[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 49.012800][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 49.012817][ T27] audit: type=1800 audit(1580572778.202:29): pid=7888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 49.039109][ T27] audit: type=1800 audit(1580572778.202:30): pid=7888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.208' (ECDSA) to the list of known hosts. 2020/02/01 15:59:50 fuzzer started 2020/02/01 15:59:52 dialing manager at 10.128.0.105:40209 2020/02/01 15:59:52 syscalls: 2904 2020/02/01 15:59:52 code coverage: enabled 2020/02/01 15:59:52 comparison tracing: enabled 2020/02/01 15:59:52 extra coverage: enabled 2020/02/01 15:59:52 setuid sandbox: enabled 2020/02/01 15:59:52 namespace sandbox: enabled 2020/02/01 15:59:52 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/01 15:59:52 fault injection: enabled 2020/02/01 15:59:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/01 15:59:52 net packet injection: enabled 2020/02/01 15:59:52 net device setup: enabled 2020/02/01 15:59:52 concurrency sanitizer: enabled 2020/02/01 15:59:52 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.746995][ T8057] KCSAN: could not find function: 'poll_schedule_timeout' 2020/02/01 16:00:05 adding functions to KCSAN blacklist: 'rcu_gp_fqs_check_wake' 'timer_clear_idle' 'audit_log_start' 'fsnotify' 'skb_dequeue' 'file_update_time' 'copy_process' 'wbt_issue' 'blk_mq_dispatch_rq_list' 'queue_access_lock' 'get_cpu_iowait_time_us' 'snd_timer_pause' 'tick_sched_do_timer' '__do_munmap' 'kauditd_thread' 'blk_stat_add' 'do_nanosleep' 'ext4_mb_good_group' 'deadline_remove_request' '__get_user_pages' 'free_pid' 'blk_mq_unfreeze_queue' 'ep_poll' 'run_timer_softirq' 'padata_find_next' 'poll_schedule_timeout' 'inode_sync_complete' 'find_next_bit' 'xas_clear_mark' 'mod_timer' 'dd_has_work' '__filemap_fdatawrite_range' 'kcm_rcv_strparser' '__mark_inode_dirty' 'exit_signals' 'vm_area_dup' 'blk_mq_get_request' 'pcpu_alloc' 'blk_mq_run_hw_queue' 'ktime_get_real_seconds' 'find_get_pages_range_tag' 'tick_nohz_idle_stop_tick' 'n_tty_receive_buf_common' 'ext4_free_inode' 'ext4_nonda_switch' 'clear_inode' 'futex_wait_queue_me' 'ext4_free_inodes_count' 'ext4_writepages' '__ext4_new_inode' '__skb_try_recv_from_queue' 'process_srcu' 'wbt_wait' '__perf_event_overflow' 'tomoyo_supervisor' '__hrtimer_run_queues' 'alloc_pid' 'pid_update_inode' 'rcu_gp_fqs_loop' 'sit_tunnel_xmit' 'blk_mq_sched_dispatch_requests' 'mm_update_next_owner' 'taskstats_exit' 'virtqueue_disable_cb' 'schedule_hrtimeout_range_clock' '__delete_from_page_cache' 'generic_write_end' 'purge_fragmented_blocks_allcpus' 'xas_find_marked' '__snd_rawmidi_transmit_ack' 'commit_echoes' 'echo_char' 'do_syslog' 'ext4_has_free_clusters' 'tick_do_update_jiffies64' 'generic_permission' 'shmem_add_to_page_cache' 'generic_fillattr' 'wbt_done' '__writeback_single_inode' 16:03:57 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x3) ioperm(0xa441, 0x2, 0xff) [ 308.527641][ T8060] IPVS: ftp: loaded support on port[0] = 21 16:03:57 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000340)=""/4096) socket$inet(0x2, 0x4000000000000001, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) inotify_init1(0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0) [ 308.601719][ T8060] chnl_net:caif_netlink_parms(): no params data found [ 308.667564][ T8060] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.691612][ T8060] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.711621][ T8060] device bridge_slave_0 entered promiscuous mode [ 308.732184][ T8060] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.739356][ T8060] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.748252][ T8060] device bridge_slave_1 entered promiscuous mode [ 308.767120][ T8060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 308.778470][ T8060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.799220][ T8060] team0: Port device team_slave_0 added [ 308.805986][ T8060] team0: Port device team_slave_1 added [ 308.836097][ T8060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 308.843172][ T8060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.869760][ T8060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 16:03:58 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)) [ 308.885864][ T8065] IPVS: ftp: loaded support on port[0] = 21 [ 308.892533][ T8060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 308.899592][ T8060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.971439][ T8060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 309.083072][ T8060] device hsr_slave_0 entered promiscuous mode 16:03:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dfbc58ef6edd8c56a50104ad3279f601", 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept(r0, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)="1118450099ee4e", 0x7}, {&(0x7f0000002680)="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", 0xfa}], 0x2}}], 0x1, 0x0) [ 309.151233][ T8060] device hsr_slave_1 entered promiscuous mode [ 309.267277][ T8067] IPVS: ftp: loaded support on port[0] = 21 [ 309.372595][ T8069] IPVS: ftp: loaded support on port[0] = 21 [ 309.392093][ T8065] chnl_net:caif_netlink_parms(): no params data found [ 309.452390][ T8060] netdevsim netdevsim0 netdevsim0: renamed from eth0 16:03:58 executing program 4: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 309.515776][ T8060] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 309.573556][ T8060] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 309.614953][ T8060] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 309.707046][ T8074] IPVS: ftp: loaded support on port[0] = 21 16:03:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x2000, 0x0, 0x0, 0x0, 0x6, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x7, @perf_config_ext={0x84, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10537}, r0, 0x0, 0xffffffffffffffff, 0x8) r5 = socket$inet(0x2, 0x803, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) connect(r5, &(0x7f0000000340)=@ethernet={0x306, @local}, 0x80) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4010, r5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, 0x0, 0x0) r7 = socket(0x400000000000010, 0x802, 0x0) write(r7, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196b", 0x23) r8 = socket(0x400000000000010, 0x802, 0x0) write(r8, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f19", 0x22) dup(0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x5, 0x10000) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r10 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r10) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r12 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r11, 0x0, r12) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r14 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r13, 0x0, r14) r15 = dup(r13) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8b1a, 0x0) r16 = socket$nl_xfrm(0x10, 0x3, 0x6) r17 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r17, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r17, 0x0, 0x0, 0xf7c7ac320226deca) r18 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r18, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r18, &(0x7f0000001300), 0x266, 0xf7c7ac320226deca) sendmsg$nl_xfrm(r16, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYRES16=r18, @ANYBLOB="b613163bb31cafb789b60efe6d16de919eef448fbdb7c15ff96eabdc88d4af91b2392c69c10df204010297ed1b90019e2139e16af71b5b7e69a12cd6df780d5fdd3d8f8d5846b9da08a2fc0b61f2470629a09dcb1a5bccde582448690895de8691d51fbab41b6b6d1fee205870d4653ebb714a0de0f3a0358c96afdd084d06676084204bc905a65fab2f5edcf31b5d6daf4f488d466c71fc6a6097c477bcedd03e75db4eca14b92a2f0c96ec93de2f5dfc7c5fbe1bfaef4c12ed66e85bf4c0a7a7694d189b71848cee1cbbef16409f4f5a87e8ec1104d18e0460217d21d8d945238fd79d7ca9998ac28dec1ae6801131cf1cffb2f770f5bd7042cd5ff574ec892ccd95192ca549eaf040", @ANYRES32=r17], 0x3}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000b00)) setresgid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = semget$private(0x0, 0x0, 0x4) r21 = getgid() semctl$IPC_SET(r20, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, r21, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4}) getgroups(0x0, &(0x7f0000000400)) setresgid(0x0, r19, 0x0) setresgid(0x0, 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000004c0)) socketpair$unix(0x1, 0x2, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) r22 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r22, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r22, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r22, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r22, 0x100000003, 0xfb7d, 0x28120001) [ 309.802412][ T8065] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.809549][ T8065] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.817822][ T8065] device bridge_slave_0 entered promiscuous mode [ 309.847077][ T8069] chnl_net:caif_netlink_parms(): no params data found [ 309.862843][ T8060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.869976][ T8067] chnl_net:caif_netlink_parms(): no params data found [ 309.880209][ T8065] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.887645][ T8065] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.896872][ T8065] device bridge_slave_1 entered promiscuous mode [ 309.934846][ T8065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.948400][ T8065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 309.996584][ T8065] team0: Port device team_slave_0 added [ 310.014909][ T8060] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.032341][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.046952][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.064703][ T8065] team0: Port device team_slave_1 added [ 310.070602][ T8067] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.077765][ T8067] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.085471][ T8067] device bridge_slave_0 entered promiscuous mode [ 310.099547][ T8085] IPVS: ftp: loaded support on port[0] = 21 [ 310.120301][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 310.130649][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.139870][ T2411] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.146919][ T2411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.155052][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.163569][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.172080][ T2411] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.179112][ T2411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.186899][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 310.195666][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.204829][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 310.213732][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 310.222794][ T8067] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.229936][ T8067] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.238526][ T8067] device bridge_slave_1 entered promiscuous mode [ 310.255834][ T8069] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.263347][ T8069] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.271120][ T8069] device bridge_slave_0 entered promiscuous mode [ 310.280461][ T8069] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.287667][ T8069] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.295457][ T8069] device bridge_slave_1 entered promiscuous mode [ 310.312566][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.321259][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 310.329370][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 310.338349][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 310.354434][ T8067] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.374170][ T8069] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.383641][ T8065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 310.390670][ T8065] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.419270][ T8065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 310.437303][ T8067] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.448515][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 310.457489][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.470589][ T8069] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.490732][ T8069] team0: Port device team_slave_0 added [ 310.497509][ T8065] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 310.504896][ T8065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.531013][ T8065] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 310.560957][ T8069] team0: Port device team_slave_1 added [ 310.589634][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 310.598162][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.673263][ T8065] device hsr_slave_0 entered promiscuous mode [ 310.751602][ T8065] device hsr_slave_1 entered promiscuous mode [ 310.791053][ T8065] debugfs: Directory 'hsr0' with parent '/' already present! [ 310.827035][ T8067] team0: Port device team_slave_0 added [ 310.843999][ T8067] team0: Port device team_slave_1 added [ 310.854404][ T8069] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 310.861524][ T8069] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.888255][ T8069] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 310.901930][ T8069] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 310.908903][ T8069] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.935048][ T8069] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 310.968636][ T8074] chnl_net:caif_netlink_parms(): no params data found [ 311.022988][ T8069] device hsr_slave_0 entered promiscuous mode [ 311.081303][ T8069] device hsr_slave_1 entered promiscuous mode [ 311.131249][ T8069] debugfs: Directory 'hsr0' with parent '/' already present! [ 311.145721][ T8067] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 311.153219][ T8067] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.179824][ T8067] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 311.191741][ T8067] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 311.198782][ T8067] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.225116][ T8067] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.286337][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 311.294574][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 311.353868][ T8067] device hsr_slave_0 entered promiscuous mode [ 311.391276][ T8067] device hsr_slave_1 entered promiscuous mode [ 311.431040][ T8067] debugfs: Directory 'hsr0' with parent '/' already present! [ 311.468720][ T8060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 311.492320][ T8074] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.499419][ T8074] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.507299][ T8074] device bridge_slave_0 entered promiscuous mode [ 311.515785][ T8074] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.522915][ T8074] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.530722][ T8074] device bridge_slave_1 entered promiscuous mode [ 311.572660][ T8085] chnl_net:caif_netlink_parms(): no params data found [ 311.591690][ T8065] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 311.645107][ T8065] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 311.684955][ T8074] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.695457][ T8065] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 311.772962][ T8065] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 311.849700][ T8074] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.870986][ T8069] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 311.915713][ T8069] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 311.964550][ T8069] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 312.025523][ T8069] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 312.094530][ T8074] team0: Port device team_slave_0 added [ 312.126244][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 312.135267][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 312.148721][ T8060] device veth0_vlan entered promiscuous mode [ 312.156131][ T8074] team0: Port device team_slave_1 added [ 312.184142][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 312.192714][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 312.204526][ T8060] device veth1_vlan entered promiscuous mode [ 312.224441][ T8074] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 312.231486][ T8074] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.257890][ T8074] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 312.269578][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 312.277688][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 312.285731][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 312.296391][ T8085] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.304155][ T8085] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.312058][ T8085] device bridge_slave_0 entered promiscuous mode [ 312.333476][ T8074] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 312.340624][ T8074] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.367618][ T8074] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 312.404556][ T8085] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.411944][ T8085] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.419794][ T8085] device bridge_slave_1 entered promiscuous mode [ 312.462852][ T8074] device hsr_slave_0 entered promiscuous mode [ 312.501475][ T8074] device hsr_slave_1 entered promiscuous mode [ 312.551085][ T8074] debugfs: Directory 'hsr0' with parent '/' already present! [ 312.558680][ T8067] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 312.614592][ T8067] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 312.662851][ T8067] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 312.733932][ T8067] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 312.787639][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 312.797739][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 312.806851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 312.817183][ T8060] device veth0_macvtap entered promiscuous mode [ 312.830877][ T8065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.849837][ T8085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 312.873369][ T8085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 312.885641][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 312.894463][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.902768][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.912089][ T8060] device veth1_macvtap entered promiscuous mode [ 312.920295][ T8065] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.943042][ T8085] team0: Port device team_slave_0 added [ 312.949508][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 312.958077][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.967049][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.975818][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.983801][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.993067][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.020404][ T8069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.029262][ T8085] team0: Port device team_slave_1 added [ 313.051533][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.060200][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.069377][ T3612] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.076757][ T3612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.102809][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.112470][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.134788][ T8060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 313.145398][ T8085] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 313.153707][ T8085] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 313.179922][ T8085] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 313.201236][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 313.210028][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 313.218942][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.227750][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.236315][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.244220][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.252625][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.264270][ T8060] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 313.274871][ T8085] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 313.282280][ T8085] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 313.308621][ T8085] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 313.321527][ T8069] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.328901][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 313.337906][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 313.350095][ T8067] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.422944][ T8085] device hsr_slave_0 entered promiscuous mode [ 313.471242][ T8085] device hsr_slave_1 entered promiscuous mode [ 313.511051][ T8085] debugfs: Directory 'hsr0' with parent '/' already present! [ 313.519095][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.529893][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.560511][ T8065] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 313.571458][ T8065] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 313.588250][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.597141][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.606175][ T8084] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.613255][ T8084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.625417][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.633975][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.644458][ T8084] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.651645][ T8084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.659567][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.668664][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.677482][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.686103][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.694581][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.702446][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.715183][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.723423][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 313.734376][ T8074] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 313.793913][ T8074] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 313.833594][ T8074] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 313.874384][ T8074] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 313.937754][ T8067] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.946175][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.960881][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 313.968850][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 313.978842][ T8065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.015410][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.026193][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.035029][ T8084] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.042244][ T8084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.050265][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.058842][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.067240][ T8084] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.074342][ T8084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.082473][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 314.091441][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 314.099967][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 314.108742][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 314.117503][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 314.141024][ T8085] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 314.172646][ T8085] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 314.231822][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.240201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.248971][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 314.257592][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 314.266594][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 314.279387][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.288224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.296629][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.306021][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.318123][ T8085] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 314.363144][ T8085] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 314.404536][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 314.413599][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.438095][ T8067] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.449301][ T8067] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.481614][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.490373][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.499501][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.507953][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.516464][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.525346][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.534789][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.543514][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.552091][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.560349][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.569229][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.577246][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.585550][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.608937][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.630451][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.638402][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.647726][ T8067] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.662964][ T8065] device veth0_vlan entered promiscuous mode [ 314.687890][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.698365][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.714388][ T8069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.726474][ T8065] device veth1_vlan entered promiscuous mode [ 314.753574][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 314.762432][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.775113][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.793987][ T8074] 8021q: adding VLAN 0 to HW filter on device bond0 16:04:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sched_getaffinity(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2(0x0, 0x80000) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x4000) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) [ 314.816096][ T8067] device veth0_vlan entered promiscuous mode [ 314.837268][ T8074] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.845123][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 314.861660][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.869959][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.879219][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.887226][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.895659][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.903407][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.924565][ T8067] device veth1_vlan entered promiscuous mode [ 314.934614][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 314.942937][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.954116][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.962894][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.970104][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.978579][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.987571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.995980][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.003050][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.011166][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 315.020121][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 315.029272][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 315.033162][ C0] hrtimer: interrupt took 34809 ns [ 315.038167][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.065446][ T8085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.113368][ T8065] device veth0_macvtap entered promiscuous mode [ 315.127523][ T8065] device veth1_macvtap entered promiscuous mode [ 315.147464][ T8065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.158508][ T8065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.173947][ T8065] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 315.185732][ T8065] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.198202][ T8065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.213363][ T8065] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 315.357861][ T8067] device veth0_macvtap entered promiscuous mode [ 315.378668][ T8067] device veth1_macvtap entered promiscuous mode [ 315.398106][ T8067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.413398][ T8067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.424216][ T8067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.438197][ T8067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.453283][ T8067] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 315.463278][ T8067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.476234][ T8067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.487188][ T8067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.502418][ T8067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.516775][ T8067] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 315.733900][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 315.742525][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.752127][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 315.760292][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 315.769014][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 315.779110][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 315.788875][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.797993][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.807513][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.818407][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.828161][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.837964][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 16:04:05 executing program 0: [ 315.883409][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.894021][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.903229][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.915714][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.924874][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 16:04:05 executing program 0: [ 315.937059][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.947272][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 315.958857][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.967937][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.980266][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 316.001571][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 316.014277][ T8074] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 316.030493][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:04:05 executing program 0: [ 316.048929][ T8085] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.076628][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.085982][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 316.095223][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.107873][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.117462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 16:04:05 executing program 0: [ 316.144858][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.158361][ T8069] device veth0_vlan entered promiscuous mode [ 316.174771][ T8074] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.191945][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.217780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.249102][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 16:04:05 executing program 2: [ 316.278402][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 316.301334][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 16:04:05 executing program 0: [ 316.327189][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.350504][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.357698][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.386248][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.405130][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.419457][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.426577][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.441525][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 316.458450][ T8069] device veth1_vlan entered promiscuous mode [ 316.475159][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.485236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.500230][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 316.509812][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.518292][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 316.527662][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 16:04:05 executing program 1: 16:04:05 executing program 2: [ 316.536660][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.560162][ T8085] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 316.602243][ T8085] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 316.637746][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 316.659864][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.682008][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 316.690753][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.700290][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.710142][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.719930][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.728541][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.760006][ T8069] device veth0_macvtap entered promiscuous mode [ 316.774635][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 316.782835][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 316.794330][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.803118][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 316.812000][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 316.825296][ T8074] device veth0_vlan entered promiscuous mode [ 316.834357][ T8069] device veth1_macvtap entered promiscuous mode [ 316.842954][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 316.853603][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.861862][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.870478][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 316.878094][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 316.886589][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.894558][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.912022][ T8074] device veth1_vlan entered promiscuous mode [ 316.920032][ T8069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.931689][ T8069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.942376][ T8069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.952965][ T8069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.962829][ T8069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.973310][ T8069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.984551][ T8069] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 316.996188][ T8085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.014707][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 317.023140][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 317.034982][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.043757][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.054044][ T8069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.064939][ T8069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.075146][ T8069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.085694][ T8069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.095698][ T8069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.106671][ T8069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.117497][ T8069] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 317.129747][ T8074] device veth0_macvtap entered promiscuous mode [ 317.137628][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.149327][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.159194][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.168093][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.176783][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 317.194360][ T8074] device veth1_macvtap entered promiscuous mode [ 317.229820][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.241473][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.251962][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.262892][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.273307][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.284189][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.294124][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.304887][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.316244][ T8074] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 317.325918][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.334773][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.343946][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.361753][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.372376][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.383497][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.395187][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.406316][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.416993][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.426942][ T8074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.437993][ T8074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.449241][ T8074] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 317.456921][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 317.466242][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.475258][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.484488][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.511529][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 317.520086][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.532243][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.540047][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.562541][ T8085] device veth0_vlan entered promiscuous mode [ 317.587011][ T8085] device veth1_vlan entered promiscuous mode [ 317.632551][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 317.640894][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 317.659946][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.675652][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.687181][ T8085] device veth0_macvtap entered promiscuous mode [ 317.706789][ T8085] device veth1_macvtap entered promiscuous mode [ 317.721672][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.732502][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.743101][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.754114][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.765224][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.776384][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.786543][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.798744][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.808798][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.820419][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.832138][ T8085] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 317.843427][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.853914][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.864950][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.878955][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.890319][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.901421][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.911570][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.922414][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.932711][ T8085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.944583][ T8085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.956256][ T8085] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 317.966733][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 317.975256][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.983619][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.992496][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 318.002660][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 318.011673][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:04:07 executing program 0: 16:04:07 executing program 4: 16:04:07 executing program 5: 16:04:07 executing program 2: 16:04:07 executing program 3: 16:04:07 executing program 1: 16:04:07 executing program 0: 16:04:07 executing program 4: 16:04:07 executing program 0: 16:04:07 executing program 2: 16:04:07 executing program 1: 16:04:07 executing program 3: 16:04:07 executing program 4: 16:04:07 executing program 5: 16:04:08 executing program 0: 16:04:08 executing program 3: 16:04:08 executing program 2: 16:04:08 executing program 4: 16:04:08 executing program 1: 16:04:08 executing program 5: 16:04:08 executing program 2: 16:04:08 executing program 3: 16:04:08 executing program 4: 16:04:08 executing program 0: 16:04:08 executing program 5: 16:04:08 executing program 1: 16:04:08 executing program 3: 16:04:08 executing program 4: 16:04:08 executing program 2: 16:04:08 executing program 0: 16:04:08 executing program 5: 16:04:08 executing program 1: 16:04:08 executing program 3: 16:04:08 executing program 4: 16:04:08 executing program 0: 16:04:08 executing program 2: 16:04:09 executing program 5: 16:04:09 executing program 1: 16:04:09 executing program 3: 16:04:09 executing program 4: 16:04:09 executing program 0: 16:04:09 executing program 2: 16:04:09 executing program 5: 16:04:09 executing program 1: 16:04:09 executing program 3: 16:04:09 executing program 0: 16:04:09 executing program 2: 16:04:09 executing program 5: 16:04:09 executing program 4: 16:04:09 executing program 1: 16:04:09 executing program 3: 16:04:09 executing program 0: 16:04:09 executing program 4: 16:04:09 executing program 2: 16:04:09 executing program 5: 16:04:09 executing program 1: 16:04:10 executing program 0: 16:04:10 executing program 5: 16:04:10 executing program 2: 16:04:10 executing program 3: 16:04:10 executing program 4: 16:04:10 executing program 1: 16:04:10 executing program 3: 16:04:10 executing program 4: 16:04:10 executing program 0: 16:04:10 executing program 1: 16:04:10 executing program 2: 16:04:10 executing program 5: 16:04:10 executing program 3: 16:04:10 executing program 4: 16:04:10 executing program 0: 16:04:10 executing program 1: 16:04:10 executing program 5: 16:04:10 executing program 2: 16:04:10 executing program 4: 16:04:10 executing program 3: 16:04:10 executing program 0: 16:04:11 executing program 1: 16:04:11 executing program 2: 16:04:11 executing program 5: 16:04:11 executing program 4: 16:04:11 executing program 3: 16:04:11 executing program 0: 16:04:11 executing program 2: 16:04:11 executing program 1: 16:04:11 executing program 5: 16:04:11 executing program 4: 16:04:11 executing program 3: 16:04:11 executing program 2: 16:04:11 executing program 1: 16:04:11 executing program 0: 16:04:11 executing program 5: 16:04:11 executing program 3: 16:04:11 executing program 4: 16:04:11 executing program 2: 16:04:11 executing program 0: 16:04:11 executing program 5: 16:04:11 executing program 1: 16:04:12 executing program 3: 16:04:12 executing program 2: 16:04:12 executing program 0: 16:04:12 executing program 4: 16:04:12 executing program 1: 16:04:12 executing program 5: 16:04:12 executing program 3: 16:04:12 executing program 0: 16:04:12 executing program 2: 16:04:12 executing program 4: 16:04:12 executing program 1: 16:04:12 executing program 5: 16:04:12 executing program 3: 16:04:12 executing program 2: 16:04:12 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000200)=""/105) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 16:04:12 executing program 1: 16:04:12 executing program 4: 16:04:12 executing program 5: 16:04:12 executing program 3: 16:04:12 executing program 2: 16:04:12 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000200)=""/105) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 16:04:12 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000200)=""/105) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 16:04:13 executing program 1: 16:04:13 executing program 5: 16:04:13 executing program 4: 16:04:13 executing program 2: 16:04:13 executing program 3: 16:04:13 executing program 0: 16:04:13 executing program 1: 16:04:13 executing program 2: 16:04:13 executing program 5: 16:04:13 executing program 3: 16:04:13 executing program 1: 16:04:13 executing program 4: 16:04:13 executing program 2: 16:04:13 executing program 3: 16:04:13 executing program 5: 16:04:13 executing program 1: 16:04:13 executing program 0: 16:04:14 executing program 2: 16:04:14 executing program 5: 16:04:14 executing program 3: 16:04:14 executing program 4: 16:04:14 executing program 1: 16:04:14 executing program 2: 16:04:14 executing program 5: 16:04:14 executing program 3: 16:04:14 executing program 1: 16:04:14 executing program 2: 16:04:14 executing program 0: 16:04:14 executing program 4: 16:04:14 executing program 5: 16:04:14 executing program 1: 16:04:14 executing program 3: 16:04:14 executing program 2: 16:04:14 executing program 5: 16:04:14 executing program 0: 16:04:14 executing program 1: 16:04:14 executing program 4: 16:04:15 executing program 3: 16:04:15 executing program 2: 16:04:15 executing program 0: 16:04:15 executing program 5: 16:04:15 executing program 1: 16:04:15 executing program 4: 16:04:15 executing program 2: 16:04:15 executing program 1: 16:04:15 executing program 3: 16:04:15 executing program 0: 16:04:15 executing program 5: 16:04:15 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote, 0x0, 0x0, 'wlc\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) listxattr(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 16:04:15 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000480)={0x7}, 0x7) 16:04:15 executing program 1: creat(&(0x7f0000000040)='./bus\x00', 0x0) lgetxattr(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)=@random={'user.', 'systemtrustedsystemwlan1securitynodev/{trusted%%+:,^!\\[!\x00'}, 0x0, 0x0) 16:04:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv6_newroute={0x24, 0x18, 0x201, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x1}]}, 0x24}}, 0x0) 16:04:15 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) 16:04:15 executing program 0: pipe(&(0x7f0000000040)) pipe(0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) keyctl$assume_authority(0x2, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) [ 326.560365][ T8599] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 326.633722][ T8607] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:04:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x2c, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x5c}}, 0x0) [ 326.693099][ T8607] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 326.721140][ T8607] bond2 (uninitialized): Released all slaves 16:04:15 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c000000240007ff00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000028ceb860244d6a9b5336c1abe5b94b2f00000000000000000000000000000002000000000000da6e0856d62c"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xc, &(0x7f0000000100)}], 0x492492492492642, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20008041}, 0x4000) socket(0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) close(0xffffffffffffffff) 16:04:16 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) 16:04:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x14, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 16:04:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCFLSH(r0, 0x540b, 0x0) 16:04:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000100)={[{@resuid={'resuid', 0x3d, 0xee01}}]}) [ 326.957296][ T7] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:04:16 executing program 0: pipe(&(0x7f0000000040)) pipe(0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) keyctl$assume_authority(0x2, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) 16:04:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 16:04:16 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b40)=@newtfilter={0x480, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x448, 0x2, [@TCA_RSVP_POLICE={0x444, 0x5, [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0xf7}}}, @TCA_POLICE_RATE={0x404}]}]}}, @TCA_RATE={0x6}]}, 0x480}}, 0x0) [ 327.204580][ T8651] EXT4-fs (sda1): re-mounted. Opts: resuid=0x000000000000ee01, 16:04:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x368, 0x1fc, 0x0, 0x1fc, 0x0, 0x1fc, 0x2d4, 0x2d4, 0x2d4, 0x2d4, 0x2d4, 0x3, 0x0, {[{{@ip={@multicast1=0xe000cb00, @remote, 0x0, 0x0, 'syzkaller0\x00', 'netpci0\x00', {}, {}, 0x84}, 0x0, 0x1b4, 0x1fc, 0x0, {}, [@common=@inet=@sctp={{0x144, 'sctp\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3c4) [ 327.294260][ T8655] EXT4-fs (sda1): re-mounted. Opts: resuid=0x000000000000ee01, 16:04:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000100)={[{@resuid={'resuid', 0x3d, 0xee01}}]}) 16:04:16 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4a827200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) prctl$PR_GET_TSC(0x19, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) socket$inet6(0xa, 0x80002, 0x0) r3 = socket(0x0, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000540)=0xffffffffffffffbb) pipe(0x0) close(0xffffffffffffffff) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 16:04:16 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') read$FUSE(r1, &(0x7f0000000080), 0x10c2) ioctl$KDDISABIO(r1, 0x4b37) openat(0xffffffffffffffff, 0x0, 0x410000, 0x1c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 16:04:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x2c, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20, 0x4, {{}, {}, 0x0, 0x0, 0x2}}]}}]}, 0x5c}}, 0x0) 16:04:17 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 327.845553][ T8683] EXT4-fs (sda1): re-mounted. Opts: resuid=0x000000000000ee01, [ 327.878599][ T8695] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 16:04:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x2c, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_RSVP_PINFO={0x20, 0x4, {{}, {}, 0x0, 0x0, 0x2}}]}}]}, 0x5c}}, 0x0) 16:04:17 executing program 0: r0 = socket(0x25, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 16:04:17 executing program 2: ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000000)={0x3, 0x10000}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000740)={0xffffffffffffffff}) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x2, 0x0) tee(r1, r0, 0x1000, 0x0) keyctl$assume_authority(0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100)={0x5e8c}, 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) 16:04:17 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) 16:04:17 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) 16:04:17 executing program 3: epoll_create1(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000300)) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() getdents64(r0, 0x0, 0x0) syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x0, [0x2]}) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 16:04:17 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4a827200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) prctl$PR_GET_TSC(0x19, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r2) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) socket$inet6(0xa, 0x80002, 0x0) r3 = socket(0x0, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000540)=0xffffffffffffffbb) pipe(0x0) close(0xffffffffffffffff) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 16:04:17 executing program 3: epoll_create1(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000300)) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() getdents64(r0, 0x0, 0x0) syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x0, [0x2]}) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 16:04:17 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f00000014c0)="dde41b4912d20e4f78416248e968369459867e10607ab9e944ff12a785da8b73efd15fd123d9a305c8f52a8baf8f5546254d4f401d16f922fb7b2366246c318702c343fda5a1235c7671a23976f02a5c6083d7b2abd481786a75f04f54d80adc7d3d3509190b51c8ca9b52c7bda46d6c810f2c31cbed6aaf85b0ae8b22b69c272c99b82fc0198c6d91c81b1bf2ce4e8d04fc829d04906e6c968e8a110b14cfc0ac43c37f2e219d3998bf86e921c30a6f556f1ae59303759f2227a4d4d2c11673e44ae3aa782aa568bf8f3bb42cb2abbc43507767c888c03ae17ae5326d663a490e643b403c00d462f10e4daaa837c6cf91631e8970340978f1d918025655dcb8322f35e57200499c9ff9ee1d6c434197d03e3360d23b6b2d7c8b8a0ee11ecf91bad5d64a195552133e6b817dcd4d9377c697fbf99cff6042accf6d431705cb91c826030a1e3ffa0196a85389c476ae18ff2566028ef1c80f1f9feb3f63475736d34b45a19a134c0dfb749e92a71825286d539cc1f5ac5acdfb9e521f0af597e3d3cee44c43d5daa9cc372149d3f19095d2b3efcb8da719d0c5fe217f1e16cc8d74ee8c3f0d09e626d899e61eee6c337f6e9aba1bde9e06bb7972bfcc3f673976140d4516db8f89a2e835c01f17e2a1f33d7c5ce6f4a3ea738f84f435a8ee4d3614d550364d392b5edb7788272b6b934f815a88ccf36d82f19e12c39c874920821323822d08fb49e1a555bcdf50aca1fa6ccfa7a05066d684c05eba87d744eb4c14d6042e1c8051f6e445efa9f076c49fe3d4f108d2e398f0602c89a361bdf187876c55c429fa3f87ab8d7a770a036c24f452267c28b671388902d4f87c970d8cfc1a6e78d49c41405181e7d4a899dcb1bc515ba61c54fc910d0e1c246c328c15f9cc24c09a99b122c3262901ae5f3cbc30220e02623cf7d525f09e46b60578925815b0946cb0038f416737987049722c114ca037138f82519bc9e93af7f949b1bda3a3d4273067d056cb397d71acd4ba86403f1103463f0f5397c1e2d6b309ce8df6ac1c0080107c3baaa0e704f77c5232967355c6bba6c2ed6689933bfa2b3f9345d9b6ed90a71bb124fbe45f91b875f12e0916307d9a6b094a298fa0672086444f791fcaf6ce9614fb13e73983002e9c8c3eccb7ddbb3271c9785d102bc0d2041f142e09a74689ffaed631db278c83eba5f5c5f933733161c48fd0cce6bc9f542938987d71521032771f413bbd2eddca2f7a41b440cabdcbdc90c9f3772a9786929c75fb6f673bfc8e8be972ffaa52adf4c6c1bffadc5ef2316941067af004e3332d2d425c3e8d7e797a63bc651d77b8be183e8634c0232f2da79ae0c77f467757ee3b4a609c7dc63a5b90531d21b6045964998181fd626ea9ea4472088fa8886b8c82e6ddef0c4774e095d36648dc817cc139c31a50d67a5d29bffdd085f041bfd5805eace17f5bd48578006e7a9ad94e61b855f34c208d70f13b4c9808cc833644e4a6ba2083a0c96a4172425b5e03a0356dc3b4695d1a0931bbd587b91504edc28b06e33c96aafaf1a4c8a37a412d8ceb089b8c98e49bc24b5e7afca99fa76dd3fec1421519861da3e07d6ee0286ffcc988ff54f6136eecfef786260943b4ce5e97c10536ae03bb868140b7170e6b789b6e59935fc7688531eca7638731bf02b9f0bcfe8188eb6ca87344739ee4570ab055e3b495c78f5371f6fac9f119922736ecdbc77512a517025033bd783c97d3fd0a8f47f1a98be25ec7c2e0321a83291aff3332a4c18998aa99a3aec5c0ca976defbfddb314fce5ba979a4cf9a1f232112eeac7a9923eb1f59a0870fc963de2f6e90fe0fe7d48440f7c714a20383d7d2288e9bcc4a3ecc7ed62e721538e0dc247482ae6c9731a61ab40f57c11e854afbd36eed330a508baf035b252daecab77428847aca529fc338e2d9ff4e20d870742d89943a7490997a7aaef33719acdb084037c5cad1e63b0ad44489ef52477e81c937eceea0a0e82d4387a8755a6cff39b15757d38a8787c1896ac008a1b2e80a6a5159f1d5e763fb60d1333e772d6b4c8b3232f30e24c7a3d755a0112f20d8fa32ec636c4c83faf94acb429a7bc490c68eb2da58541ee36e0f6c75e54ffcf3448f979f683ed3717ccd0c76c33df0f4aebd9f90f9196f2f2d9b11494b3a8f3f7c4b04bfe6b318d774977fcb7c4b15f0a719762abebd9c0e54bd56187b674ed2b1d4049ac5ec4b7a3d5629993012492a216a30ae61f324cd60b606b77c9dcf99a452e261af210e8fbf67fa63e58926516e981503faaab023279ee0537431cab81f8a035282b01fe81ac8f9c198ebc5be8c098cce56435bafad2f343f7fff5d111952abe9cdf4ee7cdf11f86a3fcf8c5ad56df48e82c05133f3daac0349c5993917ea2f9b113e2a26920e0392642b8a819884231ae84b821c19d3109bdd28edfa9b389f53949b600ef5bbae33b2981eed618a282bc4933b43da71ad3bd6c5c8ba8a42af0635389fc74b721aedf6dc0786aa2a18dd8beeb736903", 0x6fb, 0xfffffffffffffffc) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 16:04:17 executing program 4: epoll_create1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000300)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') geteuid() syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0xeb) 16:04:17 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) 16:04:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x368, 0x1fc, 0x0, 0x1fc, 0x0, 0x1fc, 0x2d4, 0x2d4, 0x2d4, 0x2d4, 0x2d4, 0x3, 0x0, {[{{@ip={@multicast1=0xe000cb00, @remote, 0x0, 0x0, 'syzkaller0\x00', 'netpci0\x00', {}, {}, 0x84, 0x0, 0x64}, 0x0, 0x1b4, 0x1fc, 0x0, {}, [@common=@inet=@sctp={{0x144, 'sctp\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3c4) [ 328.859718][ T8761] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 16:04:18 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) add_key(&(0x7f0000000180)='trusted\x00', 0x0, &(0x7f00000014c0)="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", 0x7f7, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0x0) 16:04:18 executing program 3: ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000000)={0x3, 0x10000}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000040)) pipe(0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) keyctl$assume_authority(0x2, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x5e8c}, 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) 16:04:18 executing program 4: epoll_create1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000300)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') geteuid() syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0xeb) 16:04:18 executing program 2: ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000000)={0x3, 0x10000}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000740)={0xffffffffffffffff}) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x2, 0x0) tee(r1, r0, 0x1000, 0x0) keyctl$assume_authority(0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100)={0x5e8c}, 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) 16:04:18 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) 16:04:18 executing program 1: creat(0x0, 0x0) pipe(&(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 16:04:18 executing program 1: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = dup2(r1, r0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="29000000060000000000000000000000010000000000f9ffffffffffffff00"], 0x29) 16:04:18 executing program 0: [ 329.475794][ T8779] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 329.521695][ T8779] bond2 (uninitialized): Released all slaves 16:04:18 executing program 3: ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000000)={0x3, 0x10000}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000040)) pipe(0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) keyctl$assume_authority(0x2, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x5e8c}, 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) 16:04:18 executing program 5: ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000000)={0x3, 0x10000}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000040)) pipe(0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) keyctl$assume_authority(0x2, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x5e8c}, 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) 16:04:18 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xd0, 0x5, 0x9, "b672457053bbd2d3c85ff64d07032eac", "43fbeebc90e087b71a28e8a08d4c95caaaba27d1507496596283fe226df476fc7f14b49aa2944d67e250ee133bfb2160c52a2fe6b0b4fdf8c26c3434527a0dd210db8e6c90f7eaac087e75b795ba730654d17d5e3b9ffd2179011817e7070f1d91443063a20440c66fb06b406605fab99a33cf547a189747143d7f8c7685a5b58139295052d8388bd3c50d9514c08211ebf1eaa40eb3cf07c6b20d038a70f72eebf5004b2d6baa4d7e2a8080ea56da4338d0ecb0f4f48fe8149805"}, 0xd0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x147441, 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 16:04:19 executing program 1: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = dup2(r1, r0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="29000000060000000000000000000000010000000000f9ffffffffffffff00"], 0x29) [ 330.020980][ T8073] tipc: TX() has been purged, node left! 16:04:19 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:19 executing program 3: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x4}, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) r1 = epoll_create1(0x0) fcntl$dupfd(r1, 0x0, r1) r2 = epoll_create1(0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={r2}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000640)={'security\x00', 0xfb0, "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"}, &(0x7f0000000180)=0xfd4) syz_open_dev$loop(0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, 0x0, 0x0) [ 330.523174][ T8843] EXT4-fs (sda1): re-mounted. Opts: journal_ioprio=0x0000000000000000,commit=0x0000000000001000, [ 330.665080][ T8850] EXT4-fs (sda1): re-mounted. Opts: journal_ioprio=0x0000000000000000,commit=0x0000000000001000, [ 332.026586][ T8073] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 332.061027][ T8073] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 332.089367][ T8073] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 332.110895][ T8073] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 332.122140][ T8073] device bridge_slave_1 left promiscuous mode [ 332.128384][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.214132][ T8073] device bridge_slave_0 left promiscuous mode [ 332.230491][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.298564][ T8073] device veth1_macvtap left promiscuous mode [ 332.314490][ T8073] device veth0_macvtap left promiscuous mode [ 332.340840][ T8073] device veth1_vlan left promiscuous mode [ 332.362364][ T8073] device veth0_vlan left promiscuous mode [ 333.661232][ T8073] device hsr_slave_0 left promiscuous mode [ 333.711199][ T8073] device hsr_slave_1 left promiscuous mode [ 333.769238][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 333.780323][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 333.796064][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 333.854546][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 333.934046][ T8073] bond0 (unregistering): Released all slaves [ 334.038320][ T8873] IPVS: ftp: loaded support on port[0] = 21 [ 334.093813][ T8873] chnl_net:caif_netlink_parms(): no params data found [ 334.135879][ T8873] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.143051][ T8873] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.150728][ T8873] device bridge_slave_0 entered promiscuous mode [ 334.158527][ T8873] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.165853][ T8873] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.174109][ T8873] device bridge_slave_1 entered promiscuous mode [ 334.252755][ T8873] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 334.263662][ T8873] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.305456][ T8873] team0: Port device team_slave_0 added [ 334.312468][ T8873] team0: Port device team_slave_1 added [ 334.334869][ T8873] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 334.345711][ T8873] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.375659][ T8873] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 334.388138][ T8873] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 334.398538][ T8873] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.428999][ T8873] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 334.513344][ T8873] device hsr_slave_0 entered promiscuous mode [ 334.561435][ T8873] device hsr_slave_1 entered promiscuous mode [ 334.601043][ T8873] debugfs: Directory 'hsr0' with parent '/' already present! [ 334.650087][ T8873] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.657395][ T8873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.664709][ T8873] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.672009][ T8873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.708664][ T8873] 8021q: adding VLAN 0 to HW filter on device bond0 [ 334.721855][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 334.731399][ T2411] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.739518][ T2411] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.755124][ T8873] 8021q: adding VLAN 0 to HW filter on device team0 [ 334.767034][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.775941][ T2411] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.783040][ T2411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.803328][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.812096][ T8084] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.819144][ T8084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.828498][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.846286][ T8873] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 334.856969][ T8873] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 334.870593][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 334.879348][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 334.888643][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.898238][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.907072][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 334.923027][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 334.930485][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 334.944984][ T8873] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 335.018711][ T8873] device veth0_vlan entered promiscuous mode [ 335.026663][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 335.035838][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.044783][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.052974][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.067348][ T8873] device veth1_vlan entered promiscuous mode [ 335.085577][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 335.094317][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 335.105318][ T8873] device veth0_macvtap entered promiscuous mode [ 335.114254][ T8873] device veth1_macvtap entered promiscuous mode [ 335.126919][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 335.137403][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.147273][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 335.157749][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.167868][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 335.178428][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.188657][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 335.199163][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.209117][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 335.219582][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.230895][ T8873] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 335.238791][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 335.247130][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 335.255234][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 335.263851][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 335.274334][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 335.285072][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.295604][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 335.306425][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.316451][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 335.327016][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.336905][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 335.347436][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.357704][ T8873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 335.368163][ T8873] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 335.379714][ T8873] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 335.388676][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 335.397653][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:04:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400000000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000580)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}}, 0x0) 16:04:24 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xd0, 0x5, 0x9, "b672457053bbd2d3c85ff64d07032eac", "43fbeebc90e087b71a28e8a08d4c95caaaba27d1507496596283fe226df476fc7f14b49aa2944d67e250ee133bfb2160c52a2fe6b0b4fdf8c26c3434527a0dd210db8e6c90f7eaac087e75b795ba730654d17d5e3b9ffd2179011817e7070f1d91443063a20440c66fb06b406605fab99a33cf547a189747143d7f8c7685a5b58139295052d8388bd3c50d9514c08211ebf1eaa40eb3cf07c6b20d038a70f72eebf5004b2d6baa4d7e2a8080ea56da4338d0ecb0f4f48fe8149805"}, 0xd0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x147441, 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 16:04:24 executing program 2: creat(0x0, 0x0) pipe(&(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 16:04:24 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x39, 0x0, 0x0, "b672457053bbd2d3c85ff64d07032eac", "43fbeebc90e087b71a28e8a08d4c95caaaba27d1507496596283fe226df476fc7f14b49a"}, 0x39, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x147441, 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 16:04:24 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c000000240007ff00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000028ceb860244d6a9b5336c1abe5b94b2f00000000000000000000000000000002000000000000da6e0856d62c"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xc, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 335.698662][ T8906] EXT4-fs (sda1): re-mounted. Opts: journal_ioprio=0x0000000000000000,commit=0x0000000000001000, 16:04:24 executing program 2: creat(0x0, 0x0) pipe(&(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 16:04:25 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c000000240007ff00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000028ceb860244d6a9b5336c1abe5b94b2f00000000000000000000000000000002000000000000da6e0856d62c"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xc, &(0x7f0000000100)}], 0x492492492492642, 0x0) 16:04:25 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x39, 0x0, 0x0, "b672457053bbd2d3c85ff64d07032eac", "43fbeebc90e087b71a28e8a08d4c95caaaba27d1507496596283fe226df476fc7f14b49a"}, 0x39, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x147441, 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 16:04:25 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:25 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 16:04:25 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 16:04:25 executing program 4: ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x2, r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)) pipe(&(0x7f0000000140)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x5, 0x0) ioctl$BLKIOMIN(r2, 0xc0401273, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000340)) 16:04:25 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 16:04:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffffffffffeb4}], 0xb3e, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0}, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:04:25 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) [ 336.254281][ T8082] tipc: TX() has been purged, node left! [ 336.281235][ T8934] EXT4-fs (sda1): re-mounted. Opts: journal_ioprio=0x0000000000000000,commit=0x0000000000001000, 16:04:25 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') read$FUSE(r0, &(0x7f0000000080), 0x10c2) r1 = socket(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='9p\x00', 0x0, &(0x7f0000001180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 16:04:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_newroute={0x1c, 0x18, 0x201, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}, 0x1c}}, 0x0) 16:04:25 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:25 executing program 0: epoll_create1(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') geteuid() getdents64(r0, 0x0, 0x0) syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 16:04:25 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 16:04:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffffffffffeb4}], 0xb3e, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0}, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:04:26 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 336.906418][ T8961] EXT4-fs (sda1): re-mounted. Opts: journal_ioprio=0x0000000000000000,commit=0x0000000000001000, 16:04:26 executing program 2: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000740)={0xffffffffffffffff}) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x2, 0x0) tee(r1, r0, 0x1000, 0x0) keyctl$assume_authority(0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100), 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) 16:04:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:26 executing program 3: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x7) 16:04:26 executing program 0: epoll_create1(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') geteuid() getdents64(r0, 0x0, 0x0) syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 16:04:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xd2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9fda18980e24193bd4f43a187b5", 0x0, 0x902, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 338.224236][ T8082] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 338.233675][ T8082] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 338.246486][ T8082] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 338.254312][ T8082] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 338.264780][ T8082] device bridge_slave_1 left promiscuous mode [ 338.288615][ T8082] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.342154][ T8082] device bridge_slave_0 left promiscuous mode [ 338.348389][ T8082] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.394238][ T8082] device veth1_macvtap left promiscuous mode [ 338.400286][ T8082] device veth0_macvtap left promiscuous mode [ 338.407140][ T8082] device veth1_vlan left promiscuous mode [ 338.412999][ T8082] device veth0_vlan left promiscuous mode [ 339.561323][ T8082] device hsr_slave_0 left promiscuous mode [ 339.611185][ T8082] device hsr_slave_1 left promiscuous mode [ 339.672601][ T8082] team0 (unregistering): Port device team_slave_1 removed [ 339.683438][ T8082] team0 (unregistering): Port device team_slave_0 removed [ 339.695088][ T8082] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 339.764200][ T8082] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 339.850186][ T8082] bond0 (unregistering): Released all slaves [ 339.958721][ T9006] IPVS: ftp: loaded support on port[0] = 21 [ 340.013755][ T9006] chnl_net:caif_netlink_parms(): no params data found [ 340.092086][ T9006] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.099339][ T9006] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.107662][ T9006] device bridge_slave_0 entered promiscuous mode [ 340.116853][ T9006] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.124339][ T9006] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.133190][ T9006] device bridge_slave_1 entered promiscuous mode [ 340.156075][ T9006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 340.167868][ T9006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 340.189620][ T9006] team0: Port device team_slave_0 added [ 340.196554][ T9006] team0: Port device team_slave_1 added [ 340.214049][ T9006] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 340.221076][ T9006] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 340.247480][ T9006] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 340.259707][ T9006] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 340.267209][ T9006] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 340.294508][ T9006] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 340.373345][ T9006] device hsr_slave_0 entered promiscuous mode [ 340.412524][ T9006] device hsr_slave_1 entered promiscuous mode [ 340.461024][ T9006] debugfs: Directory 'hsr0' with parent '/' already present! [ 340.515537][ T9006] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.522753][ T9006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.530094][ T9006] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.537183][ T9006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.571570][ T9006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 340.584620][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.593330][ T2411] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.601659][ T2411] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.617064][ T9006] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.630085][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.639009][ T2411] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.646222][ T2411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.674148][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.683119][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.690143][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.699548][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 340.709244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 340.718489][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.727265][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.736162][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 340.746973][ T9006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 340.764705][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 340.772606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 340.784347][ T9006] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 340.854019][ T9006] device veth0_vlan entered promiscuous mode [ 340.861697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.870853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.879630][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.887518][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.926889][ T9006] device veth1_vlan entered promiscuous mode [ 340.943141][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 340.951704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 340.960377][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.971408][ T9006] device veth0_macvtap entered promiscuous mode [ 340.980717][ T9006] device veth1_macvtap entered promiscuous mode [ 341.023471][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.033979][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.044014][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.054634][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.064636][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.075831][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.085968][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.096465][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.106447][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.116965][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.128146][ T9006] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 341.162672][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 341.171732][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.181740][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.192720][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.202673][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.213109][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.224014][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.235177][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.245327][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.255770][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.265666][ T9006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.276695][ T9006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.288022][ T9006] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 341.326827][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.335713][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:04:30 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') read$FUSE(r0, &(0x7f0000000080), 0x10c2) r1 = socket(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='9p\x00', 0x0, &(0x7f0000001180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 16:04:30 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) 16:04:30 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:30 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc20, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') read$FUSE(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') read$FUSE(r4, &(0x7f0000000080), 0x10c2) r5 = syz_open_procfs(0x0, 0x0) read$FUSE(r5, 0x0, 0x0) ioctl$KDDISABIO(r3, 0x4b37) openat(r2, 0x0, 0x410000, 0x1c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = getpid() tkill(r6, 0x9) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 16:04:30 executing program 0: epoll_create1(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') geteuid() getdents64(r0, 0x0, 0x0) syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x2, 0xf46]}) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 16:04:30 executing program 2: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000740)={0xffffffffffffffff}) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x2, 0x0) tee(r1, r0, 0x1000, 0x0) keyctl$assume_authority(0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100), 0x4) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) [ 341.701583][ T8082] tipc: TX() has been purged, node left! 16:04:31 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:31 executing program 1: unshare(0x400) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 16:04:31 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc20, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') read$FUSE(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000531000)='numa_maps\x00') read$FUSE(r4, &(0x7f0000000080), 0x10c2) r5 = syz_open_procfs(0x0, 0x0) read$FUSE(r5, 0x0, 0x0) ioctl$KDDISABIO(r3, 0x4b37) openat(r2, 0x0, 0x410000, 0x1c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = getpid() tkill(r6, 0x9) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 16:04:31 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) 16:04:31 executing program 4: pipe(0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) epoll_create1(0x0) 16:04:31 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r1, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) 16:04:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') write$cgroup_type(r0, 0x0, 0x0) [ 342.926034][ T9100] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:04:32 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:32 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 343.253094][ T9108] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 344.393489][ T8082] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 344.422650][ T8082] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 344.451681][ T8082] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 344.501073][ T8082] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 344.512656][ T8082] device bridge_slave_1 left promiscuous mode [ 344.551111][ T8082] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.601636][ T8082] device bridge_slave_0 left promiscuous mode [ 344.607867][ T8082] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.674349][ T8082] device veth1_macvtap left promiscuous mode [ 344.680428][ T8082] device veth0_macvtap left promiscuous mode [ 344.702635][ T8082] device veth1_vlan left promiscuous mode [ 344.711431][ T8082] device veth0_vlan left promiscuous mode [ 345.881355][ T8082] device hsr_slave_0 left promiscuous mode [ 345.931146][ T8082] device hsr_slave_1 left promiscuous mode [ 345.983640][ T8082] team0 (unregistering): Port device team_slave_1 removed [ 345.995589][ T8082] team0 (unregistering): Port device team_slave_0 removed [ 346.005425][ T8082] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 346.055734][ T8082] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 346.116150][ T8082] bond0 (unregistering): Released all slaves [ 346.238035][ T9138] IPVS: ftp: loaded support on port[0] = 21 [ 346.300351][ T9138] chnl_net:caif_netlink_parms(): no params data found [ 346.345649][ T9138] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.352889][ T9138] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.360640][ T9138] device bridge_slave_0 entered promiscuous mode [ 346.368348][ T9138] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.375622][ T9138] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.383872][ T9138] device bridge_slave_1 entered promiscuous mode [ 346.442850][ T9138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 346.453859][ T9138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 346.476187][ T9138] team0: Port device team_slave_0 added [ 346.483011][ T9138] team0: Port device team_slave_1 added [ 346.501813][ T9138] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 346.509004][ T9138] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 346.535327][ T9138] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 346.547658][ T9138] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 346.555037][ T9138] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 346.581829][ T9138] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 346.666467][ T9138] device hsr_slave_0 entered promiscuous mode [ 346.724354][ T9138] device hsr_slave_1 entered promiscuous mode [ 346.829962][ T9138] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.837048][ T9138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.844382][ T9138] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.851542][ T9138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.889718][ T9138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.901890][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.910464][ T8084] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.918817][ T8084] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.932139][ T9138] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.955288][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.971385][ T8078] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.978453][ T8078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.004349][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.013417][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.020453][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.029527][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 347.039165][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 347.048232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.056795][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 347.069471][ T9138] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 347.081149][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 347.089086][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.105788][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 347.113585][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 347.124441][ T9138] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 347.188204][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.201259][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.210591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.218540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.227356][ T9138] device veth0_vlan entered promiscuous mode [ 347.237735][ T9138] device veth1_vlan entered promiscuous mode [ 347.252411][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 347.260383][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 347.274948][ T9138] device veth0_macvtap entered promiscuous mode [ 347.282564][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 347.292254][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.301596][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 347.311803][ T9138] device veth1_macvtap entered promiscuous mode [ 347.327519][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.338346][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.348236][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.358829][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.369009][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.379532][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.389650][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.400144][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.410451][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 347.420946][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.432108][ T9138] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 347.439824][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.448746][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.457472][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.467612][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.478376][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.488715][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.499367][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.509353][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.520332][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.530212][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.540714][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.551126][ T9138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 347.561824][ T9138] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 347.573074][ T9138] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 347.581446][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 347.590508][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:04:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffe08, &(0x7f0000000040)=[{&(0x7f00000001c0)="2e0000001a008102a00f80ecdb4cb9040a4800160b000000d4126e6a65f4e1403a7d0020e2000000180000000000", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f00000047c0)={0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000180)=@ipv6_newrule={0x30, 0x20, 0xc0d, 0x0, 0x0, {0x2, 0x30}, [@FRA_DST={0x14, 0x1, @mcast1}]}, 0x30}}, 0x0) 16:04:36 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000007", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) 16:04:36 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r1, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) 16:04:36 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:36 executing program 4: epoll_create1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, &(0x7f0000000300)) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) geteuid() syz_emit_ethernet(0x29ba, &(0x7f0000000380)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x44, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0xf46]}) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0xeb) 16:04:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x50, 0x7b, 0xa, 0xff00}}, &(0x7f0000000000)='GPL\x00', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 347.868210][ T9171] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 347.891500][ T9171] bond2 (uninitialized): Released all slaves [ 347.911121][ T9173] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:04:37 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) [ 347.954552][ T9173] bond2 (uninitialized): Released all slaves 16:04:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0xe, 0x0, 0x7ff, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0xff83) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f0000000600)=@ipx={0x4, 0x1, 0x7, "b1f67c62214e", 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000680)="93a32ee489c89ccc6e26174b516a", 0xe}, {&(0x7f00000006c0)="b1a28dec726958a2bcba6e250f360f4adaffcae0d8a30a8ca114e81926399e406abfd9ecff8ac1817ef5300dc276fb55982a7018a0e631d48fe719ef66be3cdeae2175d901e8521f4d863cac03634398146735604613e2e1756da889df5172a1994aa0254c886340d8e91596bfd9047e07f3b3eb45748c89c69cd6cbb439b58af312884375ea8c7f42cb0490f0c283fc1f90766128896b76b13ff4656f638e246b8ee42fd71bdda4", 0xa8}, {&(0x7f00000007c0)="3016bf41bfae62b2a4e6893a2c", 0xd}], 0x3, &(0x7f0000000840)=[{0x98, 0x108, 0x0, "a7cf4326d5ed83c530beb364fac0a0c44fe088c69a70438027b14a41fc10c85ac9827266b7fb5373f8869038b674a169fe325069144791def6931c31c40998abe1a1608fdec0d686f470b0806344357b6e19b665867fe9976666a70e9aad411f880bc861299e3ca09a3494ea191b316597462aa7c02adf3376f0d08ce8839db35b"}, {0x68, 0xd681331c6afe420c, 0x8, "d90fbd8015c3009d8cfcfa23c9bce1cc95196feed1ba9727d395541ebd59dfb1d39cd72264abde4ea7676b6048effb0436168429d1c121060f65003f74f13648a020ced30a2a462cd37a902252ea3de95e5fa49e"}, {0xc0, 0x29, 0x5270, "d84d3bf80e9643cb3793bbadfc1626bad66ee3f47e60ea33381a864ba215676fd46d444e677f8429049113956c3a0cfb41a67ece3a1278beca55ad6d2370cfef606366cc226bb38dfc9d723b9edc6a6d18d4630d3a3c52a362afc9c67087d5ab550f0d3bb71c89a93860684e0c123cd2e2cd8487101a877d1ca20e085e60e22f3420260b0867367383414c2b104c3b69c6fa8e9759097d36edc61a1fb516b1206a218249b95921031c992fd9"}, {0x10, 0x0, 0x6835}, {0x30, 0x14, 0x8, "a94e0a5b0f1825240da5551dd0b59bae61e85c9a475f3480ca491424e8c30d99"}, {0x108, 0x107, 0x9, "7046ad00b0a30bcd639667b858bdc29f81dc4deec03c525348eacd041626d9538272cebc4cd5ee43c3f4a844ce8f9197b0d71e7af39d29e9f1575325523410a49f4fdaf614cd49ccb30021c2554a21805d08a5cded50046e283cf8b6928dc203baa96c09d284e185eea567f84af8aba19b5b2d80e24be4beae5d010c8211277a2fa8f78c4aaf3c30de42b08116a256b010442972eb0c633403c4c12ec3f21040ecefa7692872964dfe16f5a384471a05cb44945391855be4b259797ac7c070f79e5f4cd83daaea3f1f070987b1222ef3ef295a87e51885b5b79f601340aafe60650660b623e9d27deae17d74c40473b50dc17d18a597b398"}], 0x308}, 0x42) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) ioctl$TUNSETFILTEREBPF(r3, 0x6628, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000480)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r3, r4, 0x10, 0x1}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f0000000280)=[{0x9, 0x3, 0x0, 0xc995}, {0x8, 0x7, 0x3, 0x3}]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) ioctl$TUNSETFILTEREBPF(r5, 0x6628, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000580)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f00000002c0), 0xff83) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6611, 0x0) perf_event_open(&(0x7f0000000c00)={0x3, 0x70, 0x7, 0x20, 0x40, 0x6, 0x0, 0x80, 0xb1442, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x5, @perf_config_ext={0xcf7}, 0x40, 0x20000000000, 0x1f, 0x5, 0x4, 0x4, 0x964}, 0x0, 0x8, 0xffffffffffffffff, 0x8) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000780)) r8 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r8, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:04:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x0, 0x10002}, 0xffffffffffffff66) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x22, &(0x7f0000000040)=r1, 0x52d) 16:04:37 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000007", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) [ 348.256941][ T9196] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 348.294159][ T9196] bond2 (uninitialized): Released all slaves 16:04:37 executing program 0: r0 = socket(0x2, 0x8002, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000240)="5108bee10418", 0x169}], 0x1, 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="4402", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r1, 0x0) r2 = msgget(0x1, 0x5) msgrcv(r2, &(0x7f0000000300)={0x0, ""/238}, 0xf6, 0x0, 0x800) connect$unix(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="e397863fcefb6b5f07d656b7bb2bedfc4426f777ba06b193af7e66f59279f8c0793a83b1bfff864b9efd68a22f"], 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00002e2f66591765302f66696c653000"], 0x10) 16:04:37 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) [ 348.305772][ T7] tipc: TX() has been purged, node left! 16:04:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0xe, 0x0, 0x7ff, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0xff83) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f0000000600)=@ipx={0x4, 0x1, 0x7, "b1f67c62214e", 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000680)="93a32ee489c89ccc6e26174b516a", 0xe}, {&(0x7f00000006c0)="b1a28dec726958a2bcba6e250f360f4adaffcae0d8a30a8ca114e81926399e406abfd9ecff8ac1817ef5300dc276fb55982a7018a0e631d48fe719ef66be3cdeae2175d901e8521f4d863cac03634398146735604613e2e1756da889df5172a1994aa0254c886340d8e91596bfd9047e07f3b3eb45748c89c69cd6cbb439b58af312884375ea8c7f42cb0490f0c283fc1f90766128896b76b13ff4656f638e246b8ee42fd71bdda4", 0xa8}, {&(0x7f00000007c0)="3016bf41bfae62b2a4e6893a2c", 0xd}], 0x3, &(0x7f0000000840)=[{0x98, 0x108, 0x0, "a7cf4326d5ed83c530beb364fac0a0c44fe088c69a70438027b14a41fc10c85ac9827266b7fb5373f8869038b674a169fe325069144791def6931c31c40998abe1a1608fdec0d686f470b0806344357b6e19b665867fe9976666a70e9aad411f880bc861299e3ca09a3494ea191b316597462aa7c02adf3376f0d08ce8839db35b"}, {0x68, 0xd681331c6afe420c, 0x8, "d90fbd8015c3009d8cfcfa23c9bce1cc95196feed1ba9727d395541ebd59dfb1d39cd72264abde4ea7676b6048effb0436168429d1c121060f65003f74f13648a020ced30a2a462cd37a902252ea3de95e5fa49e"}, {0xc0, 0x29, 0x5270, "d84d3bf80e9643cb3793bbadfc1626bad66ee3f47e60ea33381a864ba215676fd46d444e677f8429049113956c3a0cfb41a67ece3a1278beca55ad6d2370cfef606366cc226bb38dfc9d723b9edc6a6d18d4630d3a3c52a362afc9c67087d5ab550f0d3bb71c89a93860684e0c123cd2e2cd8487101a877d1ca20e085e60e22f3420260b0867367383414c2b104c3b69c6fa8e9759097d36edc61a1fb516b1206a218249b95921031c992fd9"}, {0x10, 0x0, 0x6835}, {0x30, 0x14, 0x8, "a94e0a5b0f1825240da5551dd0b59bae61e85c9a475f3480ca491424e8c30d99"}, {0x108, 0x107, 0x9, "7046ad00b0a30bcd639667b858bdc29f81dc4deec03c525348eacd041626d9538272cebc4cd5ee43c3f4a844ce8f9197b0d71e7af39d29e9f1575325523410a49f4fdaf614cd49ccb30021c2554a21805d08a5cded50046e283cf8b6928dc203baa96c09d284e185eea567f84af8aba19b5b2d80e24be4beae5d010c8211277a2fa8f78c4aaf3c30de42b08116a256b010442972eb0c633403c4c12ec3f21040ecefa7692872964dfe16f5a384471a05cb44945391855be4b259797ac7c070f79e5f4cd83daaea3f1f070987b1222ef3ef295a87e51885b5b79f601340aafe60650660b623e9d27deae17d74c40473b50dc17d18a597b398"}], 0x308}, 0x42) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) ioctl$TUNSETFILTEREBPF(r3, 0x6628, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000480)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r3, r4, 0x10, 0x1}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f0000000280)=[{0x9, 0x3, 0x0, 0xc995}, {0x8, 0x7, 0x3, 0x3}]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) ioctl$TUNSETFILTEREBPF(r5, 0x6628, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000580)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f00000002c0), 0xff83) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6611, 0x0) perf_event_open(&(0x7f0000000c00)={0x3, 0x70, 0x7, 0x20, 0x40, 0x6, 0x0, 0x80, 0xb1442, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x5, @perf_config_ext={0xcf7}, 0x40, 0x20000000000, 0x1f, 0x5, 0x4, 0x4, 0x964}, 0x0, 0x8, 0xffffffffffffffff, 0x8) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000780)) r8 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r8, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:04:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv6_newroute={0x1c, 0x18, 0x201, 0x0, 0x0, {0xa, 0xfc}}, 0x1c}}, 0x0) 16:04:37 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 16:04:37 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000300)={@local, @random="54a0d77a6d42", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev}, {0x0, 0x0, 0x8}}}}}, 0x0) 16:04:37 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000ec0)=@filter={'filter\x00', 0xe, 0x4, 0x3a8, 0xd0, 0x1a0, 0x1a0, 0xd0, 0xd0, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x4, 0x0, {[{{@ipv6={@dev, @local, [], [], 'geneve1\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'rose0\x00', 'netdevsim0\x00', {}, {0xff}}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv6=@ipv4={[], [], @multicast2}, @ipv6=@local, @ipv4=@broadcast, @ipv4=@multicast2, 0x23}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) r1 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000007540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 348.634819][ T9218] x_tables: duplicate underflow at hook 2 16:04:37 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:38 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) [ 348.791949][ T9218] x_tables: duplicate underflow at hook 2 16:04:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x4, 0x540, 0x2d0, 0x1c0, 0x0, 0x0, 0x2d0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4, 0x0, {[{{@ip={@multicast2, @remote, 0x0, 0x0, 'gretap0\x00', 'dummy0\x00'}, 0x0, 0x198, 0x1c0, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xffff, 0x0, 0x21, 0x0, 'syz1\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}, @common=@unspec=@nfacct={{0x48, 'nfacct\x00'}, {'syz0\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@unspec=@comment={{0x120, 'comment\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'veth0_to_bond\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5a0) 16:04:38 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x800000003, 0xff) r1 = eventfd2(0x3ff, 0x0) write$eventfd(r1, &(0x7f00000000c0)=0xfffffffffffffffa, 0x8) r2 = eventfd2(0x3ff, 0x0) write$eventfd(r2, &(0x7f00000000c0)=0xfffffffffffffffa, 0x8) dup2(r1, r2) r3 = dup(r0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141142, 0x0) getgid() ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 16:04:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="58000000040601000000000000000800000000000500040000ba00000c0007800800134000000000050005000200000005000100060000000900020073797a300000000013000300686173683a6e65742c696661636500000c598b107957a7659ea498fde5504fa2a32a784c4c7817bac5ed942c1acd8abe38bbcee65e79cb3e3f83c189bbb663465a11e2024dc3202e8ec40d1c2be7ec9388d86c22dea5d4396a06a4b7d0c002486e967a27b0e2da5db0156d9d9d94cedd41212ce81c09c14979db318405283db02d33e33da3b6a4"], 0x58}}, 0x0) [ 349.108941][ T9238] x_tables: duplicate underflow at hook 2 [ 349.163061][ T9238] x_tables: duplicate underflow at hook 2 16:04:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xa0006000, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)="2e0000001e000507ed0080648c63000001006080000000000300f88000f01700d0bd000000000008000000000000", 0x2e}], 0x1}, 0x0) 16:04:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)="2e0000001e000507ed0080648c63000001006080000000000300f88000f01700d0bd000000000008000000000000", 0x2e}], 0x1}, 0x0) 16:04:38 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) [ 350.074279][ T7] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 350.081899][ T7] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 350.090078][ T7] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 350.105532][ T7] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 350.131305][ T7] device bridge_slave_1 left promiscuous mode [ 350.137636][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.194174][ T7] device bridge_slave_0 left promiscuous mode [ 350.210810][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.278231][ T7] device veth1_macvtap left promiscuous mode [ 350.291110][ T7] device veth0_macvtap left promiscuous mode [ 350.297411][ T7] device veth1_vlan left promiscuous mode [ 350.321730][ T7] device veth0_vlan left promiscuous mode [ 351.481347][ T7] device hsr_slave_0 left promiscuous mode [ 351.511152][ T7] device hsr_slave_1 left promiscuous mode [ 351.573234][ T7] team0 (unregistering): Port device team_slave_1 removed [ 351.584313][ T7] team0 (unregistering): Port device team_slave_0 removed [ 351.595791][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 351.655100][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 351.715459][ T7] bond0 (unregistering): Released all slaves [ 351.818729][ T9270] IPVS: ftp: loaded support on port[0] = 21 [ 351.872307][ T9270] chnl_net:caif_netlink_parms(): no params data found [ 351.944438][ T9270] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.951709][ T9270] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.960037][ T9270] device bridge_slave_0 entered promiscuous mode [ 351.971883][ T9270] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.979140][ T9270] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.991987][ T9270] device bridge_slave_1 entered promiscuous mode [ 352.017667][ T9270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 352.029238][ T9270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 352.055966][ T9270] team0: Port device team_slave_0 added [ 352.064484][ T9270] team0: Port device team_slave_1 added [ 352.082820][ T9270] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 352.090071][ T9270] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 352.121131][ T9270] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 352.136984][ T9270] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 352.144496][ T9270] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 352.171376][ T9270] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 352.256798][ T9270] device hsr_slave_0 entered promiscuous mode [ 352.301334][ T9270] device hsr_slave_1 entered promiscuous mode [ 352.398378][ T9270] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.405874][ T9270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.413732][ T9270] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.421422][ T9270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.472005][ T9270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 352.486374][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.496884][ T8078] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.505455][ T8078] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.518657][ T9270] 8021q: adding VLAN 0 to HW filter on device team0 [ 352.533358][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.542284][ T2411] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.549755][ T2411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.574264][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.583049][ T3612] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.594555][ T3612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.603994][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 352.612908][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 352.621982][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.634286][ T9270] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 352.645827][ T9270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 352.654632][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 352.664558][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.681380][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 352.689056][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 352.698351][ T9270] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 352.760676][ T9270] device veth0_vlan entered promiscuous mode [ 352.769231][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.781701][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.794439][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 352.803625][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 352.819429][ T9270] device veth1_vlan entered promiscuous mode [ 352.838899][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 352.851319][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 352.865549][ T9270] device veth0_macvtap entered promiscuous mode [ 352.875026][ T9270] device veth1_macvtap entered promiscuous mode [ 352.889677][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 352.900600][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.910986][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 352.921728][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.932235][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 352.943362][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.953644][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 352.965432][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.976020][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 352.987101][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.998760][ T9270] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 353.007068][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 353.015557][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 353.024162][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 353.033715][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 353.044403][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 353.056009][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.068772][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 353.080078][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.090452][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 353.101661][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.112097][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 353.123129][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.133284][ T9270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 353.144281][ T9270] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 353.156029][ T9270] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 353.164919][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 353.174414][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:04:42 executing program 0: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = dup(r0) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 16:04:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xfffffffc}]}]}, 0x58}}, 0x0) 16:04:42 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x3, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) 16:04:42 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000800)=""/246) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSPASS(r0, 0x4004743c, 0x0) 16:04:42 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x2a000400) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 16:04:42 executing program 4: r0 = memfd_create(&(0x7f0000000580)='TIPC\x00', 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 16:04:42 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:42 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 16:04:42 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) 16:04:42 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r5 = ioctl$TUNGETDEVNETNS(r4, 0x5450, 0x0) fstat(r5, &(0x7f00000000c0)) r6 = fcntl$dupfd(r3, 0x0, r3) write$nbd(r6, 0x0, 0x0) close(r6) fcntl$dupfd(r0, 0x0, r2) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000013) 16:04:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$KDSKBMODE(r2, 0x4b45, 0x0) 16:04:43 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) bind(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @empty}, 0x57) bind(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80) r1 = socket$kcm(0xa, 0x2, 0x73) bind(r1, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @empty}, 0x57) 16:04:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x28, 0x2, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffffffd}]}]}, 0x28}}, 0x0) 16:04:43 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000001080)) mmap(&(0x7f0000759000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f00008df000/0x1000)=nil, 0x1000, 0x0, 0x1132, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a97000/0x1000)=nil, 0x1000, 0x0, 0x1000000000002032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000def000/0xe000)=nil, 0xe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000baa000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 16:04:43 executing program 4: socket(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x40000000000045c, 0x44000102, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000080)=0x802, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 16:04:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$KDSKBMODE(r2, 0x4b45, 0x0) 16:04:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x440, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2}, 0x3c) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f00000000c0)={0x0, 0x0, 0x0, @empty, 'team_slave_1\x00'}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 16:04:43 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:43 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 16:04:43 executing program 1: [ 354.455508][ T9374] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:04:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000180)=ANY=[@ANYBLOB="020f0000150000000000000000000000010018000000000008001200000003000000000000156d0a0cc187ece90000000000000000000000aae920fbb084320423e3d688e2115f5500000000000000000000ffffffffffff05000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000ff0f004df7f9a875f5d36ae9dbfd336a7e9e35e56368b0"], 0xa8}}, 0x4000) 16:04:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x440, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2}, 0x3c) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f00000000c0)={0x0, 0x0, 0x0, @empty, 'team_slave_1\x00'}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 16:04:44 executing program 4: 16:04:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000006400)={&(0x7f0000006240)={0x18, r1, 0x327, 0x0, 0x0, {0x6}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}}, 0x0) 16:04:44 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000001100)=[{&(0x7f00000001c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000200)="10", 0xffe0}], 0x1, &(0x7f0000000440)=[@init={0x18, 0x84, 0x7, {0x2}}], 0x18}], 0x1, 0x0) 16:04:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32, @ANYBLOB="000200000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x5}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001640)=@newlink={0x64, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x24, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r1}, @IFLA_IPTUN_ENCAP_SPORT={0x6}, @IFLA_IPTUN_FLAGS={0x6, 0x8, 0x1}, @IFLA_IPTUN_PROTO={0x5}]}}}, @IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}, @IFLA_XDP_FD={0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x24000880}, 0x0) 16:04:44 executing program 2: 16:04:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x440, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2}, 0x3c) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f00000000c0)={0x0, 0x0, 0x0, @empty, 'team_slave_1\x00'}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 16:04:44 executing program 1: 16:04:44 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:44 executing program 0: 16:04:44 executing program 4: 16:04:44 executing program 2: 16:04:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x440, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2}, 0x3c) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f00000000c0)={0x0, 0x0, 0x0, @empty, 'team_slave_1\x00'}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 16:04:44 executing program 1: 16:04:44 executing program 0: 16:04:44 executing program 4: 16:04:44 executing program 2: 16:04:45 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x440, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2}, 0x3c) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f00000000c0)={0x0, 0x0, 0x0, @empty, 'team_slave_1\x00'}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) 16:04:45 executing program 1: 16:04:45 executing program 4: 16:04:45 executing program 2: 16:04:45 executing program 0: 16:04:45 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x440, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2}, 0x3c) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f00000000c0)={0x0, 0x0, 0x0, @empty, 'team_slave_1\x00'}) 16:04:45 executing program 2: 16:04:45 executing program 0: 16:04:45 executing program 1: 16:04:45 executing program 4: 16:04:45 executing program 1: 16:04:45 executing program 2: 16:04:45 executing program 4: 16:04:45 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38128b8, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio'}}, {@commit={'commit', 0x3d, 0x1000}}]}) 16:04:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x440, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2}, 0x3c) socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) 16:04:45 executing program 0: [ 356.731678][ T9270] ================================================================== [ 356.740173][ T9270] BUG: KCSAN: data-race in iput / other_inode_match [ 356.746923][ T9270] [ 356.749248][ T9270] read to 0xffff888128c67bc0 of 8 bytes by task 8069 on cpu 0: [ 356.757120][ T9270] iput+0x53/0x4e0 [ 356.760843][ T9270] dentry_unlink_inode+0x270/0x2e0 [ 356.766065][ T9270] d_delete+0xdb/0xe0 [ 356.770040][ T9270] vfs_unlink+0x398/0x3e0 [ 356.774643][ T9270] do_unlinkat+0x32b/0x530 [ 356.779169][ T9270] __x64_sys_unlink+0x3b/0x50 [ 356.783873][ T9270] do_syscall_64+0xcc/0x3a0 [ 356.788583][ T9270] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.794502][ T9270] [ 356.796936][ T9270] write to 0xffff888128c67bc0 of 8 bytes by task 9270 on cpu 1: [ 356.804827][ T9270] other_inode_match+0x13c/0x5c0 [ 356.809895][ T9270] find_inode_nowait+0x135/0x160 [ 356.815322][ T9270] ext4_mark_iloc_dirty+0x12a8/0x1580 [ 356.820993][ T9270] ext4_mark_inode_dirty+0xe9/0x420 [ 356.826650][ T9270] ext4_unlink+0x71c/0x7d0 [ 356.832111][ T9270] vfs_unlink+0x225/0x3e0 [ 356.836640][ T9270] do_unlinkat+0x32b/0x530 [ 356.841608][ T9270] __x64_sys_unlink+0x3b/0x50 [ 356.847585][ T9270] do_syscall_64+0xcc/0x3a0 [ 356.852255][ T9270] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.858225][ T9270] [ 356.860671][ T9270] Reported by Kernel Concurrency Sanitizer on: [ 356.866985][ T9270] CPU: 1 PID: 9270 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 356.875886][ T9270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.886760][ T9270] ================================================================== [ 356.895111][ T9270] Kernel panic - not syncing: panic_on_warn set ... [ 356.901880][ T9270] CPU: 1 PID: 9270 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 356.910652][ T9270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.920852][ T9270] Call Trace: [ 356.924238][ T9270] dump_stack+0x11d/0x181 [ 356.928811][ T9270] panic+0x210/0x640 [ 356.932719][ T9270] ? vprintk_func+0x8d/0x140 [ 356.937636][ T9270] kcsan_report.cold+0xc/0xd [ 356.942357][ T9270] kcsan_setup_watchpoint+0x3fe/0x460 [ 356.948081][ T9270] __tsan_unaligned_write8+0xc7/0x110 [ 356.953599][ T9270] other_inode_match+0x13c/0x5c0 [ 356.958703][ T9270] ? constant_test_bit+0x12/0x30 [ 356.963744][ T9270] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 356.969606][ T9270] find_inode_nowait+0x135/0x160 [ 356.974696][ T9270] ? ext4_inode_csum_set+0x1e0/0x1e0 [ 356.980075][ T9270] ext4_mark_iloc_dirty+0x12a8/0x1580 [ 356.985594][ T9270] ext4_mark_inode_dirty+0xe9/0x420 [ 356.990928][ T9270] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 356.996661][ T9270] ? timestamp_truncate+0x11b/0x160 [ 357.002064][ T9270] ext4_unlink+0x71c/0x7d0 [ 357.006598][ T9270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 357.013057][ T9270] vfs_unlink+0x225/0x3e0 [ 357.017737][ T9270] ? apparmor_path_unlink+0x36/0x40 [ 357.022941][ T9270] do_unlinkat+0x32b/0x530 [ 357.027563][ T9270] __x64_sys_unlink+0x3b/0x50 [ 357.032336][ T9270] do_syscall_64+0xcc/0x3a0 [ 357.037081][ T9270] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 357.043223][ T9270] RIP: 0033:0x45b0e7 [ 357.047174][ T9270] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.067043][ T9270] RSP: 002b:00007fff4c2c34c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 357.075615][ T9270] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045b0e7 [ 357.083586][ T9270] RDX: 00007fff4c2c34e0 RSI: 00007fff4c2c34e0 RDI: 00007fff4c2c3570 [ 357.091800][ T9270] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 357.100077][ T9270] R10: 0000000000000006 R11: 0000000000000246 R12: 00007fff4c2c4600 [ 357.108137][ T9270] R13: 0000000001bf5940 R14: 0000000000000000 R15: 00007fff4c2c4600 [ 357.118201][ T9270] Kernel Offset: disabled [ 357.122697][ T9270] Rebooting in 86400 seconds..