blocking state [ 1323.802797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1323.809989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1323.816982] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1323.826294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1323.835262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1323.850592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1323.864646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1323.872133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1323.881939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1323.898305] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1323.906898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1323.916984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1323.925256] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1323.937497] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1323.945459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1323.953821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1323.962885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1324.040190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1324.049077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1324.059660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1324.080631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1324.088248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1324.114266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1324.127632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1324.136091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1324.146510] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1324.153666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1324.165061] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1324.173824] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1324.183895] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1324.199733] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1324.211455] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1324.218206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1324.230664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1324.239517] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1324.255470] device veth0_vlan entered promiscuous mode [ 1324.269938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1324.278405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1324.289472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1324.296667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1324.309790] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1324.319975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1324.344808] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1324.352840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1324.369275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1324.379051] device veth1_vlan entered promiscuous mode [ 1324.386726] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1324.414634] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1324.446893] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1324.465714] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1324.473940] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1324.492521] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1324.499932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1324.518424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1324.531021] device veth0_macvtap entered promiscuous mode [ 1324.537374] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1324.557266] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1324.573165] device veth1_macvtap entered promiscuous mode [ 1324.595493] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1324.606941] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1324.614831] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1324.628441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1324.642140] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1324.659816] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1324.674078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1324.683405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1324.694817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1324.704704] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1324.718045] device veth0_vlan entered promiscuous mode [ 1324.726145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1324.740784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1324.756840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1324.774496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1324.783721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1324.794550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.804899] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1324.813876] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1324.828460] device veth1_vlan entered promiscuous mode [ 1324.836050] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1324.843902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1324.855438] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1324.864009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1324.877707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1324.888799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.909106] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1324.918083] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1324.929853] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1324.938054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1324.947613] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1324.966170] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1324.974695] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1324.984058] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1324.994372] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1325.003121] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1325.017449] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1325.024879] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1325.040735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1325.049324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1325.057138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1325.065264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1325.075483] device veth0_vlan entered promiscuous mode [ 1325.083826] device veth0_macvtap entered promiscuous mode [ 1325.090846] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1325.097302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1325.104654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1325.111804] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1325.123680] device veth1_vlan entered promiscuous mode [ 1325.130131] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1325.138859] device veth1_macvtap entered promiscuous mode [ 1325.145905] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1325.158927] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1325.172681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1325.188483] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1325.203183] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1325.217969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1325.225904] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1325.237122] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1325.244951] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1325.255563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1325.263784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1325.281229] device veth0_macvtap entered promiscuous mode [ 1325.287653] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1325.296570] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1325.308087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.320840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1325.337874] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.348124] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1325.356020] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1325.368588] device veth1_macvtap entered promiscuous mode [ 1325.375942] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1325.383133] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1325.392842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1325.399997] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1325.408352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1325.419331] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1325.429767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.439588] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1325.450163] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.461284] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1325.468221] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1325.478340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1325.488945] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1325.498823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1325.518290] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1325.535924] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1325.546300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.561231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1325.573792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.583225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1325.593637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.604269] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1325.612062] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1325.620513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1325.628280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1325.645857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1325.665268] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.674821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1325.687235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.696500] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1325.708363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1325.719643] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1325.726902] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1325.736661] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1325.745747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1326.181453] tc_dump_action: action bad kind [ 1326.196727] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1326.203861] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1326.224028] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1326.241578] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1326.302606] tc_dump_action: action bad kind [ 1326.358722] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1326.369003] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1326.378635] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1326.385929] batman_adv: batadv0: Removing interface: batadv_slave_1 20:17:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), 0x0, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:11 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 20:17:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:11 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:11 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(0xffffffffffffffff, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r4, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), 0x0, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:11 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000000000000000000000000000007f000001000000000000000000000000000000000000000000000000030000000000d28a0f6c487cf649ac000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000002000000000000000400008001e0000001f00000000000000666c617465000000000000000000000000000000000000000000002ec1710147f37e7b01370564c7d08e03000000000000000000000000000000665d6ed5e8b38e21ba9a815732f0b000000200000c04b300000000000000f3168ab74c1ec12ac90000000020dbd44355722d3cbb68b7772ad1ce0adf4239613190e15b4d3fd3b5584b08b3270ae7f1cae570e2a781e105de"], 0x2}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:11 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1327.514109] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1327.531699] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1327.539304] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1327.546230] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1327.555461] device bridge_slave_1 left promiscuous mode [ 1327.561256] bridge0: port 2(bridge_slave_1) entered disabled state [ 1327.610927] device bridge_slave_0 left promiscuous mode [ 1327.616510] bridge0: port 1(bridge_slave_0) entered disabled state [ 1327.674836] device veth1_macvtap left promiscuous mode [ 1327.680269] device veth0_macvtap left promiscuous mode [ 1327.685717] device veth1_vlan left promiscuous mode [ 1327.692616] device veth0_vlan left promiscuous mode [ 1327.914259] device hsr_slave_1 left promiscuous mode [ 1327.955976] device hsr_slave_0 left promiscuous mode [ 1328.028386] team0 (unregistering): Port device team_slave_1 removed [ 1328.057553] team0 (unregistering): Port device team_slave_0 removed [ 1328.077532] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1328.134444] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1328.213830] bond0 (unregistering): Released all slaves [ 1329.891229] IPVS: ftp: loaded support on port[0] = 21 [ 1330.640893] IPVS: ftp: loaded support on port[0] = 21 [ 1330.698802] chnl_net:caif_netlink_parms(): no params data found [ 1330.761905] IPVS: ftp: loaded support on port[0] = 21 [ 1330.790372] chnl_net:caif_netlink_parms(): no params data found [ 1330.826147] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.833012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.839882] device bridge_slave_0 entered promiscuous mode [ 1330.849117] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.855958] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.863136] device bridge_slave_1 entered promiscuous mode [ 1330.900006] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1330.914256] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1330.941830] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1330.949091] team0: Port device team_slave_0 added [ 1330.957983] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1330.965830] team0: Port device team_slave_1 added [ 1330.985752] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1330.992320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1331.017622] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1331.028732] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1331.035153] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1331.060584] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1331.073799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1331.096234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1331.169780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1331.176396] bridge0: port 1(bridge_slave_0) entered disabled state [ 1331.183461] device bridge_slave_0 entered promiscuous mode [ 1331.242502] device hsr_slave_0 entered promiscuous mode [ 1331.290375] device hsr_slave_1 entered promiscuous mode [ 1331.336662] bridge0: port 2(bridge_slave_1) entered blocking state [ 1331.343270] bridge0: port 2(bridge_slave_1) entered disabled state [ 1331.350417] device bridge_slave_1 entered promiscuous mode [ 1331.356528] chnl_net:caif_netlink_parms(): no params data found [ 1331.366243] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1331.401253] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1331.409378] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1331.426781] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1331.467774] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1331.475491] team0: Port device team_slave_0 added [ 1331.485061] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1331.496756] team0: Port device team_slave_1 added [ 1331.524929] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1331.531298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1331.557806] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1331.577531] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1331.583910] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1331.609366] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1331.622748] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1331.634554] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1331.681512] bridge0: port 1(bridge_slave_0) entered blocking state [ 1331.687968] bridge0: port 1(bridge_slave_0) entered disabled state [ 1331.695095] device bridge_slave_0 entered promiscuous mode [ 1331.742416] device hsr_slave_0 entered promiscuous mode [ 1331.780454] device hsr_slave_1 entered promiscuous mode [ 1331.837552] bridge0: port 2(bridge_slave_1) entered blocking state [ 1331.844223] bridge0: port 2(bridge_slave_1) entered disabled state [ 1331.851582] device bridge_slave_1 entered promiscuous mode [ 1331.860821] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1331.878509] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1331.899900] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1331.911299] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1331.940813] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1331.948024] team0: Port device team_slave_0 added [ 1331.955141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1331.962591] team0: Port device team_slave_1 added [ 1331.989809] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1331.996324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1332.021604] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1332.032760] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1332.039037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1332.064293] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1332.079347] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1332.086804] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1332.103030] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1332.163255] device hsr_slave_0 entered promiscuous mode [ 1332.220400] device hsr_slave_1 entered promiscuous mode [ 1332.279387] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1332.297374] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1332.315049] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1332.372860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1332.389425] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1332.414591] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1332.426321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1332.433666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1332.453439] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1332.459649] 8021q: adding VLAN 0 to HW filter on device team0 [ 1332.469698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1332.479045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1332.487865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1332.495756] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.502153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1332.509799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1332.523410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1332.539420] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1332.548719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1332.556711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1332.565027] bridge0: port 2(bridge_slave_1) entered blocking state [ 1332.571442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1332.585779] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1332.597448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1332.604783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1332.612941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1332.627216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1332.636100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1332.648282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1332.656570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1332.664291] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1332.672843] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1332.680179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1332.687921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1332.696808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1332.707321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1332.718403] device bridge_slave_1 left promiscuous mode [ 1332.724393] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.741388] device bridge_slave_0 left promiscuous mode [ 1332.746908] bridge0: port 1(bridge_slave_0) entered disabled state [ 1332.802191] device bridge_slave_1 left promiscuous mode [ 1332.807696] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.860699] device bridge_slave_0 left promiscuous mode [ 1332.866203] bridge0: port 1(bridge_slave_0) entered disabled state [ 1332.902924] device veth1_macvtap left promiscuous mode [ 1332.908299] device veth0_macvtap left promiscuous mode [ 1332.913781] device veth1_vlan left promiscuous mode [ 1332.918896] device veth0_vlan left promiscuous mode [ 1332.924492] device veth1_macvtap left promiscuous mode [ 1332.929841] device veth0_macvtap left promiscuous mode [ 1332.936903] device veth1_vlan left promiscuous mode [ 1332.942071] device veth0_vlan left promiscuous mode [ 1333.123011] device hsr_slave_1 left promiscuous mode [ 1333.162678] device hsr_slave_0 left promiscuous mode [ 1333.208559] team0 (unregistering): Port device team_slave_1 removed [ 1333.217788] team0 (unregistering): Port device team_slave_0 removed [ 1333.226904] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1333.254075] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1333.327578] bond0 (unregistering): Released all slaves [ 1333.445107] device hsr_slave_1 left promiscuous mode [ 1333.493621] device hsr_slave_0 left promiscuous mode [ 1333.539024] team0 (unregistering): Port device team_slave_1 removed [ 1333.548483] team0 (unregistering): Port device team_slave_0 removed [ 1333.557570] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1333.603210] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1333.679340] bond0 (unregistering): Released all slaves [ 1333.723986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1333.731762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1333.741671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1333.754973] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1333.762269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1333.769867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1333.777592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1333.784617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1333.792708] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1333.798765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1333.812729] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1333.818824] 8021q: adding VLAN 0 to HW filter on device team0 [ 1333.837175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1333.847373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1333.855620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1333.863661] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.869996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1333.877682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1333.888344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1333.899100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1333.907217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1333.915332] bridge0: port 2(bridge_slave_1) entered blocking state [ 1333.921798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1333.929868] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1333.939378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1333.947395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1333.957275] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1333.964387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1333.972506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1333.979263] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1333.988254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1333.999416] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1334.005936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1334.015037] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1334.026021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1334.033847] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1334.042026] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1334.052700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1334.062361] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1334.069028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1334.077217] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1334.085201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1334.092407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1334.100243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1334.107079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1334.114994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1334.123498] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1334.182748] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1334.188850] 8021q: adding VLAN 0 to HW filter on device team0 [ 1334.232034] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1334.239544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1334.248331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1334.267504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1334.281032] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1334.287236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1334.299222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1334.307611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1334.319241] bridge0: port 1(bridge_slave_0) entered blocking state [ 1334.325653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1334.338792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1334.353644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1334.361665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1334.378710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1334.386796] bridge0: port 2(bridge_slave_1) entered blocking state [ 1334.393246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1334.407897] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1334.416923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1334.428850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1334.445460] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1334.457653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1334.468680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1334.484550] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1334.495374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1334.511107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1334.530860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1334.537820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1334.549719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1334.558480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1334.576437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1334.588935] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1334.599095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1334.606705] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1334.615420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1334.623544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1334.636248] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1334.649296] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1334.666593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1334.680679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1334.693391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1334.702010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1334.709753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1334.739538] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1334.757445] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1334.769159] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1334.783522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1334.798512] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1334.830526] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1334.837648] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1334.852232] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1334.863580] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1334.881906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1334.889632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1334.898295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1334.905481] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1334.921418] device veth0_vlan entered promiscuous mode [ 1334.937461] device veth1_vlan entered promiscuous mode [ 1334.961067] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1334.978430] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1334.996555] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1335.005757] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1335.017153] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1335.034032] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1335.041742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1335.059595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1335.077381] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1335.117212] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1335.126253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1335.134799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1335.145782] device veth0_macvtap entered promiscuous mode [ 1335.153018] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1335.163222] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1335.174968] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1335.182149] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1335.191317] device veth1_macvtap entered promiscuous mode [ 1335.198325] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1335.207673] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1335.218284] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1335.226918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1335.236624] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1335.244141] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1335.251817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1335.259151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1335.268519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1335.275578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1335.284743] device veth0_vlan entered promiscuous mode [ 1335.293751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1335.303105] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1335.313711] device veth1_vlan entered promiscuous mode [ 1335.319765] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1335.327529] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1335.334990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1335.343016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1335.353049] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1335.363212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1335.373694] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1335.380762] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1335.393278] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1335.400634] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1335.407873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1335.416842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1335.426861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1335.441053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1335.453810] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1335.461144] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1335.470762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1335.478709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1335.491865] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1335.509567] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1335.518812] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1335.526877] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1335.535484] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1335.545360] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1335.552839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1335.560772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1335.568404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1335.576402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1335.584122] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1335.600628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1335.609581] device veth0_macvtap entered promiscuous mode [ 1335.621008] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1335.629666] device veth0_vlan entered promiscuous mode [ 1335.642765] device veth1_vlan entered promiscuous mode [ 1335.648864] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1335.663247] device veth1_macvtap entered promiscuous mode [ 1335.672229] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1335.686391] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1335.697253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1335.713053] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1335.730747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1335.737987] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1335.757851] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1335.765204] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1335.773156] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1335.784978] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1335.795730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1335.804554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1335.818749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1335.828926] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1335.843313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1335.853525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1335.864078] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1335.871574] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1335.881717] device veth0_macvtap entered promiscuous mode [ 1335.887855] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1335.897421] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1335.905163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1335.916422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1335.926458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1335.937825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1335.947254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1335.957383] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1335.967734] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1335.974833] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1335.983761] device veth1_macvtap entered promiscuous mode [ 1335.989978] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1335.997111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1336.004819] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1336.013378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1336.037854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1336.052119] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1336.081990] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.092894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.102464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.112663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.122786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.132796] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.145283] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1336.153122] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1336.165189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1336.173310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1336.185556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1336.195610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.204938] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1336.214952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.224179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1336.234312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.244757] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1336.251898] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1336.260207] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1336.267899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:17:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:21 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1337.216150] tc_dump_action: action bad kind [ 1337.321969] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1337.353604] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1337.386342] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1337.393558] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1337.427302] tc_dump_action: action bad kind [ 1337.445561] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1337.452533] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1337.460300] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1337.467083] batman_adv: batadv0: Removing interface: batadv_slave_1 20:17:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:22 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1337.802392] tc_dump_action: action bad kind 20:17:22 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) 20:17:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1338.042317] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1338.049098] batman_adv: batadv0: Removing interface: batadv_slave_0 20:17:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "7bed8d7e447fa6e34b9addb030533e86d2c82b7298a907ebeba2ed4025f8f412e4f22ddb09ce44747d9446ea2642e6f5fc49d546158e278eded14fcd623363ac3651509d3740fb6a87e9c6b35a7a6dd989bed630b4ebf6218ae1128b5fece5cf8af728c9b14ad2f3d057a7d4df585dd9359f0d810f320cc1f0a9c9f2db6c089684457a0f530942c1d00d8040fc23b5423b9b7200d8098e8d343967c37fe79ef0a9001be4eb06070d2212d92036e0bac5f2e4b892a24b13b8daa87070564bed13929dfb46cbccbbe0c5dbcd1e7f7c2142d9b81c764620461fad016aa6de6314ded272d78b154666c105ce4b7f78a3de4d0bc68b56a799a2f4ec0d58aa947b4e68e9df449e3bb67a32b45193346322f964f77c5d3a6e855e05d292867b3ec5aa24333a8795c5a7a366402e25c1e96d8b91fdc2cc732e6a7f016f2207e61a61d00cdead6e64b482a7b507f9dad70f267e0016292a94974d77c123cbef8a9e8b2ed56e068e59ac930b57d1cb2aff26fde87203d05f9797119ec1e0c816490d645ddaa2d9980660d672ea985d825cfe3a38c64105d570eb506ebfda38c9f0bb9d6bea3c49b408cd7b67e1c26f4d430e112641af4950178be5191e01c70eb074faed55a948ceb3f6d17bead37b1bce0f3d8bcc181c2c0ded1c7c27c4db144e64484993f297e6325ff43d637ebb7739df78650b9579a49ee55ca78ff1a9807f78497ca8"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) [ 1338.084477] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1338.105420] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1338.145597] device bridge_slave_1 left promiscuous mode [ 1338.166632] bridge0: port 2(bridge_slave_1) entered disabled state [ 1338.261379] device bridge_slave_0 left promiscuous mode [ 1338.267211] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.323088] device veth1_macvtap left promiscuous mode [ 1338.333049] device veth0_macvtap left promiscuous mode [ 1338.350164] device veth1_vlan left promiscuous mode [ 1338.355267] device veth0_vlan left promiscuous mode [ 1338.545243] device hsr_slave_1 left promiscuous mode [ 1338.603972] device hsr_slave_0 left promiscuous mode [ 1338.668311] team0 (unregistering): Port device team_slave_1 removed [ 1338.695336] team0 (unregistering): Port device team_slave_0 removed [ 1338.722106] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1338.774738] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1338.901323] bond0 (unregistering): Released all slaves [ 1338.976877] tc_dump_action: action bad kind [ 1340.621386] IPVS: ftp: loaded support on port[0] = 21 [ 1341.382601] IPVS: ftp: loaded support on port[0] = 21 [ 1341.444193] chnl_net:caif_netlink_parms(): no params data found [ 1341.564867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1341.571588] bridge0: port 1(bridge_slave_0) entered disabled state [ 1341.578696] device bridge_slave_0 entered promiscuous mode [ 1341.585482] chnl_net:caif_netlink_parms(): no params data found [ 1341.600197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1341.606676] bridge0: port 2(bridge_slave_1) entered disabled state [ 1341.613978] device bridge_slave_1 entered promiscuous mode [ 1341.649478] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1341.659189] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1341.686623] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1341.693945] team0: Port device team_slave_0 added [ 1341.700211] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1341.707479] team0: Port device team_slave_1 added [ 1341.729866] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1341.736235] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1341.761536] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1341.777482] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1341.784209] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1341.809674] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1341.826091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1341.834281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1341.841597] bridge0: port 1(bridge_slave_0) entered blocking state [ 1341.848042] bridge0: port 1(bridge_slave_0) entered disabled state [ 1341.856269] device bridge_slave_0 entered promiscuous mode [ 1341.870673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1341.877081] bridge0: port 2(bridge_slave_1) entered disabled state [ 1341.885417] device bridge_slave_1 entered promiscuous mode [ 1341.953143] device hsr_slave_0 entered promiscuous mode [ 1341.990439] device hsr_slave_1 entered promiscuous mode [ 1342.039062] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1342.047276] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1342.057165] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1342.065388] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1342.095131] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1342.102610] team0: Port device team_slave_0 added [ 1342.114994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1342.122846] team0: Port device team_slave_1 added [ 1342.153174] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1342.159484] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1342.186056] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1342.203495] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1342.209774] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1342.236492] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1342.249800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1342.267244] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1342.277069] device bridge_slave_1 left promiscuous mode [ 1342.282656] bridge0: port 2(bridge_slave_1) entered disabled state [ 1342.332242] device bridge_slave_0 left promiscuous mode [ 1342.337748] bridge0: port 1(bridge_slave_0) entered disabled state [ 1342.392976] device veth1_macvtap left promiscuous mode [ 1342.398294] device veth0_macvtap left promiscuous mode [ 1342.403764] device veth1_vlan left promiscuous mode [ 1342.408832] device veth0_vlan left promiscuous mode [ 1342.522011] device hsr_slave_1 left promiscuous mode [ 1342.573628] device hsr_slave_0 left promiscuous mode [ 1342.629594] team0 (unregistering): Port device team_slave_1 removed [ 1342.639378] team0 (unregistering): Port device team_slave_0 removed [ 1342.648711] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1342.693841] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1342.758080] bond0 (unregistering): Released all slaves [ 1342.853203] device hsr_slave_0 entered promiscuous mode [ 1342.890443] device hsr_slave_1 entered promiscuous mode [ 1342.945442] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1342.952967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1342.973623] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1343.115097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1343.137750] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1343.154759] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1343.166257] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1343.174132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1343.184248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1343.202526] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1343.208641] 8021q: adding VLAN 0 to HW filter on device team0 [ 1343.237085] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1343.245545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1343.256529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1343.265094] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.271519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1343.287331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1343.301831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1343.309628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1343.319347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1343.328048] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.334476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1343.352355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1343.361353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1343.374457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1343.382043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1343.393300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1343.404162] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1343.415871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1343.424678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1343.435582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1343.446192] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1343.456796] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1343.464336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1343.474231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1343.483291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1343.502307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1343.511899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1343.522543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1343.535296] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1343.542293] 8021q: adding VLAN 0 to HW filter on device team0 [ 1343.548562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1343.559160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1343.569638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1343.582144] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1343.590906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1343.598554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1343.607396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1343.615487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1343.623559] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.629948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1343.640186] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1343.646308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1343.655638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1343.663502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1343.671524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1343.679448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1343.687683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.694107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1343.710531] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1343.719562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1343.727683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1343.738196] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1343.748178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1343.758684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1343.767199] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1343.776924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1343.788143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1343.797267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1343.805475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1343.814045] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1343.825252] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1343.833785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1343.842277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1343.851765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1343.862678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1343.870849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1343.878610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1343.888966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1343.897077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1343.905486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1343.924743] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1343.931275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1343.954501] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1343.964288] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1343.971654] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1343.978556] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1343.994153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1344.017163] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1344.027653] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1344.035059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1344.044132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1344.095430] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1344.104947] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1344.113233] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1344.124183] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1344.137578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1344.145999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1344.156175] device veth0_vlan entered promiscuous mode [ 1344.167374] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1344.175316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1344.183011] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1344.195328] device veth1_vlan entered promiscuous mode [ 1344.201292] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1344.209835] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1344.217979] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1344.231031] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1344.238508] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1344.246160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1344.254040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1344.268840] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1344.279752] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1344.287224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1344.296118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1344.312865] device veth0_macvtap entered promiscuous mode [ 1344.325513] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1344.342861] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1344.351612] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1344.358390] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1344.367273] device veth1_macvtap entered promiscuous mode [ 1344.374204] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1344.384617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1344.393948] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1344.403137] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1344.410876] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1344.418035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1344.425639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1344.433255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1344.440505] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1344.449785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1344.458254] device veth0_vlan entered promiscuous mode [ 1344.466919] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.477341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.489206] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1344.496538] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1344.507167] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1344.515177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1344.525232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.535614] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.545751] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1344.553152] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1344.561524] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1344.569242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1344.578939] device veth1_vlan entered promiscuous mode [ 1344.584867] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1344.599686] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1344.618282] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1344.632943] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1344.641119] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1344.648362] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1344.655962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1344.663754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1344.679192] device veth0_macvtap entered promiscuous mode [ 1344.686279] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1344.695708] device veth1_macvtap entered promiscuous mode [ 1344.702388] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1344.713904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1344.724284] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1344.734410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.744207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.753856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.763758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.774357] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1344.781614] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1344.792137] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1344.799377] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1344.806961] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1344.814850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1344.824733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.835252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.844506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.854725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.864957] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1344.872102] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1344.880194] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1344.888535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:17:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r5, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x0) 20:17:30 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/63, 0x3f}, 0x8001}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000540)=""/207, 0xcf}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/46, 0x2e}], 0x3, &(0x7f0000001680)=""/17, 0x11}, 0x1ff}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000340)=""/220) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x8000000200036150, 0x800007b, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:17:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0x30, 0x32, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}, 0x30}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x10002) write$P9_RWSTAT(r1, &(0x7f0000000340)={0x7}, 0x7) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000780)={0x0, "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"}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r6, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r7}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x0, 0x20, 0x10000, 0xa, 0xb, "5bbc819e978a68224fe662abb37d980324fed9"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:30 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000005780), 0x54, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) 20:17:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000077000)=""/133, 0x2800) [ 1345.766162] tc_dump_action: action bad kind [ 1345.821053] tc_dump_action: action bad kind [ 1345.850347] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1345.857767] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1345.883476] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1345.897363] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1345.913006] ================================================================== [ 1345.920712] BUG: KASAN: use-after-free in batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1345.927998] Read of size 132 at addr ffff888075782900 by task kworker/u4:0/29003 [ 1345.935532] [ 1345.937149] CPU: 1 PID: 29003 Comm: kworker/u4:0 Not tainted 4.14.170-syzkaller #0 [ 1345.945140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.954504] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 1345.961601] Call Trace: [ 1345.964247] dump_stack+0x142/0x197 [ 1345.968450] ? batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1345.973431] print_address_description.cold+0x7c/0x1dc [ 1345.978749] ? batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1345.983690] kasan_report.cold+0xa9/0x2af [ 1345.987867] check_memory_region+0x123/0x190 [ 1345.992324] memcpy+0x24/0x50 [ 1345.995424] batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1346.000235] ? lock_acquire+0x16f/0x430 [ 1346.004285] ? check_preemption_disabled+0x3c/0x250 [ 1346.009332] batadv_iv_ogm_schedule+0xa61/0xe20 [ 1346.014008] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1346.020403] process_one_work+0x863/0x1600 [ 1346.024655] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 1346.029351] worker_thread+0x5d9/0x1050 [ 1346.033324] kthread+0x319/0x430 [ 1346.036688] ? process_one_work+0x1600/0x1600 [ 1346.041208] ? kthread_create_on_node+0xd0/0xd0 [ 1346.045911] ret_from_fork+0x24/0x30 [ 1346.049613] [ 1346.051225] Allocated by task 29003: [ 1346.054921] save_stack_trace+0x16/0x20 [ 1346.058885] save_stack+0x45/0xd0 [ 1346.062318] kasan_kmalloc+0xce/0xf0 [ 1346.066011] __kmalloc+0x15d/0x7a0 [ 1346.069591] batadv_tvlv_container_ogm_append+0x12b/0x480 [ 1346.075128] batadv_iv_ogm_schedule+0xba0/0xe20 [ 1346.079794] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1346.086106] process_one_work+0x863/0x1600 [ 1346.090351] worker_thread+0x5d9/0x1050 [ 1346.094357] kthread+0x319/0x430 [ 1346.097754] ret_from_fork+0x24/0x30 [ 1346.101451] [ 1346.103063] Freed by task 29421: [ 1346.106415] save_stack_trace+0x16/0x20 [ 1346.110428] save_stack+0x45/0xd0 [ 1346.113903] kasan_slab_free+0x75/0xc0 [ 1346.117808] kfree+0xcc/0x270 [ 1346.121038] batadv_iv_ogm_iface_disable+0x39/0x80 [ 1346.125959] batadv_hardif_disable_interface.cold+0x605/0x840 [ 1346.131923] batadv_softif_destroy_netlink+0xad/0x140 [ 1346.137181] rtnl_delete_link+0xc3/0x110 [ 1346.141281] rtnl_dellink+0x206/0x680 [ 1346.145077] rtnetlink_rcv_msg+0x3da/0xb70 [ 1346.149386] netlink_rcv_skb+0x14f/0x3c0 [ 1346.153481] rtnetlink_rcv+0x1d/0x30 [ 1346.157225] netlink_unicast+0x44d/0x650 [ 1346.161269] netlink_sendmsg+0x7c4/0xc60 [ 1346.165353] sock_sendmsg+0xce/0x110 [ 1346.169074] ___sys_sendmsg+0x70a/0x840 [ 1346.173039] __sys_sendmsg+0xb9/0x140 [ 1346.176828] SyS_sendmsg+0x2d/0x50 [ 1346.180351] do_syscall_64+0x1e8/0x640 [ 1346.184222] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1346.189389] [ 1346.190999] The buggy address belongs to the object at ffff888075782900 [ 1346.190999] which belongs to the cache kmalloc-192 of size 192 [ 1346.203637] The buggy address is located 0 bytes inside of [ 1346.203637] 192-byte region [ffff888075782900, ffff8880757829c0) [ 1346.215328] The buggy address belongs to the page: [ 1346.220275] page:ffffea0001d5e080 count:1 mapcount:0 mapping:ffff888075782000 index:0xffff888075782b00 [ 1346.229707] flags: 0xfffe0000000100(slab) [ 1346.233852] raw: 00fffe0000000100 ffff888075782000 ffff888075782b00 000000010000000f [ 1346.241730] raw: ffffea0002841460 ffffea0001f6ffe0 ffff8880aa800040 0000000000000000 [ 1346.249591] page dumped because: kasan: bad access detected [ 1346.255295] [ 1346.256906] Memory state around the buggy address: [ 1346.261816] ffff888075782800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1346.269170] ffff888075782880: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1346.276527] >ffff888075782900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1346.283869] ^ [ 1346.287218] ffff888075782980: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1346.294582] ffff888075782a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1346.301935] ================================================================== [ 1346.309294] Disabling lock debugging due to kernel taint [ 1346.320082] Kernel panic - not syncing: panic_on_warn set ... [ 1346.320082] [ 1346.327495] CPU: 1 PID: 29003 Comm: kworker/u4:0 Tainted: G B 4.14.170-syzkaller #0 [ 1346.336417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1346.345788] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 1346.352888] Call Trace: [ 1346.355479] dump_stack+0x142/0x197 [ 1346.359114] ? batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1346.364106] panic+0x1f9/0x42d [ 1346.367304] ? add_taint.cold+0x16/0x16 [ 1346.371286] ? ___preempt_schedule+0x16/0x18 [ 1346.375702] kasan_end_report+0x47/0x4f [ 1346.379676] kasan_report.cold+0x130/0x2af [ 1346.383912] check_memory_region+0x123/0x190 [ 1346.388320] memcpy+0x24/0x50 [ 1346.391430] batadv_iv_ogm_queue_add+0x2c2/0xe30 [ 1346.396187] ? lock_acquire+0x16f/0x430 [ 1346.400166] ? check_preemption_disabled+0x3c/0x250 [ 1346.405206] batadv_iv_ogm_schedule+0xa61/0xe20 [ 1346.409883] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1346.416229] process_one_work+0x863/0x1600 [ 1346.420467] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 1346.425141] worker_thread+0x5d9/0x1050 [ 1346.429125] kthread+0x319/0x430 [ 1346.432495] ? process_one_work+0x1600/0x1600 [ 1346.436991] ? kthread_create_on_node+0xd0/0xd0 [ 1346.441668] ret_from_fork+0x24/0x30 [ 1346.446674] Kernel Offset: disabled [ 1346.450315] Rebooting in 86400 seconds..