Warning: Permanently added '10.128.10.58' (ECDSA) to the list of known hosts. 2020/03/14 19:01:37 fuzzer started [ 136.290675][ T32] audit: type=1400 audit(1584212497.340:42): avc: denied { map } for pid=11402 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/14 19:01:42 dialing manager at 10.128.0.26:39629 [ 141.261307][T11414] ld (11414) used greatest stack depth: 3352 bytes left 2020/03/14 19:01:42 syscalls: 2967 2020/03/14 19:01:42 code coverage: enabled 2020/03/14 19:01:42 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/03/14 19:01:42 extra coverage: enabled 2020/03/14 19:01:42 setuid sandbox: enabled 2020/03/14 19:01:42 namespace sandbox: enabled 2020/03/14 19:01:42 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/14 19:01:42 fault injection: enabled 2020/03/14 19:01:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/14 19:01:42 net packet injection: enabled 2020/03/14 19:01:42 net device setup: enabled 2020/03/14 19:01:42 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/14 19:01:42 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 141.530867][ T32] audit: type=1400 audit(1584212502.580:43): avc: denied { integrity } for pid=11417 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 19:03:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}, 0x1, 0x400000000000000}, 0x0) [ 276.078009][ T32] audit: type=1400 audit(1584212637.130:44): avc: denied { map } for pid=11420 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=110 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 276.572292][T11421] IPVS: ftp: loaded support on port[0] = 21 [ 276.786771][T11421] chnl_net:caif_netlink_parms(): no params data found [ 276.937766][T11421] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.945120][T11421] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.954602][T11421] device bridge_slave_0 entered promiscuous mode [ 276.969853][T11421] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.977212][T11421] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.986790][T11421] device bridge_slave_1 entered promiscuous mode [ 277.035492][T11421] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 277.054703][T11421] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 277.104261][T11421] team0: Port device team_slave_0 added [ 277.119661][T11421] team0: Port device team_slave_1 added [ 277.165941][T11421] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 277.173154][T11421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.199677][T11421] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 277.217538][T11421] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 277.224789][T11421] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.251232][T11421] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 277.349658][T11421] device hsr_slave_0 entered promiscuous mode [ 277.384181][T11421] device hsr_slave_1 entered promiscuous mode [ 277.887585][ T32] audit: type=1400 audit(1584212638.940:45): avc: denied { create } for pid=11421 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.894401][T11421] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 277.912572][ T32] audit: type=1400 audit(1584212638.940:46): avc: denied { write } for pid=11421 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 277.912659][ T32] audit: type=1400 audit(1584212638.940:47): avc: denied { read } for pid=11421 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 278.009124][T11421] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 278.082403][T11421] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 278.123082][T11421] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 278.460536][T11421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.496248][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.504726][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.528215][T11421] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.550405][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.560529][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.569940][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.577220][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.627150][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.636809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.646711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.656115][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.663380][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.672404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.683342][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.759662][T11421] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 278.770613][T11421] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 278.787670][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.798209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.809124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.819376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.829688][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 278.839244][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.849503][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.859141][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.872320][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.882034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.943001][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.950706][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.986533][T11421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.058825][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 279.070005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.134339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.143984][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.170035][T11421] device veth0_vlan entered promiscuous mode [ 279.180032][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.189190][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.235646][T11421] device veth1_vlan entered promiscuous mode [ 279.312687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 279.322570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 279.332039][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 279.341848][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 279.382455][T11421] device veth0_macvtap entered promiscuous mode [ 279.409690][T11421] device veth1_macvtap entered promiscuous mode [ 279.469900][T11421] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 279.477893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 279.487775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 279.497138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 279.507168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 279.530693][T11421] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 279.538720][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.548208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.995703][ T32] audit: type=1400 audit(1584212641.050:48): avc: denied { associate } for pid=11421 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 280.199069][T11447] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.215540][T11447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.224894][T11447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 19:04:01 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 19:04:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000702000000feffff7a0af0ff1100000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7040000050000006a0af2fe00000000850000001a000000b700000000000000950000000000000063e165cd844a954b26c933db8e175e097efb3f55bb2007ee51050512b5b42128aa090a79507df79f2d8129cf487130d5f24bf901115e17392ac66ad029d1c08a2c6146101e04aeacea799a22a2fa798b5adc436b27d53337e5003e4be7f8000000000000dbc2777df150b7cdd77b85b94109a314fd085f028f2ed1a4535550614e09d6378198a60978670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9cb6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1efc54fa737c28b994a8512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d6f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804dc5fa77ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a7c2211fe4fd21a18986252a70f8f92eb6f0e8c7db3503680e5e5971ff4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84fad791fa99dac06b57479321a0574fb304bc2a168aa43328c8ddc278a522626dc0655b720ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20faf791ec85821d0c48fb657c29b302b0d2277a84af326f36f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde074569ae753a7ac7fe13cab6692422a46e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da3239acad4aff2066bb5d4045c9585638c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c5f1e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd383d5612ff0230dc6eb55e9d46de56ef907b059b90bc0289afb9a79ae5498f6589880ed6eea7b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb778f54334354ec2697a03aff14a9aa4bd908a99494a65044dd539f5096412b926b2e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c3630eeaebde922320178b00cc6ed7966130b547dbf8b497af0a77fbcf2cd1d0000000000000001c80000000000000000000000091bee53595a779d243a48cea769b10424d28804c026ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef40662d7836d252c566f5ee938a836804ed3a1079b0282a12043408cd60b687dcff91af19f2f8df175d60a2892e456f5f2a42bd13da2022f23daec61854f640f701db0276652f6e74f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfac92e6de9200000000000000000000000000009ec7eee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab5009d9c209644bb1cb603cd60a9e241435fe82d5a96b09c68c73de2f04f15d0053875732f2258aea65559eb00e76e9d0ada2a60ca770663da451790cc36000906d5a9fad98c308e89bd5ffb6151d79c1cee1cdfba05e3633becd937d7a15762e5f5a3a0bc33fdbe28a5ffc83f2f085185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5d81e750d50515a59a3ad09e8802e8f4f5354470900c9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a2aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d3fcd116bce9c764c714c9402c21d181e1e59efb28d4f91652f6820b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf430000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 281.154063][ T32] audit: type=1400 audit(1584212642.210:49): avc: denied { prog_load } for pid=11453 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 19:04:02 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80", 0x1}], 0x1, 0x0) 19:04:02 executing program 0: r0 = socket$inet6(0xa, 0x2000000000801, 0x0) sendto$inet6(r0, 0x0, 0xfe960fa538f12467, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @empty}, 0x0) 19:04:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) 19:04:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) connect$pppl2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x4, 0x2, 0xfffffc01, 0x1}}, 0x2e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @rand_addr="e0fcb8b39a2f9e4fd5e534cd38a61955"}]}, 0x2c}}, 0x0) 19:04:03 executing program 1: r0 = msgget$private(0x0, 0x20) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/139) r1 = msgget(0x2, 0x410) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/172}, 0xb0, 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x8, 0x121200) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f00000001c0)={0x1, 0xd8, "a9a28523fd057aa515c4fb02c61af2a3daca87cad88bc0dd902990c322a394e62585e8d3fff2d02638e3e26abb6a4e2dd711bfe1f032d2760a92001ba7979550c9b33a38b1cc5c54f56bbe89f7c70f6484ed1d1665c4f9bfcb4e416b2d850a9477ac0c03c0ca0631bc2f0f9df69342ded878d1be8d4fe3725545f5ea80740a75504074e503cf9fe1bfbe562bc28b9ae435ec3232f16f51d5fa3eeea86821fee773caa1b127c2c0b85932ca8f0f4d059b18c59f1c91dfb1ca692e5e8b292695c1810823cebcb779d5ec35b6d361dd6001afb9de809668f9cc"}) getitimer(0x2, &(0x7f00000002c0)) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x6) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000300)={0xed6c, 0x6, 0x0, 0x7, 0x3}) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000340)={0x7, "39f9f0"}, 0x6) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x40e42, 0x0) setns(r4, 0x2000000) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0445609, &(0x7f00000003c0)={0xfffffffb, 0x6, 0x4, 0x100, 0x8, {}, {0x0, 0x0, 0x40, 0x0, 0x73, 0x1, "4a99a5d9"}, 0x7fffffff, 0x3, @userptr=0x6cbe3ffe, 0x1, 0x0, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r5, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r6, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}}, 0x40000) getsockname$packet(r5, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, &(0x7f0000000640), 0x4) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x40001, 0x0) ioctl$NS_GET_USERNS(r8, 0xb701, 0x0) 19:04:03 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000080)={0x2, 0x0, [0x3, 0x8, 0xfffffffa, 0x100, 0x80, 0x7, 0x5, 0x9]}) syz_read_part_table(0xfffffe01, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="020181ffffff0a000a00ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 282.455834][T11473] IPVS: ftp: loaded support on port[0] = 21 [ 282.662653][T11476] loop0: p1 p2 p3 < > p4 < p5 p6 > [ 282.668132][T11476] loop0: partition table partially beyond EOD, truncated [ 282.676043][T11476] loop0: p1 start 655370 is beyond EOD, truncated [ 282.682542][T11476] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 282.698152][T11476] loop0: p5 start 655370 is beyond EOD, truncated [ 282.705377][T11476] loop0: p6 size 1073741824 extends beyond EOD, truncated 19:04:03 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000080)={0x2, 0x0, [0x3, 0x8, 0xfffffffa, 0x100, 0x80, 0x7, 0x5, 0x9]}) syz_read_part_table(0xfffffe01, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="020181ffffff0a000a00ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 282.810358][T11473] chnl_net:caif_netlink_parms(): no params data found [ 283.004703][T11473] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.012038][T11473] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.022226][T11473] device bridge_slave_0 entered promiscuous mode [ 283.086973][T11484] loop0: p1 p2 p3 < > p4 < p5 p6 > [ 283.088663][T11473] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.092283][T11484] loop0: partition table partially beyond EOD, truncated [ 283.092762][T11484] loop0: p1 start 655370 is beyond EOD, truncated [ 283.099699][T11473] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.106704][T11484] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 283.115427][T11473] device bridge_slave_1 entered promiscuous mode [ 283.129005][T11484] loop0: p5 start 655370 is beyond EOD, truncated [ 283.141110][T11484] loop0: p6 size 1073741824 extends beyond EOD, truncated 19:04:04 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x1}, 0x8) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r5, @ANYBLOB="000000000000000008000400", @ANYRES32=0x0, @ANYBLOB="14002b80080002000000d17400000800", @ANYRES32, @ANYBLOB], 0x3c}}, 0x0) r6 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000001ec0)={@mcast2, 0x0}, &(0x7f0000001f00)=0x14) sendmmsg$inet6(r2, &(0x7f0000002140)=[{{&(0x7f0000000100)={0xa, 0x4e24, 0x1ff, @remote, 0xfffffffb}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000001c0)="02b1e667a9e9b7f99971baf9e62d02568dacce388ae64567436953522b31b08e337ae5c0d6b0d433ff3a44c4a70ca4111c7b8fc180eaa40a07e1d8393a62716fe3e1e9bf1eb6e38c44100f4af2e6e201e1430bfa6efb", 0x56}, {&(0x7f0000000140)}, {&(0x7f0000000240)="2dc91ccbe2745532ec6678fb6d314fbfc3a1add3bd82df1b040415f8c542d90f6ccddea2f20c29beb234d79c0efff4519801b72b5bf42766a56323fcd180b6a509484471c44d5c699f29ca694316ce260381d2b456d1177d6566f14f56c604eac93cf0dddf31230361c1c6d4d6e8e391", 0x70}, {&(0x7f00000002c0)="6b7c331373a098253db2e9ad8bd2c1805d63630d08860e982eb41e70434a4f3989a255727c8c602e4f99dd08f29a5392c37d37e16046b213e222459ec0b89a16c1e2c68c317c64e994fbca979e255043fbd14f36da5e9fd38dd0516b8d3f88b740bef669fe8e5c5fbac3c0e3f6702433745645e7d845a945f073df3fde82bbc68d0cef86c447174ca200d02bcbfa753f853c469823684561fe1feba88a03dce267089f9469ba9b9d53f2beaa790898fb51dc842f523f79006d6af4a224d00239b99f2052ec766d7554b610", 0xcb}, {&(0x7f00000003c0)="68d720e3926d51baa91fa07fc69f5f07468f75ea7d70967f720e238a008c6434e76ea3c26291ec2ed5c628b8a167f3a491abd6abdb17d0e8a63aecca4e20998a85abf0b06ba5857547262efa48ff3cad3869359f7f274c2db17c85d2b68aebd467c567d8ef8c46c4ebc4ed3b4690057ec78aefdc20e3228a", 0x78}], 0x5, &(0x7f0000000480)=[@hoplimit_2292={{0x10, 0x29, 0x8, 0x1000}}, @dontfrag={{0x10, 0x29, 0x3e, 0x1}}, @rthdr_2292={{0x34, 0x29, 0x39, {0x21, 0x4, 0x2, 0x5, 0x0, [@empty, @remote]}}}, @hopopts_2292={{0x1c, 0x29, 0x36, {0x3b, 0x0, [], [@enc_lim={0x4, 0x1, 0x1}]}}}, @rthdr={{0x34, 0x29, 0x39, {0x5c, 0x4, 0x2, 0x8, 0x0, [@dev={0xfe, 0x80, [], 0x30}, @rand_addr="11c93ff2562fadfe10e614baca12f9fc"]}}}, @dstopts_2292={{0x214, 0x29, 0x4, {0x3a, 0x3f, [], [@hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x38, {0x3, 0xc, 0x72, 0x1, [0x4, 0x7f, 0xffff, 0xfff, 0x8c, 0xb74c]}}, @generic={0x1, 0xdb, "4de6af1f35ac37cd29241171ea3faf5cfcf86e7b55d9bf5005e2bb2b25a27d96f143cd8c6a92b1d4c083339ee3d499c904bf4349ebbe9fb99a42b006e5d7d14ae89844f8aeb1ee0984f2a92e83fce9c775f71ac09ba1dd8d6ca71b1c38f06cf2acb63a1bb43f3059426ea46920ff2344e351d6e4d4aacf32e1ef63ce37f940d078a58647f071740eed1bb5b4362c2c3485418a4c1d02f56ea402f1e85e8fc84fb852bab23c0356c4fed2894769264609b53a0d69bb1fe5f975d327f390cc23d39497930cb0ac59ef623cf89d1b68e6ddc2dd3b7df6d3007e5b72f4"}, @pad1, @jumbo={0xc2, 0x4, 0x8}, @generic={0x1, 0xb8, "21005db4448b5983d4f7e68e20b0974ecf7e0b204d2787effbfb8a9091551e8de0a6fefb12f521aee4ce0add373ba90b8c1a117fa869f89a4b61390052c7e9003497af55f5bd0ff1b138800db782d6fa3cd2bf35c00f377913f959a12717217163949852298bf40739c4bf4e10f54f146894acf4926939831ba4c028051274da4bde7ecadc9ac773dff3bd1b32d4eaed454f4537cf0beb1e3da033f5435ab78ddf1339dc7eb5189fd38090efad2246575155345d7859e502"}, @hao={0xc9, 0x10, @mcast1}]}}}, @pktinfo={{0x20, 0x29, 0x32, {@empty, r5}}}, @hopopts_2292={{0xcc, 0x29, 0x36, {0x2c, 0x16, [], [@enc_lim={0x4, 0x1, 0x4}, @generic={0x3, 0x7f, "6b700aab73c83a19473b717b2ab1fcfdb867d56b2d30be22c4aba1eedb9a37df7f3b9211b2776f8a866537538263b02c3f1d8f3bf861c9942216a2e37571506fe11f67fb0ddbc0786a973dc31a23864ea92c2a95372c3c4f29b0435c9b7850d203c2e74aa1e39d750c365d11416cdb4f5e8558ad0914448e8303cd8d04c4a4"}, @pad1, @calipso={0x7, 0x28, {0x3, 0x8, 0x80, 0x40, [0x6, 0x8, 0x1, 0x1]}}]}}}, @hopopts={{0x3c, 0x29, 0x36, {0x2f, 0x4, [], [@hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x6}, @hao={0xc9, 0x10, @remote}]}}}], 0x3e0}}, {{&(0x7f0000000880)={0xa, 0x4e24, 0x6, @mcast1}, 0x1c, &(0x7f0000000d00)=[{&(0x7f00000008c0)="afb56c22b1523163701698f5288c0edcaa1509b93e74454256e781d5955560f34fc62bc098027d26a5ead9251fc1cac5933ae48c1b840bf7b31038c3368602a40b2fa2bbb7eca74c79649c698f53cd971fb223acb0a10b5071a0103eaa70d37c1e309018bd162e219a180d6a0905135bac92d6ec3faf805b793b1ab7a5d4a70c4b579f39756d8489098a3988697d9d062d72f3", 0x93}, {&(0x7f0000000980)="010e2b69558c70093c5e426662447444335ee8bc723e270fabe37c4f4d062778404f11ca0892a0d3fc2dafcdd3a24e9c7cf9969d5b436c58319227f7e0183f77d3394e3696e9c12cf2b1d729fa011d29b18d49d22c1fd1de1f49e55399c9d5694d0d8af3ed5e3389ed33e208c72a04c6db939eb57ebc59b1c7f48be0f9faba89af87b0324a0e1e40f24a40b465245b5663a3402346ed5059aada5ea9b18682825701490b797df34eeb2729aae898fb8f3d80c69ebc74f73e7cd674baa2901a77446a239c13bb4a497e9b310f9e08c803e269b139a4d6bd5503a205dcf93c04cf12ee", 0xe2}, {&(0x7f0000000a80)="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", 0xfb}, {&(0x7f0000000b80)="330f3a2c1e485369309c913f81f5b7d904821a20758421844bae62721a253bfc34eeb9ce432860421e10bafeaafd003061e496b607fd9a0891af8ec2a9657566ca0b02a1fa2407ec2aec352beb0468d3d2", 0x51}, {&(0x7f0000000c00)="b633e87dd7f7caf4e84c859e816b5252aafd8d35ec503f4e02981e71ca5cc9f204fad44eb2c0e3fa458bf366401f043b9e6f415bd603e8e0181a877a36e60b7d3791aacd1b44281a1f69099b19e921c51f052a0f8f6d1239aa2499d0d434faa7be12e32388dc8d426865b1dd9ba0a4bf08eb07462f97b1716530dd62f3b3a270cbb8bf7a133fa102413d969cd34f887d2175bcfb440a0670bc03929e302e6755c9785c0c85db97dc92d38be8cbcab07c3ba366dd16602534e0b1865b97216093d6f8a7fc1bb61f1397833ec3528275680c9caecb6de3a9f2b09aecdab9a8e6f74b199c1be4af2a314314219d431d2fe035a22faaa79a7892a5", 0xf9}], 0x5, &(0x7f0000000d40)=[@hoplimit_2292={{0x10, 0x29, 0x8, 0x419d}}, @hopopts={{0x34, 0x29, 0x36, {0x87, 0x3, [], [@hao={0xc9, 0x10, @local}, @pad1, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x1}]}}}], 0x44}}, {{&(0x7f0000000dc0)={0xa, 0x4e24, 0x401, @dev={0xfe, 0x80, [], 0x34}, 0x1}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000e00)="7146ab245b0916d4ebbfcbaed2dfa78a2a88e2b92292b55760ab192781d0bd4898ed1207fe5241d970eb204e91b56d30499bed4e99d135b0a0210a0964504470cd02b6befd5fc6bacb7b6c1023f48445603f4f9e4986fd7bb61ebbf9124eed1dc57361f8633187c0e2383074ef7c842c80bae810f520215a5070c33f39d742cb5de0ebac58d8fb705e14c8c76f771a2c29cdcf6efd731cc8b4aa4f1f3f69301846b6b743ff198ece17c319e7994c5ee95daa6ac977a57df73893760df895dc", 0xbf}, {&(0x7f0000000ec0)="88065e536a74841686d8dd644abf45cde7a0f9065a8076a672faf6b23348e952aa5da985e5b82737201db9d07d9eda97efff070098f4f3fdfdedd6ffbf7e0ee49d2c0963fa86bb95085e75720fccc21341d02c4733020916aad017a5b131a4243f16a1a069", 0x65}, {&(0x7f0000000f40)="9366ad2051289beb981095333e9118bfedb86c037fc9fa3ca0e722e884f5949a6795fccb90637509a126ff5935caa3ab9387979d2b6b51de76e04816a142a3d13d2502ad68d73f8a92662373c0f5d21be3540dc050", 0x55}, {&(0x7f0000000fc0)="78faf419a8fee792d829f11772e2701ce8d7b39e079222cf7af8a4d26acecf9a98872e78865c6ab6", 0x28}, {&(0x7f0000001000)="db3c80a1c4d72cfffb5e98d488801d79387c8d51b374e225842a588e14264998e060a6e0fba12c6c3b6acb99b8f7375f39fb6b1fd9a4e048f52111a08a3df539b905b5be525f470c75f2c9621ae7ba09948a2684d2e2089c22e5481e2540110e7342ddadef193f5bb40b94fe4e3a1a75247db1951ab9dffa102d9af30f5484ffdd74e3677dac40b0ab652eb419d368af5d4119d47292568a786c3de40895bc16067bac5f29aafb50f91557548d9a73dabc8a02aa21", 0xb5}, {&(0x7f00000010c0)="152d208a6e5a66663e2855f433979872fe6e02edbdf8bff5c0f600c5529290b9644d31e1f369740a7bf19a54147612cc", 0x30}, {&(0x7f0000001100)="1ff19c3d7935883fe527dae5367a59d30e8edf9ded2917cb0d1e38e20d2cf33c7b25b0ffdca3f802f302bd3b5e87bb40d105fd6f99fd64fc4839c46a0247de7ac852545f20daacbd", 0x48}, {&(0x7f0000001180)="f90468acc8df628066af7a662538ee47a25365bed6bbf0a97d5f6ad14c6b75955e619a430a8c7b018006687de7d0ef9b5aad191a1ddb953239a6eba2c24335f57893c62890ab8526187fc0e3c37e7dbab2e65491a44166094a3733255d3612db56c596638c66d4368d382dfc1cb1c4719957226c603ae1f56bbbd6848a91fd55b45e4a80d1ec5ceb0fe5e9894c16ebf15a4464183737343f710b1870cc7a33493838dcac905881", 0xa7}], 0x8}}, {{&(0x7f0000001280)={0xa, 0x4e22, 0x7, @ipv4={[], [], @loopback}}, 0x1c, &(0x7f0000001900)=[{&(0x7f00000012c0)="fb501f5de3878798080998fd49864eda3e6b44fc7ea215763a189469a984ff80f8af6e970db84ab3ac457b388c8669e0ae1f7d8e5cb45a0a30eab68b24c134b883ab46c60da17b457693bd1dda6ea35b980cfbce975a5b24391a4835bfd175761adac1288ca87e5f589cea731043a1955ac03218930d987ab883f5ce9a45d1c1dfd871a93201decb1a079183bee46262b4fd91c249a2bc8652", 0x99}, {&(0x7f0000001380)="9c235d", 0x3}, {&(0x7f00000013c0)="65312e7f5c42043c", 0x8}, {&(0x7f0000001400)="9559e8cbb85fc5a74d8f3f22c35481ee93cc0dbc3c6b8b867bf304defeb33179aa3cb1686ade7f1f27776134639b1e66cfcaeb6a71fe0c468cb93f4e7ffbd74a2773fae39e0b60a92ce9d3032160bd047db4eca03136db6e858bc3dcf336a41481f04d9310a773ea7dfa6155920c431e77837eef6c8cce6bd8087cb5636e889d401d727f67b15c5406773f73a345408a1f172345fb505e81c629648621840ba09bd300e24df366b8a9def57afed2a2", 0xaf}, {&(0x7f00000014c0)="d9d5f1e0095d77f7484d51e55654f7b383a20e163c4e3da75a02519ede75cd7eff1d1501041e907c32781d7f3d085eafd408be523afb8761ffa6c7c5184f66dd66ca61c57125c9096b00b89f64f1e3c5b06866de", 0x54}, {&(0x7f0000001540)="fdbcacd588545844f4bb820fc3ec41a8ce95a79faa257089ee7a26d65a4721b9b59aef81c1f6676e23d07891fa8a044640f62118261a9c2181b13ffc16407350d7f17274dd32e9267d3990472b7134e0b92201003d118175170b0f0d9271bd64f04699607dc7a26a354f9714e194d0d68ce04bdedf222e0fd1c7e207a4c403aa4a1494252fe9bce679564e2bf70ade78ab57865c35319dec46dc1c3b61402d2e9ca1eecb0d5a009c35ce5102aad6ed3f41e7ff13fc1c29938e93451aee5fac73ee3261e1ba8fda5378ac3211a524f599f0549f7d892b64de", 0xd8}, {&(0x7f0000001640)="9aa45db8799bad1c2fa9a4fe3c1732804e845fdc77ccd89263e59f86f2c1", 0x1e}, {&(0x7f0000001680)="2f5dcb80ed428648ee5e35675ae08a298f6bc9a038555897489998fada4e7bb52857f9da2387199d6e456a424bcd5298808d48ff84cfa181047fdac9d0d7cd0954432cc0cc92704d1bc23df9242ab9a52e45c0d093db2d5b578cc8420e49f1f00dd2bfc31fdbe555822ca54e83d3487a9918ecb168cf454c92f672de1c9eb9769301bc4738c143e6fd45f1f9fb3c39e113ea50bde9989490fc7a102fe15df45a8ba136c74caf78e61a3aae51d8e70e5217cfc6b8f17895247021dcf1e9c9dff8769554e7a197", 0xc6}, {&(0x7f0000001780)="1a93ac127effd1e95a38b4efa395d06a57d0f7c6f714e46efa2b6dd964f8e5be134a7c01f2296ff92623e2de22cea13a4940d23cf98073b53d08ba6c47d765062a54dbcb976753d08dd4c3c93a936b9f4256e9ebfdee", 0x56}, {&(0x7f0000001800)="a871fb3aa7f675be6716faf7647db946e7760d9ba499da76a41917538ba5d37b15aaff2a97679953e5b7309b38937b790c352ccc4a10b10da602a98c9197c6501dbd8c3fb1b6b0b0d1bcfe9158b5dc4f7a8e59c77b907af2b593c9a9aaa2c1bad1a14b58500643fa6595af942fb4009747fc3d59d96a00996673aa3a384f22863a28ae5c0d71c2e5a18e6972a51fcbc081f0ea4dafb5f89cafc65de8f4a0c3d434b7ff8ad912eb128c114081ddc18d466ce1c7ec76592d85296473f486a396ec0482c883c9c5b9263e494e14230bee4c73d6c45fc02e165b0091581e2e", 0xdd}], 0xa, &(0x7f0000001f40)=[@pktinfo={{0x20, 0x29, 0x32, {@mcast1, r7}}}, @rthdr={{0x74, 0x29, 0x39, {0x3a, 0xc, 0x0, 0x7, 0x0, [@local, @loopback, @loopback, @dev={0xfe, 0x80, [], 0x24}, @empty, @local]}}}, @dstopts_2292={{0x12c, 0x29, 0x4, {0x2e, 0x22, [], [@calipso={0x7, 0x18, {0x1, 0x4, 0x0, 0x80, [0x5, 0x2]}}, @pad1, @ra={0x5, 0x2, 0x3f}, @ra={0x5, 0x2, 0x9}, @calipso={0x7, 0x28, {0x3, 0x8, 0xdb, 0x8, [0x9, 0x6c, 0x0, 0x9]}}, @jumbo={0xc2, 0x4, 0x9}, @pad1, @generic={0x5, 0xab, "8c52575aaf4ed40d9e5a3e17d41557419b37e1fe2723f45a29c0d3ee981a55be04210dfb50e3fa9ad356de95853f0355c08e9f0e5f09f63895273162c6d1ac90e9f6da2fd2cffb09575c3bfc89a4e0fd36a6c519544757a76b85172152fc0dd63ecc7a7bad6726450739c00130b3397a6fd697391ae26a59da53107dc631b9ffaf47d5384c4ae7b57f88da7c1790d227b9bad15c92d670da92f3267feb39e68c664434ac543c45c06af3ca"}, @hao={0xc9, 0x10, @remote}]}}}, @pktinfo={{0x20, 0x29, 0x32, {@mcast1, r5}}}, @dontfrag={{0x10, 0x29, 0x3e, 0x1f}}], 0x1f0}}], 0x4, 0x9000) [ 283.313745][T11473] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.333762][T11489] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 283.341962][T11489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 283.351423][T11489] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 283.411382][T11473] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.525432][T11473] team0: Port device team_slave_0 added [ 283.532059][T11489] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 283.540728][T11489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 283.550169][T11489] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 283.569354][T11473] team0: Port device team_slave_1 added [ 283.664005][T11473] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 283.671082][T11473] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 283.697466][T11473] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 19:04:04 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x1}, 0x8) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r5, @ANYBLOB="000000000000000008000400", @ANYRES32=0x0, @ANYBLOB="14002b80080002000000d17400000800", @ANYRES32, @ANYBLOB], 0x3c}}, 0x0) r6 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000001ec0)={@mcast2, 0x0}, &(0x7f0000001f00)=0x14) sendmmsg$inet6(r2, &(0x7f0000002140)=[{{&(0x7f0000000100)={0xa, 0x4e24, 0x1ff, @remote, 0xfffffffb}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000001c0)="02b1e667a9e9b7f99971baf9e62d02568dacce388ae64567436953522b31b08e337ae5c0d6b0d433ff3a44c4a70ca4111c7b8fc180eaa40a07e1d8393a62716fe3e1e9bf1eb6e38c44100f4af2e6e201e1430bfa6efb", 0x56}, {&(0x7f0000000140)}, {&(0x7f0000000240)="2dc91ccbe2745532ec6678fb6d314fbfc3a1add3bd82df1b040415f8c542d90f6ccddea2f20c29beb234d79c0efff4519801b72b5bf42766a56323fcd180b6a509484471c44d5c699f29ca694316ce260381d2b456d1177d6566f14f56c604eac93cf0dddf31230361c1c6d4d6e8e391", 0x70}, {&(0x7f00000002c0)="6b7c331373a098253db2e9ad8bd2c1805d63630d08860e982eb41e70434a4f3989a255727c8c602e4f99dd08f29a5392c37d37e16046b213e222459ec0b89a16c1e2c68c317c64e994fbca979e255043fbd14f36da5e9fd38dd0516b8d3f88b740bef669fe8e5c5fbac3c0e3f6702433745645e7d845a945f073df3fde82bbc68d0cef86c447174ca200d02bcbfa753f853c469823684561fe1feba88a03dce267089f9469ba9b9d53f2beaa790898fb51dc842f523f79006d6af4a224d00239b99f2052ec766d7554b610", 0xcb}, {&(0x7f00000003c0)="68d720e3926d51baa91fa07fc69f5f07468f75ea7d70967f720e238a008c6434e76ea3c26291ec2ed5c628b8a167f3a491abd6abdb17d0e8a63aecca4e20998a85abf0b06ba5857547262efa48ff3cad3869359f7f274c2db17c85d2b68aebd467c567d8ef8c46c4ebc4ed3b4690057ec78aefdc20e3228a", 0x78}], 0x5, &(0x7f0000000480)=[@hoplimit_2292={{0x10, 0x29, 0x8, 0x1000}}, @dontfrag={{0x10, 0x29, 0x3e, 0x1}}, @rthdr_2292={{0x34, 0x29, 0x39, {0x21, 0x4, 0x2, 0x5, 0x0, [@empty, @remote]}}}, @hopopts_2292={{0x1c, 0x29, 0x36, {0x3b, 0x0, [], [@enc_lim={0x4, 0x1, 0x1}]}}}, @rthdr={{0x34, 0x29, 0x39, {0x5c, 0x4, 0x2, 0x8, 0x0, [@dev={0xfe, 0x80, [], 0x30}, @rand_addr="11c93ff2562fadfe10e614baca12f9fc"]}}}, @dstopts_2292={{0x214, 0x29, 0x4, {0x3a, 0x3f, [], [@hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x38, {0x3, 0xc, 0x72, 0x1, [0x4, 0x7f, 0xffff, 0xfff, 0x8c, 0xb74c]}}, @generic={0x1, 0xdb, "4de6af1f35ac37cd29241171ea3faf5cfcf86e7b55d9bf5005e2bb2b25a27d96f143cd8c6a92b1d4c083339ee3d499c904bf4349ebbe9fb99a42b006e5d7d14ae89844f8aeb1ee0984f2a92e83fce9c775f71ac09ba1dd8d6ca71b1c38f06cf2acb63a1bb43f3059426ea46920ff2344e351d6e4d4aacf32e1ef63ce37f940d078a58647f071740eed1bb5b4362c2c3485418a4c1d02f56ea402f1e85e8fc84fb852bab23c0356c4fed2894769264609b53a0d69bb1fe5f975d327f390cc23d39497930cb0ac59ef623cf89d1b68e6ddc2dd3b7df6d3007e5b72f4"}, @pad1, @jumbo={0xc2, 0x4, 0x8}, @generic={0x1, 0xb8, "21005db4448b5983d4f7e68e20b0974ecf7e0b204d2787effbfb8a9091551e8de0a6fefb12f521aee4ce0add373ba90b8c1a117fa869f89a4b61390052c7e9003497af55f5bd0ff1b138800db782d6fa3cd2bf35c00f377913f959a12717217163949852298bf40739c4bf4e10f54f146894acf4926939831ba4c028051274da4bde7ecadc9ac773dff3bd1b32d4eaed454f4537cf0beb1e3da033f5435ab78ddf1339dc7eb5189fd38090efad2246575155345d7859e502"}, @hao={0xc9, 0x10, @mcast1}]}}}, @pktinfo={{0x20, 0x29, 0x32, {@empty, r5}}}, @hopopts_2292={{0xcc, 0x29, 0x36, {0x2c, 0x16, [], [@enc_lim={0x4, 0x1, 0x4}, @generic={0x3, 0x7f, "6b700aab73c83a19473b717b2ab1fcfdb867d56b2d30be22c4aba1eedb9a37df7f3b9211b2776f8a866537538263b02c3f1d8f3bf861c9942216a2e37571506fe11f67fb0ddbc0786a973dc31a23864ea92c2a95372c3c4f29b0435c9b7850d203c2e74aa1e39d750c365d11416cdb4f5e8558ad0914448e8303cd8d04c4a4"}, @pad1, @calipso={0x7, 0x28, {0x3, 0x8, 0x80, 0x40, [0x6, 0x8, 0x1, 0x1]}}]}}}, @hopopts={{0x3c, 0x29, 0x36, {0x2f, 0x4, [], [@hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x6}, @hao={0xc9, 0x10, @remote}]}}}], 0x3e0}}, {{&(0x7f0000000880)={0xa, 0x4e24, 0x6, @mcast1}, 0x1c, &(0x7f0000000d00)=[{&(0x7f00000008c0)="afb56c22b1523163701698f5288c0edcaa1509b93e74454256e781d5955560f34fc62bc098027d26a5ead9251fc1cac5933ae48c1b840bf7b31038c3368602a40b2fa2bbb7eca74c79649c698f53cd971fb223acb0a10b5071a0103eaa70d37c1e309018bd162e219a180d6a0905135bac92d6ec3faf805b793b1ab7a5d4a70c4b579f39756d8489098a3988697d9d062d72f3", 0x93}, {&(0x7f0000000980)="010e2b69558c70093c5e426662447444335ee8bc723e270fabe37c4f4d062778404f11ca0892a0d3fc2dafcdd3a24e9c7cf9969d5b436c58319227f7e0183f77d3394e3696e9c12cf2b1d729fa011d29b18d49d22c1fd1de1f49e55399c9d5694d0d8af3ed5e3389ed33e208c72a04c6db939eb57ebc59b1c7f48be0f9faba89af87b0324a0e1e40f24a40b465245b5663a3402346ed5059aada5ea9b18682825701490b797df34eeb2729aae898fb8f3d80c69ebc74f73e7cd674baa2901a77446a239c13bb4a497e9b310f9e08c803e269b139a4d6bd5503a205dcf93c04cf12ee", 0xe2}, {&(0x7f0000000a80)="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", 0xfb}, {&(0x7f0000000b80)="330f3a2c1e485369309c913f81f5b7d904821a20758421844bae62721a253bfc34eeb9ce432860421e10bafeaafd003061e496b607fd9a0891af8ec2a9657566ca0b02a1fa2407ec2aec352beb0468d3d2", 0x51}, {&(0x7f0000000c00)="b633e87dd7f7caf4e84c859e816b5252aafd8d35ec503f4e02981e71ca5cc9f204fad44eb2c0e3fa458bf366401f043b9e6f415bd603e8e0181a877a36e60b7d3791aacd1b44281a1f69099b19e921c51f052a0f8f6d1239aa2499d0d434faa7be12e32388dc8d426865b1dd9ba0a4bf08eb07462f97b1716530dd62f3b3a270cbb8bf7a133fa102413d969cd34f887d2175bcfb440a0670bc03929e302e6755c9785c0c85db97dc92d38be8cbcab07c3ba366dd16602534e0b1865b97216093d6f8a7fc1bb61f1397833ec3528275680c9caecb6de3a9f2b09aecdab9a8e6f74b199c1be4af2a314314219d431d2fe035a22faaa79a7892a5", 0xf9}], 0x5, &(0x7f0000000d40)=[@hoplimit_2292={{0x10, 0x29, 0x8, 0x419d}}, @hopopts={{0x34, 0x29, 0x36, {0x87, 0x3, [], [@hao={0xc9, 0x10, @local}, @pad1, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x1}]}}}], 0x44}}, {{&(0x7f0000000dc0)={0xa, 0x4e24, 0x401, @dev={0xfe, 0x80, [], 0x34}, 0x1}, 0x1c, &(0x7f0000001240)=[{&(0x7f0000000e00)="7146ab245b0916d4ebbfcbaed2dfa78a2a88e2b92292b55760ab192781d0bd4898ed1207fe5241d970eb204e91b56d30499bed4e99d135b0a0210a0964504470cd02b6befd5fc6bacb7b6c1023f48445603f4f9e4986fd7bb61ebbf9124eed1dc57361f8633187c0e2383074ef7c842c80bae810f520215a5070c33f39d742cb5de0ebac58d8fb705e14c8c76f771a2c29cdcf6efd731cc8b4aa4f1f3f69301846b6b743ff198ece17c319e7994c5ee95daa6ac977a57df73893760df895dc", 0xbf}, {&(0x7f0000000ec0)="88065e536a74841686d8dd644abf45cde7a0f9065a8076a672faf6b23348e952aa5da985e5b82737201db9d07d9eda97efff070098f4f3fdfdedd6ffbf7e0ee49d2c0963fa86bb95085e75720fccc21341d02c4733020916aad017a5b131a4243f16a1a069", 0x65}, {&(0x7f0000000f40)="9366ad2051289beb981095333e9118bfedb86c037fc9fa3ca0e722e884f5949a6795fccb90637509a126ff5935caa3ab9387979d2b6b51de76e04816a142a3d13d2502ad68d73f8a92662373c0f5d21be3540dc050", 0x55}, {&(0x7f0000000fc0)="78faf419a8fee792d829f11772e2701ce8d7b39e079222cf7af8a4d26acecf9a98872e78865c6ab6", 0x28}, {&(0x7f0000001000)="db3c80a1c4d72cfffb5e98d488801d79387c8d51b374e225842a588e14264998e060a6e0fba12c6c3b6acb99b8f7375f39fb6b1fd9a4e048f52111a08a3df539b905b5be525f470c75f2c9621ae7ba09948a2684d2e2089c22e5481e2540110e7342ddadef193f5bb40b94fe4e3a1a75247db1951ab9dffa102d9af30f5484ffdd74e3677dac40b0ab652eb419d368af5d4119d47292568a786c3de40895bc16067bac5f29aafb50f91557548d9a73dabc8a02aa21", 0xb5}, {&(0x7f00000010c0)="152d208a6e5a66663e2855f433979872fe6e02edbdf8bff5c0f600c5529290b9644d31e1f369740a7bf19a54147612cc", 0x30}, {&(0x7f0000001100)="1ff19c3d7935883fe527dae5367a59d30e8edf9ded2917cb0d1e38e20d2cf33c7b25b0ffdca3f802f302bd3b5e87bb40d105fd6f99fd64fc4839c46a0247de7ac852545f20daacbd", 0x48}, {&(0x7f0000001180)="f90468acc8df628066af7a662538ee47a25365bed6bbf0a97d5f6ad14c6b75955e619a430a8c7b018006687de7d0ef9b5aad191a1ddb953239a6eba2c24335f57893c62890ab8526187fc0e3c37e7dbab2e65491a44166094a3733255d3612db56c596638c66d4368d382dfc1cb1c4719957226c603ae1f56bbbd6848a91fd55b45e4a80d1ec5ceb0fe5e9894c16ebf15a4464183737343f710b1870cc7a33493838dcac905881", 0xa7}], 0x8}}, {{&(0x7f0000001280)={0xa, 0x4e22, 0x7, @ipv4={[], [], @loopback}}, 0x1c, &(0x7f0000001900)=[{&(0x7f00000012c0)="fb501f5de3878798080998fd49864eda3e6b44fc7ea215763a189469a984ff80f8af6e970db84ab3ac457b388c8669e0ae1f7d8e5cb45a0a30eab68b24c134b883ab46c60da17b457693bd1dda6ea35b980cfbce975a5b24391a4835bfd175761adac1288ca87e5f589cea731043a1955ac03218930d987ab883f5ce9a45d1c1dfd871a93201decb1a079183bee46262b4fd91c249a2bc8652", 0x99}, {&(0x7f0000001380)="9c235d", 0x3}, {&(0x7f00000013c0)="65312e7f5c42043c", 0x8}, {&(0x7f0000001400)="9559e8cbb85fc5a74d8f3f22c35481ee93cc0dbc3c6b8b867bf304defeb33179aa3cb1686ade7f1f27776134639b1e66cfcaeb6a71fe0c468cb93f4e7ffbd74a2773fae39e0b60a92ce9d3032160bd047db4eca03136db6e858bc3dcf336a41481f04d9310a773ea7dfa6155920c431e77837eef6c8cce6bd8087cb5636e889d401d727f67b15c5406773f73a345408a1f172345fb505e81c629648621840ba09bd300e24df366b8a9def57afed2a2", 0xaf}, {&(0x7f00000014c0)="d9d5f1e0095d77f7484d51e55654f7b383a20e163c4e3da75a02519ede75cd7eff1d1501041e907c32781d7f3d085eafd408be523afb8761ffa6c7c5184f66dd66ca61c57125c9096b00b89f64f1e3c5b06866de", 0x54}, {&(0x7f0000001540)="fdbcacd588545844f4bb820fc3ec41a8ce95a79faa257089ee7a26d65a4721b9b59aef81c1f6676e23d07891fa8a044640f62118261a9c2181b13ffc16407350d7f17274dd32e9267d3990472b7134e0b92201003d118175170b0f0d9271bd64f04699607dc7a26a354f9714e194d0d68ce04bdedf222e0fd1c7e207a4c403aa4a1494252fe9bce679564e2bf70ade78ab57865c35319dec46dc1c3b61402d2e9ca1eecb0d5a009c35ce5102aad6ed3f41e7ff13fc1c29938e93451aee5fac73ee3261e1ba8fda5378ac3211a524f599f0549f7d892b64de", 0xd8}, {&(0x7f0000001640)="9aa45db8799bad1c2fa9a4fe3c1732804e845fdc77ccd89263e59f86f2c1", 0x1e}, {&(0x7f0000001680)="2f5dcb80ed428648ee5e35675ae08a298f6bc9a038555897489998fada4e7bb52857f9da2387199d6e456a424bcd5298808d48ff84cfa181047fdac9d0d7cd0954432cc0cc92704d1bc23df9242ab9a52e45c0d093db2d5b578cc8420e49f1f00dd2bfc31fdbe555822ca54e83d3487a9918ecb168cf454c92f672de1c9eb9769301bc4738c143e6fd45f1f9fb3c39e113ea50bde9989490fc7a102fe15df45a8ba136c74caf78e61a3aae51d8e70e5217cfc6b8f17895247021dcf1e9c9dff8769554e7a197", 0xc6}, {&(0x7f0000001780)="1a93ac127effd1e95a38b4efa395d06a57d0f7c6f714e46efa2b6dd964f8e5be134a7c01f2296ff92623e2de22cea13a4940d23cf98073b53d08ba6c47d765062a54dbcb976753d08dd4c3c93a936b9f4256e9ebfdee", 0x56}, {&(0x7f0000001800)="a871fb3aa7f675be6716faf7647db946e7760d9ba499da76a41917538ba5d37b15aaff2a97679953e5b7309b38937b790c352ccc4a10b10da602a98c9197c6501dbd8c3fb1b6b0b0d1bcfe9158b5dc4f7a8e59c77b907af2b593c9a9aaa2c1bad1a14b58500643fa6595af942fb4009747fc3d59d96a00996673aa3a384f22863a28ae5c0d71c2e5a18e6972a51fcbc081f0ea4dafb5f89cafc65de8f4a0c3d434b7ff8ad912eb128c114081ddc18d466ce1c7ec76592d85296473f486a396ec0482c883c9c5b9263e494e14230bee4c73d6c45fc02e165b0091581e2e", 0xdd}], 0xa, &(0x7f0000001f40)=[@pktinfo={{0x20, 0x29, 0x32, {@mcast1, r7}}}, @rthdr={{0x74, 0x29, 0x39, {0x3a, 0xc, 0x0, 0x7, 0x0, [@local, @loopback, @loopback, @dev={0xfe, 0x80, [], 0x24}, @empty, @local]}}}, @dstopts_2292={{0x12c, 0x29, 0x4, {0x2e, 0x22, [], [@calipso={0x7, 0x18, {0x1, 0x4, 0x0, 0x80, [0x5, 0x2]}}, @pad1, @ra={0x5, 0x2, 0x3f}, @ra={0x5, 0x2, 0x9}, @calipso={0x7, 0x28, {0x3, 0x8, 0xdb, 0x8, [0x9, 0x6c, 0x0, 0x9]}}, @jumbo={0xc2, 0x4, 0x9}, @pad1, @generic={0x5, 0xab, "8c52575aaf4ed40d9e5a3e17d41557419b37e1fe2723f45a29c0d3ee981a55be04210dfb50e3fa9ad356de95853f0355c08e9f0e5f09f63895273162c6d1ac90e9f6da2fd2cffb09575c3bfc89a4e0fd36a6c519544757a76b85172152fc0dd63ecc7a7bad6726450739c00130b3397a6fd697391ae26a59da53107dc631b9ffaf47d5384c4ae7b57f88da7c1790d227b9bad15c92d670da92f3267feb39e68c664434ac543c45c06af3ca"}, @hao={0xc9, 0x10, @remote}]}}}, @pktinfo={{0x20, 0x29, 0x32, {@mcast1, r5}}}, @dontfrag={{0x10, 0x29, 0x3e, 0x1f}}], 0x1f0}}], 0x4, 0x9000) [ 283.831997][T11473] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 283.839508][T11473] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 283.865772][T11473] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 284.080096][T11473] device hsr_slave_0 entered promiscuous mode [ 284.144603][T11473] device hsr_slave_1 entered promiscuous mode [ 284.203100][T11473] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 284.210881][T11473] Cannot create hsr debugfs directory [ 284.218178][T11501] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 284.226891][T11501] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 284.236325][T11501] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 19:04:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c00000010000507000000000000000000000000f91d1b1009975ed1a7fbae953e58701d6f59c993ba615bfe39502bfd0f3038a33c8d83ae461e09035fd2b9089e084ac387b96c0ed1238dccb4f914062cba3aa97427e200", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800900010076657468000000000400028008000400000000009f6c9eb3dd1315eaf89165661c9dfe4fd334408cc736c19fb8bb19f49c32347a9ae7b825fa15f5ab3327673d4f9797abf0d6704e6bf05c628733a9780145dda7"], 0x3c}}, 0x0) [ 284.523674][T11511] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 19:04:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='xfrm0\x00', 0x10) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={0x364, r2, 0x90fc047e054328f9, 0x0, 0x0, {}, [@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, "ddd292762ec50cee58d55eb0da9779f817342fc03a341a48d096fd1c5cd6dffc8392864c"}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac08}, @NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x0, @multicast}, {0xa, 0x0, @dev={[], 0x22}}, {0xa, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, {0xa, 0x0, @dev={[], 0x3d}}]}, @NL80211_ATTR_BEACON_HEAD={0x2dd, 0xe, "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"}]}, 0x364}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40811}, 0x4000) ioctl$void(0xffffffffffffffff, 0xc0045878) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71019000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 284.782401][T11473] netdevsim netdevsim1 netdevsim0: renamed from eth0 19:04:05 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000000)={0x5, &(0x7f0000000080)=[{@none}, {@fixed}, {}, {@none}, {@none}]}) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f0000000340)=',\\%\xd7\xe4\x9c\xe3\xc1\x99\x8e/}iR\xd5\v@Z\xe1\xd8\xe8\v\xe6\x87\x93\xd2a6Z\xd3AO%\xda\xdb\xfb$\x0f\xb9\x1fQw.HOo-\xca_\xca\xff\xfe\x85\x1c\xeb$\xbb\x0f\xa5Z@]\xadt;\xf3\x95\x89(|\x9e\xb8C\x896\xdb\x89\r\xe0})D\xee\x7f\x92\xf2\x82\xe3C?\">\x85FRG\x87\xa4f1\xc8l\xfa1\xf9\xcc\x13\xce\x88\xd7\x10\x87~\xa5\xff\x1bP\xefqH\x80\xf0m\x19\xec\x12\x10\xe6\x163\a4I\x94h!(\x19.\xbc\xadx\a\x83\xb4\x98\xe3\x9d\x9f\x1e}\'\xcc\xf5s\x82\v\xa8\xb2\xc4\xf5$\x18O,3\xecZ\x8eW5\xef\xfe>\xd9=#\x11\xc1rys\x81\x80\x9b\xfd\xbc\xad\x17A\xae\xfd\x11\x1d\x9b\xf7\xcf\x01\\\xbb\xd1r\xbbq\xb0\xdf\x1e\xc7\xdb\xc1\x89\xec\x12A\xce\xd4-Q[\xea!\\\n.\xc4H\xc4\xe1\xf6\x01>\x01\xaa]\xfb\x8c\x05\x99\x9ah\xf8\xdd (\xe5\x86-N\xb3Dp\x1f`/\xc9\xe2\rE>\xc9I\\\x10\x91\x1f\x80\xde\xd7\xd2\xce\xdf@\xdb)Ub\x9dHe\x8c\x1d\x01\x00\x00\x80a`\x9b\xa5\xf8\xf1B\xacT,)\xc2\xa4\xa9\xe8\x92H\x88\xff\a\x00\x00\x00\x00\x00\x00\xc6\xbf\xe7`6\xce$\xda6\xf0\x15\x7f\xfe\xb9\x90\xc3\x1d\xf9\x1d\xfbZ\xec\b\xf1\xd3\xed\xb7\xc1J-\x00\x00\x00\x00\x00\x00\x00') [ 284.857110][T11473] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 284.925237][T11473] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 284.994204][T11473] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 285.005397][T11518] overlayfs: unrecognized mount option "\%/}iR @Z 懓a6ZAO%$Qw.HOo-_$Z@]t;(|C6ۉ })DC?">FRGf1l1Έ~PqHm34Ih!(.x㝟}'s $O" or missing value [ 285.036272][T11519] overlayfs: unrecognized mount option "\%/}iR @Z 懓a6ZAO%$Qw.HOo-_$Z@]t;(|C6ۉ })DC?">FRGf1l1Έ~PqHm34Ih!(.x㝟}'s $O" or missing value 19:04:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$pptp(0x18, 0x1, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$procfs(0xffffffffffffff9c, &(0x7f0000001800)='/proc/stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001940)='/dev/urandom\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) clone3(&(0x7f0000007540)={0x1200100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000007500)=[0x0], 0x1}, 0x50) [ 285.461429][T11473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.520206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.529292][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.551641][T11473] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.567367][ T32] audit: type=1400 audit(1584212646.620:50): avc: denied { create } for pid=11522 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 285.588862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.603616][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.613014][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.620235][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.693861][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.703124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.713364][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.722777][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.730067][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.739172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.750072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.772674][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.783269][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.815831][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.825892][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.836298][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.901770][T11473] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.912350][T11473] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.927495][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.937455][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.947509][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.956942][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.005185][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 286.035462][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.043504][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.081432][T11473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.148084][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.158021][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 19:04:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)="f5bd7e98993d71744c6170217080a214f621e8abdd298f4ca4a01350b951ef8829febdbe374dad37b8e036a2e334a0a5b5cc20f74f5ba74cfeb82e528587b4b787d88744edf55560e11e13133d822b84cc8157f9ac1f5d1839e40f268cb267c6d772d2772a11ac4363a4f3fd63db394643cc0a81166e6c237b637ae9fed15198e5f2464663497a54d9463d4ea76cd4779b3425e8f2ca5c57a15afafb4602b1e3a0f8ac2c9bdef5b3ecf6074b9dfc9a35b391018c0cfbeaf2a9ab1014f432c89f838b2aaeabdc9ae36328e8d651efcb1d4d2a7610235d03fd0c347ad39313c34730bfbda840de9ec3", 0xe8) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000540)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030400306c00573a00000000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0xfd82, 0x4000002, 0x0, 0x2ff) [ 286.222279][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.231720][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.258230][T11473] device veth0_vlan entered promiscuous mode [ 286.267103][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.277143][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.315180][T11473] device veth1_vlan entered promiscuous mode [ 286.406916][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 286.416722][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 286.426167][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.435957][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.462013][T11473] device veth0_macvtap entered promiscuous mode [ 286.488754][T11473] device veth1_macvtap entered promiscuous mode [ 286.550015][T11473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.560711][T11473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.574608][T11473] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 286.584766][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 19:04:07 executing program 0: r0 = getpid() clone3(&(0x7f00000002c0)={0x20904000, 0x0, 0x0, 0xffffffffffffffff, {}, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r0], 0x1}, 0x50) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000100)) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18, 0x0, 0x8}, 0x18) [ 286.594478][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.603563][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.613393][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.640089][T11473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.651448][T11473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.665084][T11473] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 286.676764][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.686845][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 19:04:08 executing program 0: r0 = getpid() clone3(&(0x7f00000002c0)={0x20904000, 0x0, 0x0, 0xffffffffffffffff, {}, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r0], 0x1}, 0x50) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r2, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000100)) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18, 0x0, 0x8}, 0x18) 19:04:09 executing program 1: sync() r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x100, 0x0) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) write$P9_RSYMLINK(r1, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x10, 0x0, 0x1}}, 0x14) 19:04:09 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e00000035000504d25a80648c63940d0224fc601000000004000400050082c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 19:04:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) recvfrom$phonet(r1, &(0x7f0000000440)=""/86, 0x3a, 0x80000042, 0x0, 0xffffffffffffff88) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x4000, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000380)={{&(0x7f00000002c0)=""/95, 0x5f}, &(0x7f0000000340), 0x4}, 0x20) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000280)) write(r0, &(0x7f0000000080)="240000001a005f3814f9f407000903018000200000000000000000000300020040000000", 0x24) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x140, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000140)="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") flock(0xffffffffffffffff, 0x8) 19:04:10 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000140)=@bcast) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000440)={0x9, "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"}) [ 289.069616][T11573] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:04:10 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setgroups(0x400000000000006b, &(0x7f0000000000)=[0x0, 0x0]) socket$inet(0x2, 0x2, 0x1) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}, 0x0, 0x0, 0x20000001, 0x2, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x1) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 19:04:10 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000140)=@bcast) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000440)={0x9, "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"}) [ 289.409220][ T32] audit: type=1400 audit(1584212650.460:51): avc: denied { open } for pid=11581 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 289.434983][ T32] audit: type=1400 audit(1584212650.460:52): avc: denied { kernel } for pid=11581 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 289.460208][ T32] audit: type=1400 audit(1584212650.460:53): avc: denied { confidentiality } for pid=11581 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 19:04:10 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000140)=@bcast) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000440)={0x9, "dd6f7bb591662e4f137758a3ef3897f9f04928378ffae4d62a14cf4136426fe7e681ef4f3ba7182ba2eb995ea0c57c5d0a61c50c90c8c84ccd3f83241f9dbf803601dc49acc0baf2ae60ef5345c4f95d21a1837af0f396b35116365659313a343972658e6c400597845ff4b59a4458f57f3b2220f37e8e153cbb77308ca6dba4a21ea58f8fab2a02ea94ba9ed1a6bb13e6565e566bf2237d5e7a8f05ea5898cae19af8ef99c486e91e27adf4c60a8bb51d0b98d864f6e2ef6da4207d45183162e9c3cedf2e1be77255297b8ca9720cc3487c26c93a9dcfd626f963756980b193b5495dc5b71bdc27a693ae3bf7fc506b4ac77efc6ff0b553c0f97f3ee87061ba758ecc9420a44998a2a2f20bd5fe647ad5337b0d2449351d9453deb06171e31817f4bb8b8253006a36139c43d642c063d887a745604194f547f92713d6baa11413db191a3d3d2ab50195df3b6ba10e6d5a6ad5b91cb16fa0f95eb15ca05738cbb960cfeb1bd0172e0440e76c7aa48104d0398dc6a3558b9ecbbedea95444df528f2a46c781ba192bbca596741736182ae4e693425b4ddd6a54ea961d50b00d76ae8e34e9b79fc6be7596d0af08c91ede42af9971f849d671bfb606c2a1595d1485c50541b3bf7d83debac6e025282f3e15adba337627f1abef02303d74827b69380e73128c1adf152d97dc9870c6137b893402385799963b3ddc784c3da73dd2"}) 19:04:10 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000140)=@bcast) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000440)={0x9, "dd6f7bb591662e4f137758a3ef3897f9f04928378ffae4d62a14cf4136426fe7e681ef4f3ba7182ba2eb995ea0c57c5d0a61c50c90c8c84ccd3f83241f9dbf803601dc49acc0baf2ae60ef5345c4f95d21a1837af0f396b35116365659313a343972658e6c400597845ff4b59a4458f57f3b2220f37e8e153cbb77308ca6dba4a21ea58f8fab2a02ea94ba9ed1a6bb13e6565e566bf2237d5e7a8f05ea5898cae19af8ef99c486e91e27adf4c60a8bb51d0b98d864f6e2ef6da4207d45183162e9c3cedf2e1be77255297b8ca9720cc3487c26c93a9dcfd626f963756980b193b5495dc5b71bdc27a693ae3bf7fc506b4ac77efc6ff0b553c0f97f3ee87061ba758ecc9420a44998a2a2f20bd5fe647ad5337b0d2449351d9453deb06171e31817f4bb8b8253006a36139c43d642c063d887a745604194f547f92713d6baa11413db191a3d3d2ab50195df3b6ba10e6d5a6ad5b91cb16fa0f95eb15ca05738cbb960cfeb1bd0172e0440e76c7aa48104d0398dc6a3558b9ecbbedea95444df528f2a46c781ba192bbca596741736182ae4e693425b4ddd6a54ea961d50b00d76ae8e34e9b79fc6be7596d0af08c91ede42af9971f849d671bfb606c2a1595d1485c50541b3bf7d83debac6e025282f3e15adba337627f1abef02303d74827b69380e73128c1adf152d97dc9870c6137b893402385799963b3ddc784c3da73dd2"}) 19:04:11 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000140)=@bcast) 19:04:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22801) write$vhci(r1, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) io_setup(0xa, &(0x7f0000000000)=0x0) r3 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000001c0)=""/171) shmctl$SHM_LOCK(r3, 0xb) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000080)='ceph\x00', 0x0) dup3(r1, r0, 0x0) io_submit(r2, 0x1400, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2}]) r5 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0xc0487c04, &(0x7f0000000000)=""/226) write$vhci(r5, &(0x7f0000000300)=@HCI_EVENT_PKT={0x4, "dee12b"}, 0x4) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x105040, 0x0) ioctl$TIOCGSID(r6, 0x5429, &(0x7f00000002c0)) 19:04:11 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) 19:04:11 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) 19:04:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22801) write$vhci(r1, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) io_setup(0xa, &(0x7f0000000000)=0x0) r3 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000001c0)=""/171) shmctl$SHM_LOCK(r3, 0xb) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000080)='ceph\x00', 0x0) dup3(r1, r0, 0x0) io_submit(r2, 0x1400, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2}]) r5 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0xc0487c04, &(0x7f0000000000)=""/226) write$vhci(r5, &(0x7f0000000300)=@HCI_EVENT_PKT={0x4, "dee12b"}, 0x4) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x105040, 0x0) ioctl$TIOCGSID(r6, 0x5429, &(0x7f00000002c0)) 19:04:11 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 19:04:11 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) 19:04:12 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 19:04:12 executing program 2: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000000080)={0x9d0000, 0x6, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9c0907, 0x6, [], @p_u8=&(0x7f0000000000)=0x2}}) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x1412, 0x100, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000002}, 0x4800) write$P9_RSETATTR(r0, &(0x7f0000000200)={0x7, 0x1b, 0x1}, 0x7) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x10102, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000280)=""/4096) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f00000012c0)) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000001300)=""/107, 0x6b}, {&(0x7f0000001380)=""/56, 0x38}, {&(0x7f00000013c0)=""/12, 0xc}], 0x3, 0xfff) ioctl$TUNATTACHFILTER(r0, 0x400854d5, &(0x7f00000014c0)={0x9, &(0x7f0000001440)=[{0x7f, 0x0, 0x6, 0x5}, {0x5, 0x81, 0x7, 0x2}, {0xc1, 0x8, 0xe2}, {0x0, 0x2d, 0x81, 0x9}, {0x743, 0xf3, 0x8, 0x80}, {0x5, 0x1, 0x80, 0x5}, {0x6, 0x40, 0x0, 0x9}, {0x0, 0x0, 0x1, 0x2}, {0x8, 0x0, 0x5f}]}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001500)='/dev/nullb0\x00', 0x80, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001540)) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000001580)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f00000016c0)) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000017c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001840)={&(0x7f0000001800)={0x38, r4, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr="c95235267cd76de12368ded9494c5317"}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x40}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000414}, 0xc05dcc7ce44d34dd) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000019c0)={&(0x7f00000018c0)=[0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0], &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x3, 0x1, 0x5}) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000001a00)=0x1b) 19:04:12 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) socket$unix(0x1, 0x1, 0x0) 19:04:12 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:12 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:12 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) [ 291.884648][T11631] IPVS: ftp: loaded support on port[0] = 21 19:04:13 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001300010500"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\b\x006\x00', @ANYRES32, @ANYBLOB="df384ef1bc7ace84981abf787bf13ca9aa8df6810d100087667e6e35392fcf"], 0x28}}, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) [ 292.177971][T11631] chnl_net:caif_netlink_parms(): no params data found 19:04:13 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) [ 292.428422][T11631] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.435765][T11631] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.445317][T11631] device bridge_slave_0 entered promiscuous mode [ 292.488333][T11631] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.495791][T11631] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.534465][T11631] device bridge_slave_1 entered promiscuous mode 19:04:13 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) [ 292.626031][T11631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.645062][T11631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.743551][T11631] team0: Port device team_slave_0 added [ 292.766784][T11631] team0: Port device team_slave_1 added [ 292.813258][T11631] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 292.820420][T11631] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.846558][T11631] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 292.870040][T11631] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 292.877432][T11631] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.907567][T11631] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 293.020514][T11631] device hsr_slave_0 entered promiscuous mode [ 293.045721][T11631] device hsr_slave_1 entered promiscuous mode [ 293.105256][T11631] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 293.113296][T11631] Cannot create hsr debugfs directory [ 293.411655][T11631] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 293.469938][T11631] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 293.589614][T11631] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 293.665481][T11631] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 294.082207][T11631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.126207][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.136221][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.162425][T11631] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.215551][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.225675][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.235240][ T3395] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.243572][ T3395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.254128][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.278184][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.288298][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.297578][ T3636] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.304945][ T3636] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.355687][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.365568][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.395556][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.405695][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.444179][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.453687][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.463675][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.473667][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.482648][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.521585][T11631] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 294.535482][T11631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.555298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.564686][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.623292][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.631083][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.677515][T11631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.756075][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.767012][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.841259][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.851395][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.879667][T11631] device veth0_vlan entered promiscuous mode [ 294.891442][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.900726][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.948377][T11631] device veth1_vlan entered promiscuous mode [ 295.039025][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.048906][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 295.059760][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.069678][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.097568][T11631] device veth0_macvtap entered promiscuous mode [ 295.120866][T11631] device veth1_macvtap entered promiscuous mode [ 295.185906][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.196151][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 295.208617][T11631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 295.220543][T11631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.230576][T11631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 295.241120][T11631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.254875][T11631] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 295.265723][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 295.275728][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 295.310560][T11631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 295.321201][T11631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.331320][T11631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 295.341947][T11631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.355461][T11631] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 295.364684][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 295.374929][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 19:04:22 executing program 2: r0 = socket(0x10, 0x80002, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x80) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000100)=@newtaction={0x58, 0x30, 0x53b, 0x0, 0x0, {}, [{0x44, 0x1, [@m_sample={0x40, 0x1, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_RATE={0x8, 0x3, 0xe5}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x0, 0x0, 0xffffffffffffffff}}]}, {0x4}}}]}]}, 0x58}}, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_QUOTA={0xc}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x5}, 0x0) 19:04:22 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000203010300000000000000000300000708000540000000200800044000000004080005400000001c45a456f300000009080004400000001808000540000000000800034000000006080005400000000c0800010003000027"], 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:22 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x408040, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x0, 0x6, 0x0, 0x5}}) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) fstatfs(r1, &(0x7f0000000080)=""/16) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ptrace$getsig(0x4202, r2, 0x7, &(0x7f0000000100)) ioctl$BLKBSZGET(r0, 0x80041270, &(0x7f0000000180)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000580)='/dev/cachefiles\x00', 0x8080, 0x0) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f00000005c0)=0x1, 0x4) r4 = syz_open_dev$binderN(&(0x7f0000000600)='/dev/binder#\x00', 0x0, 0x0) fchdir(r4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000006c0)={0x0, @remote, @dev}, &(0x7f0000000700)=0xc) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer2\x00', 0x0, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000780)={0x2c, 0x8, r5, 0x9, r6}, 0x10) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000007c0)='net/ipx\x00') getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000800)={0x0, 0x31, "92d5e313eb1c8b804087c78ca2645de8a8ef942560527622ff33620b2f404da76c9284fc90a5801e98ad880dbeb189a84c"}, &(0x7f0000000840)=0x39) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000880)={r8, 0x3}, &(0x7f00000008c0)=0x8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_ABS_SETUP(r9, 0x401c5504, &(0x7f0000000900)={0xc85, {0x6046, 0xffffffff, 0x6, 0x1, 0xffffff7f, 0xee}}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000a80)={@dev={0xfe, 0x80, [], 0x1a}}, 0x14) 19:04:22 executing program 4: fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@v2={0x5, 0x1, 0x8, 0x0, 0xcb, "5c5ebba9b8ce3ba2309e67977db5a8346a5b11075bab2091d96cae0e39e5dff5c2554a374ccb73d6ae5c90558dbb18b1fdb73e92611cd03b03102ba9263753e9788c7ac173240e016b23e86bd86d12f0d595a3e94fff4bd296b8fd50469b9220e9858ce8dd87acaa22e16244e0d13dc2d8787e87cff309f2f10e735e335b51cb9a5630cdfeff324b021d00ff78893667f36414540e3fa56728c18d5df444db5d959c418e992a062c91e679b72b8780cac1b6578d4b6b770275d7442bf0a20bf4894b724e65cb3335e1a3fc"}, 0xd4, 0x1) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x151200, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000180)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000001c0)="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") r1 = socket$inet6(0xa, 0x4, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000002c0)) io_setup(0x4, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) io_pgetevents(r2, 0x80000001, 0x5, &(0x7f0000000340)=[{}, {}, {}, {}, {}], &(0x7f0000000440)={r3, r4+30000000}, &(0x7f00000004c0)={&(0x7f0000000480)={[0x1, 0x7fff]}, 0x8}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r5 = accept4$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e, 0x80000) write(r5, &(0x7f00000005c0)="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", 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f00000015c0)=0x8020) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000001600)={0x10000, 0xffffffff7fffffff, 0x3, 0x7}) vmsplice(r0, &(0x7f0000001840)=[{&(0x7f0000001640)="5fb4d6fd410b4e9f130a72ad628b383a23f4888af4b159b6cbd0d674f39e04018b9975296aae1ad4d2e96ff3e1f78da44915670ba61c7fdec78a4f5910056f95d0402d908871e72573133408f0a2de", 0x4f}, {&(0x7f00000016c0)="6d44f4b63a675f90662738bf6838568252aa1751641184c87f252dc631991ea194f70236c2fc232ee85fc966ad151a276a5b9546b53ff80b6bc0a7abcb55d8727ac8bb9e33880c00c77abc2443", 0x4d}, {&(0x7f0000001740)="1cf52b6c4cac4e4ec9c81bd7f1e88e3713f7db20b5c9554ef7c92564bc40117381194f915ee149af1270ace45a83ebc45510fa5ae5ff0deedab467e324d9c027d8a9e3a45622b140faf8845c197fda5114043e10c9311aea4dce5b29449983730ae1325338eabc84cdc8cc8d8c52b18e984d7220e339ee6c5c598754c1f9afaae25c622662f125aa693c9ea086b08c4e3db40d6dff9340ff09209902952e866f841c1f2b82ea7fceb772d42b655d429a2b75a1c8e3bf109c51f440b39445b35cd0b1f03ad7", 0xc5}], 0x3, 0x8) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000018c0)={0x990000, 0x8, 0x5, r0, 0x0, &(0x7f0000001880)={0x990a69, 0x8, [], @value64=0x5}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001900)={0x0, 0x1000, "f68a5f2859d9526834a8a559f9d3e349b9d195601e996a85b3bb2c3da4d50b256d3b7adfa4258b90f1b07e0bcd3e8eb8b79e3f6978078bb274c25de45b84abfd0d838892248edcd5aa62b6221edccb64b3d3056e084a30be97e870ddc938de95e04272bdf6ccf9c0de41a08ae5c390efd87b2bb1c9d5e920bc5af2eb90481656115d96150e17267e4e384cd84464e4203be6ab73604b14a2735976c57f09afeb6d7828554d747e3fcd3f00cbd33f2057d1437bc51118976c80ef68f7c9824ab48078edb83a3be7c46249f1a21a83ea337eab1ac659a671659e0155c7eae2ae803680a377d970d17a819340d2a2d07bd4656a589b56d645567a4a05bd04c346388f6917cbfed240bd0c37e33235cfe94f245fc3b6aaac8369ba99b92a2178f81110eb6bb301b2916cbc75b74f6c8d35d58b1b5195070f8020d7a7ef761639ff366382f418dbf2d04750a74a69e423fe6722500f075740840841f70e0470e7a5e73ca5bc93a61b420bde4db1c62cc10104f99c82833177e548513d23ea39f7343cd333fe17751ee5e47aa15900da6afc7e393537563de7c10a22a45bfe193e5d697d556686c5754f53b23c8b91afcdd70a15b212abc95856b0920629bd50a007ede45d962c53a966098c6328566326dcd20841729d621c9849eac53b164d83c088d3055ca614975b7ed39d9495c7f3034883cbaf2ae65d8df0a6047dc0a05a4350ffcbc79b35814ce61e5e09155956b887eb23afcb28cf8330f8e38190a874b08f685e20f4fda59c6aeaae992ce5c1b7ec103eae7478d518a4cfc78d387130ed31985631fb4ad518e30020987eb45e268a41fa335814a448cdc2234cb32bfb88f5f2817868e0aaa9b8b0e75108d754315eb9d105da2d11a1f5c60a8b569c37e66f40747b27a9bc08d7f9d048f129c8b0ebdb139c771f00d15aa6d885b58485680a01c2c85ce519bd6c6cd9c679dae4a3103c82c36ed1f533e73b231a54c98e62b74d87700877c21835f233900e81e090e068100f5f023dc923647f4fb89f7a7ced309f5781b4899ae782379e7f7b32a4fb6f7f78bcf2293aced84963139e76df70c0ab20fd9f659c5b30a7cf50ffc1b214947a90d9b3cceecdd68656d298a40b38ffd9dce9071093e67ae9869b1492a82f3b8325799a6f0b3b6b3f75840e9342ee6cb3b687e5494f9a3810992f09ed04539bf1f188d2902b932d06dd9d42fb96b6f459c5322b54615504a6568182144bac55b5382314631463526a127380d06541492485068cbe7e5d6a7e5af7e4d20c728a910983362adddf7ee8465e2b29ff136dcf2c7869f0472202f0426ad882ed8a5b11c9209d6922ff637bdd376180ccdfb5f9156a8a13001235edea4615ca925c53cf0ba1805d0b6a72151eca06b51d63136728847ee82144c4be7f29239cf9b62368f694697593bd8cdd35b7bed89b2251d5053d32427ced0a63da12e07581f523d357e955f5152f61596420f107ae97722aa7e4831ad57a31feddb9f97476147a72763e059f597eabb500d41fd41b7c3497293911f5edded800d53d7711dcc5b91cdd9de5723af69eb5d03a8a4c3e041e638c260a1e764af2361c37f4fa8282daa324ee01ae8559398536fef632a4b40b75a936c9b1cefe12ec96f73438bc7580f898fedca5624d24f7b7cc28d103a5c8bc8d53584f0ddeff1667fbbc52b4400ea128401cb2bd0a454ea36d666178df0cd479a9ca4622d2e7b483b58c92df85b0bad3437b2b08c71cc144867efc3ad2d0cff6b55d8835043aba074893b6a0f977afde48854f42c71c4a7303af8ba6fa78ebc4dcae26e1ff965356109c61e8d8a41444d732662ab81025b7a4a0432dce7c93dccfac6e2a0763f268e60181e716a78189a9214d3d3af980b77d347662a6b3d1f32ac79f87dbb54a357b06c4d08bfbad541c634bc3c5283b1474b357829d71da197c0282ce6a9d6e06d0fb3c61d27faf3c40f3f8eb4cd14809b4dbff33815bb68c2bfe9494ff42bf214b909e62df3730ef44a5d4ec393e8870a58b7626292937807e482c3f9a5ebe27c0ba2c259f97b9445fe384e23ae4ddb4aaf65308a899d4d353947d08c1b09bcf2682b20dcd9544f78e0ddeaa743df9270486f2d429aa35c16001f989734577b928588b6ec564da532ddf3b68b3ed8119327192ca0ec9a3274838cd7145b85eb44c859c15010b410c6146d026457b748bb79168409dd1ba7fceeb337860a5fa6bcd6f33a0819d88345c2cb7d99c1d81bc6e9b1ee5fb7ed0060791439102f878aada192d2c850eaa665ca05b5d14b9eb01f353a2e6216101ea865fdf39ce29024ef4ea344ca570c8c36f7217b130c4018ef7d8a9d3d4fc2693bf5ac8721c4bae0202295213adf3d2f491cb581340b543934120ac1a9676616a003a92b3c53a14c5e8b6673be04507d466f18222dd502ff9b10df831430323e04f7e5aced5710115a8a478d5e24bbec2d40219d64146e79ac659266619433f7ac040dbddbc61d3f05c3d4268552243349e056447ae6bfc43e1fa5c313781f22eab7ced1967ca557cd68425d3d8aff1e343fbf5d8b7935ccc1badfe7c21d585ebd6a868a30dfafe29174a70eef058a4fdfafaf3fa9521e981eac9a9057050943d92e561bc135724c950253c175caa5d188b57d40bae4c6b7c5a66bf28a571d2861583825af3670ffb9d553b7a8b36a5d81ded89974af3e1a6ef381703c9384c9770dd9c1f14222ce78f78bfc07b5586d0b50c98036c9d032b37798bf8c77fe7fdbc315233c88aebbe9a05f0371543ca7dcd4cfd58db014e88783f3904acba5f84d7e8bfedbf4b5600f5ee6fcbb0f24063d3476aa79f1d7ab5f1a7d8fa3199d8e9c0699619190068322b64bb069d4a32831f952c151c44d1787cd2646c918ca2c17cca44ffa56d92bdfd0e1ffcc8f0c65112305f28fd457eff73298dce6dac824578c103b7895363824ecdbbcb1265cd14f8b553dde0062103af091e9a99261a05fef38367400cda11da75386e6a4ba3c11ccd4d15aa9571573be2f04ae0ffd2a65158c819c30d01b802f77bc134e77e34cce5a9c7d668f3c78c0695d94c45b574c45066ea3d455fae1522d898a0516da9c428b6393c96df9a83ad5dbb3f4b5b8e62f89e9afbe548de4564a5110671e5449d178e67edb38bdf123ceb1298172e51ddad85cc81dd4f4372ad8cde74757ecef6ef9aefb1c1d94ed89fc143c7d786ffbe9cba87f34e207ddf43bb85ee048e6ab4187cd7cf5c94a953d77e517cfeb533beb248f24f3009b92fe40e44b1996108b2ffed224fd56644caf63f63ffebd115d06cfe3499fe5b26a4ebff6f1a2b6f5748929744fe70ed29dc7533d50e51e08e55d4930f3eb4f77e40f27273bcdc5bb80a633a31d23d50bb0c36a66ff05c794f3d0ae6b5dfff1147db60b5c8fad2e316a1473180ad20d91c6500739d97bad254dd3589b6c1d5910a11fdf58632f143af6fb84bfb0b26c64a78bf2849e9358f008e26e4ca91605f2fc0c0c5ba659c64e7e537044ce66761a244058d4b83d9f8fbc71f7281cefcaf29344eb777493ef04b3f6745d0bf62843f7b8ab05617c10ceeac930eaf12dda968c797603d994ea73b0c579f2624f67a57f66b3c8205d5014a9b074c4561ba1b2eaf430e9495477c8380bc0b23f39db882f968e8bbfe101d38f172edad6da6d55c3239c1ef563f4fa45c3a149e5214b44cce7ce53109f21530c0dfabb14566a3188e977bd11f41d5002381e9af540f2d7450a55e03ff5f9ed7834f62e09e65fa4eca2b336f60b6ae8b809c32e4fb5dfe8470682f23757d185cd7a5febad311a328ea20cb850365cfcb0a301369bde3d841142f978ead4cf642a3f21f8c08e538a0bfb02e92948df6accedc3b8f5f02b89a11b00ba6ba3843b640ad50c859e81f6399c0c6c232010dc4e070e749eac2c43c30c92803bcfeb2b49ca55182151f119a61532251a8846ad11662cc4a45f1782d1624529f89f5dc0a34abf19a0b6dd4bfbc9c7c42f3eb199f62296f3af9ed992d6b9b56a7acc399593006888d0142e02a3085475d307cde14278b619e6f47f4adfcf47d89c6dc3f0e4116c107ed729194908902d335975cca493db67b0ed910f6f00de9f8cfd57493b26b7339df5ec95c585fe9109d616750d77071b1b505a9c544098e325a31cc7ef87ed1cce35684a37070d8494ee5d460ee6feafc2bc13a7f9d1ef5dad7e3f324a09d40521db562193486a3546a080501a5de24f1ca59a144d766201eee0edd34b6b4921b8e714993fbc77905799d4ee4fd712efee8330584630d5d5e7c0556ebfa6a27a91e7bccd53925505af4ffae216ce8a15ca9db698a5a899d0c863785f9f7fb2d5eaba42038eddcdfb83ceedcc14138f7d8016d1018c44ae7ff1cece6e0bfd5ab3d36a917ce7b22129fe59c0fd8c076d648f085825cb5e0dc5e1e3d6a8ba7353a737c18b0bb455c3116d76e184c65e03de6fe67ca88ffcc0b07a937e2f7d1968317352908bf3affa17f404c58f44fbe8e67d697e0c2c5411ae720ba9958c3c41edf588b62dcff05f9e571aad628b90c1d23e098a2521f56a1e23b6415954099212f63cedac81719ef151bade416a6894c95624a29b3be928aa3b308e0895007bec357c4a76b700ad580d59c995dd0e9998d798df6bafc2aebef8292f9268afb2b020f8b5cefa52f9361c34cd1601b0dd3e58df6bde105d1b4fda7ea4152148b75aa42e27c293a881c329a7de353d5338b8d60633f32e9f88399f17fa41d6f920151c120d0a9d98b0c1a0129b0c751a61e9500fbe54798a425ce9e9851ac7e12f9eb670120e3b0d73284e3890e81ed74807f65f546c7e098fbba0cb3794cf7577b4854d22787247b0ffff2c2d6442141d07c05cf57745a90a64e43daa689fbd84b8faab7c210480c9e4b64ffcec1e424638d264c385ed17c8ec0c1b0b9183f7b140a96722c33db2129d779982e5ed2f6142f0973c5cbd50111bfea904096821ac22bf32ba78212a7a228041b59b8f9c2b974c9018aec75ff3d30b2a11a91dca2b57ce3fd30662ad5733ad456f2e89674f856c34a0bf90e9b0a6b45b67071fd5c5ff19aef0ff168a9251e06adebe730397d3f03e42754905ba70a4078b19a08674e1afeaaf73afa62fdfc374064a18e9d90e985c6a534b737e9891f5715ab3179503c11ccd11e6de8fe1ace4db9bd941f6fa3c7d18c7a6d4de4b9bc6882057d1bd22b24862e33a3bf5138a8e974bb85ef307db664ebecd10b7b2bebd9a3951acd7f07251c9dd3966c308cea52b366ffd1203c152c1377f1246bbd88cf8a76f71e98dfa5d7087eba0393662fd9fd1ff87c62127261fa2b00e728d30e5b9000f4560e4a59123200ca7780520c42849055118199c3d4ed6cc32d8fc3e29e741c7c18a111002bde89f16ee4aedb89cad49efac59614865050bdccb7af9eeaec3281b7a35b259e122213feb0251829cd17fa4af1c13cc4a2cd84f34cd927e7363ceeeffcd503ab50985f66dc7ca6d9d58283a1f4c7a7f464f465e552808e3066ee9db99fa075e1b64a644a98add5f0b730b9055ede33ceaed7ef21e6a604109fce4909c9b18643fbc703897f7e369fbc573808a8338f63b9172c265942b74d06e44d8640f19e860ec577dd267c559ca0f43c38627f020a633577bc3ace243bff3179f9bc883e350fc34f24a94f46965178ea779dfdd5ec9ee916b6be9f19a826f47674c5b6e59ae81fa70fe61b95e4a0b141c4d21319b0868c9171c5c32cb2cc8068a0a02b5186e535796278f4c3b15f5841dfa5c85e3989af05802ea55f"}, &(0x7f0000002940)=0x1008) setsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000002980)={r7, 0x9, 0x8001, 0x3ce4b69e}, 0x10) ioctl$SNDRV_PCM_IOCTL_DROP(r0, 0x4143, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000002a40), 0x4) 19:04:22 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200)=0x1, 0x4) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) r3 = getpid() ioprio_set$pid(0x1, r3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000000c0)={{0x8, 0x0, 0xfffffff8, 0x9, 'syz1\x00', 0x41}, 0x4, 0x40, 0x800, r3, 0x8, 0x5, 'syz0\x00', &(0x7f00000002c0)=['keyring\x00', '\x8b \x9f0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="740000000001ff05000000000000000000000000240001171400010008000100ac1414aa08000200e00000000c0002000500010000000000240002000c0002000500010000000000140001"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r3, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fsetxattr(r3, &(0x7f0000000040)=@random={'os2.', '\x00'}, &(0x7f0000000080)='lo\'systemmd5sum:^userem1\'posix_acl_accessuser\x00', 0x2e, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 302.059016][ T32] audit: type=1400 audit(1584212663.110:54): avc: denied { write } for pid=11686 comm="syz-executor.2" path="socket:[31340]" dev="sockfs" ino=31340 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 302.094060][T11687] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 19:04:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0x4, {0xa, 0x4e24, 0xffffffff, @mcast1, 0x1000}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)="0bbaf8abaf26622e7acbac5d89981cc70b4fe4310bf643fcf48124219663e6b7018e3851871cd6826ed57527816e2358215830b163faa943bdae0ab9838258ee9cfb4afe9cc2afa0f8027271a5806c6afc8d801ec92ba7608a7222affc8309f3dd50c4e3db3ebe56ac49e976a77530dbcf727ce155089deb1e3930a0d0d5433cdb2149dbb4644f695115432558d277f0b34af3579ddc5992871bba24280912dc0f9d0f29eca4fb7ecff48ece7371d7d54381b3085bd9195652eaa5b2d3bfd3aca9462e94e2", 0xc5}], 0x1, &(0x7f00000004c0)=[{0x100c, 0x112, 0x1, "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"}, {0x104, 0x111, 0xff, "2b79d12b25b27fad88d1d31b5b5289cbd0b9308fa660d8597292bae55ed18930c2bf10fb091b7d48a4a63ed98b52eb2506e9c267ea421674bdf4f27363d31ad495855b92c397b24d32ad03366366179b98184eecfd2dedbffe17c901824cc8d56fcad1643a1f80525bdc1c53c41254666a8a1c773a66426ab8af4048462664b810c2623570fbed517b6860b06c3ed601ad397ffe08b58a32c137e6eacf753df915e404ae8a83cb33dcb06ce245aba2a6ad127c38d4302c5a0e7486061bf6fef3980c14adbf3202325e41eb7ced19cad30c87dbc12634b61940f0327bd2843a341199a9cd268e2b11ee77eca4fad70e7d8a4a743ad38b"}, {0xa0, 0x3a, 0x1, "9f9b05006ba7a83424961da9cbb6007d4e4980c7e61a440335168f4a62f1e42dc2a9ad41bb3421eca6e99384798ba257b058a2a3278aa0b6f225c5fafc6a473fe2f8b40216ea3d1d7dd29adf364492deb1a515da1a5181dbadd2464e649d3200f411b4b5b20e8806b7d74939a59f5618e14bea08667cc38006865f465f431a07b24389d3d3fc8a985bee739b26c105c9910ec123"}, {0x28, 0x1, 0x3, "cf3cad4f6c3f529e0df13fa4eb513f00d10333e55d792c2b8e9de70b"}, {0x100, 0x88, 0x3, "14386fd2f01464fbcdd78d80a9e8afe270814646a2cc1393617926f256c8b398151c0dd7200c8d9f9ec3470254eddcde66dae5a4b2f09701f43e90b26184af1d37e3ced0013bf44853e5bbdf99809dfc409b6031912bfcba8f35ad85f66239fc7784cc11d68a301cdcd51ff6d9874780a707f2475dd79f9eb8a3a3e44fca47d053e0a87cb2f3d1c73c8d70604b761f9b63d62e77ff868f481a093bbd5883d03b8c99ff09ad80eda1a0ed6802b925a15a158a68fb9971bca80a2fcf19d8f246f324e4c467264460eb994b6820f074aa7416ea70488c4d61d66f41969a4eeda084baee07f7b649e1006778b76754fb3c6a6d"}], 0x12d8}}, {{&(0x7f00000017c0)=@xdp={0x2c, 0x4, 0x0, 0x39}, 0x80, &(0x7f0000001880)=[{&(0x7f0000001840)="2da8a991d88373b1b5004206127e35acd455e77b4f1f266abd65414fee21f19f116a9a365c08fbc75272305af70e0bfe1cd177ae32b30faf8f0d63", 0x3b}], 0x1, &(0x7f00000018c0)=[{0x68, 0x115, 0x7, "21b21fbdfd5c2c504301a7dbbcc2bbd7a875d82a4b9e802c5ff8ed1b93fa839bc0198e1f9cecd1cad5e908bbaa324c805f013a4a4f2837c76905340cc0600c4455798caf49457b4b36d5236d97c884839369c38a137810baa929fc"}, {0x20, 0x10c, 0x5, "e09cf51d8b0e04c887182c50bec416c49d465b25"}, {0xe0, 0x116, 0x508, "3bbf11868feef4963832466ed16ea60189266f758c69325da6b2c5e4e212ecab9aca2ee26b0236f9d415a2f162657b432014c5f43c7770f4fd84c238aa209d53eb889e4c7be5cdb3088b967261100b844ef06356e7cb671453be34ab7e75fcab482d976987176b3589331a8737fbf8ef54d41e401e4a00b6891cdb0cf1c0e3451fec70bbd2c59af20abb0853d0a87286add3e4f41722df13fcaffdbede7b50d75f842375b48dcc6a1f44091a9ad84e7c2dbfb1bb37dd08a79c3dddcd8c1dc5cd9dd958a162a5da4553bbfe71a810a1715a5a"}, {0xbc, 0xff, 0xfffffffb, "e131cbcb59b98f4b7bce4d29452a92e57e44c31a88779db6ea431acea8ce2d6fa1ef57c9ce4a890c0dcce2c74b37db5df5e09021c31a5c636e2db497cc8a4f0658cba6e849edb6de9513799f21dd1141ef3321dd65f16e8f592928c8d552e1eb346e1d60a77be76904f2e21792def86e87c95aeecb1317fc567cd6065a16a5ccae5f5a805aaef97eb62337af43f3d649e3da32549d4b229a17a43c240c5a491817f63d1b753718bf0587617bec"}, {0x28, 0x111, 0x9, "4caa490da3bfbb4a59e226a7338228cb706742057eba153f0d"}, {0xa4, 0xff, 0x1, "c83272b7397592e65a7b4a91286a699117562c4b4161b9edc0b02dea64d2cc8885a1746e1d2ea66dcdc19e5cc6fc7ca33400e3d17097f97fb2f72a51a6abdf7551e9e95eb9b2816a168eef728059611c909b2da90978bfca271e32d47e95cc6dd8271dc5c38ba63b5cdb58983dcafa37b1382b354eda19d0dc619273ea316841519c5433084556cfcf16fbf0007257e14254189316"}, {0x48, 0x102, 0x7, "4e036ca82040f38a5a041a0051a205f0edb4084dc8e71372afe880efcf3a62b114c9ea7528d5e8358e75fc8280b724d1107851c7fdbcaf935b16"}, {0x4c, 0x10c, 0x9, "252646a34b0b711e9910ff1a5e519939321d5a6566759897d81097d77c95c3b26593b40977e46f0fda76d518471ffb4cf9ee356d823a2f998baf726a201a"}], 0x384}}, {{&(0x7f0000001c80)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d00)="2d1aa1a69273e9dc909fe4fda1afece8d1df371aa00633784a9496f204f99100fe98d63faba95e6108b9ce79fb35273e8d670077d437247012c094258e6dd42d1896b6fa79581e4323720dd098e32f0ce59b351a21be66ffb56a96c6e718868a19ea578e98a7eab671afea234503b8e8079a84c30fc0e1cd1c164fa3847d36d41b7cc8345cb51133a58580929dce40df1998326ea5add0762ab3ebc8866ac41b", 0xa0}, {&(0x7f0000001dc0)="edf10f114ef9d84ea3a8e9f01db1bcbecdc8d37982121117c43693ae10fd39d7843695677bf164acafdefeccbac0e6cf479057c6ba0f2cd9b689ae778f3ccb82bb31758d79546b2c559512052caa9daf67b24ab5facc9c07b0584034222e7f5b433b3667737b6252fdf32120ed48619dc97102db2be10e5af93caf7c8829485026d84d17c9407c064d2c798b775b79e367671513ef785fe619ba5def15fe3d95eadba703acf6b3350242bd1441fbd93412c176d4c1772356de4030ddafbfdcc686c1cd9edb519f54f580999af1a0a7d9ca0ef20806470ddd942c", 0xda}], 0x2}}, {{&(0x7f0000001f00)=@l2={0x1f, 0x1f, @none, 0x3, 0xdccbec248598e876}, 0x80, &(0x7f0000002300)=[{&(0x7f0000001f80)="27b048e5ddb0b6e077e811bb7a2aa559d61512c8c6071fd0ccc194eb6d67cbee6366f2904df0e1baa199c2d32a4272a1c90dc8857eba38052a1e0814173a29263c865430f9b27497f2707ba241d69f82f308da84faa1028c72e40504384e027356479ef2a6322a1244a66142fc7e19db42", 0x71}, {&(0x7f0000003080)="b2da2cd69fe3802e9f9ef5533a51c5c5149b841a4e878762e1f875d908da58c1a5c1bf8df1b9f36d99572b9cad655ee93bc8003c61e70db28a136e16da80340aac912056bba2ed23ac5e7ea70514c23e375cfc40095d415c9c80c686aa5265615b20f88e2d18ae8ef6f7678cf545e970e89158ee1199988a76e785736d5311c01586d9ca54fc4fea0f9da18f66169f103a68c2823a3e3c08e7f14eb88f6ad3bbf2ad499a1083cdadf0954c64bfd6cb7d5e8dee375756da7e42fb0072d81ad8a27b7136e47289a15c57ee5233839729ded4223fb53bfe3985dc4b96de376f2bdab08c4f42d7d18913d4b07b4c526a328d70c2286c508e3b71df263f1284a44076404adb130362571d01c947ed54c48bc1977711c084afe1ba0524d48abab6422a71c37a82e608476e322889cc9fc3e9859b5c4b6e0481f5bff05489a12a27baca16915e12418d91ab61f2c6b8ccd44cd0115dea608bded06d7eef9ab50e798f249134501d61f6a6a2f965f1c962d63473bb545da80ab542f7df1cd0b5a4bf85657735bed17989f4126dde4e9a875ccc71a62e4036b969fb8d7ff9794993130c53453cab80967c39163cf9b2c48d51e1f611d1ee7977bf42aa7377571a029b286ad1540d87d149f782580c09f27bde61e580109ef4a7f598c729af31f7c1d23d6d13e98850daad2e2f5a3dbdbe8e8054098a676dc72be88c043e7a0952626432f9958f93f52de579a8d9aa14a37877358e6722057cacc635825f746b10fa1c4a0a7ccf7c3cde8dc4f8f42e4b10110fe63bdce55a6cf362aa8844d1aa7dd57a47e3279de8bd5309852e0ef3c8dfe8c81961fc40a4a3b8a2d08e297bcd09317b53ffab3e3389430b0c700b7343d406d43ea3bf154f9ea5e958879b6f3ffaa3bb98d9357be14f61fe23db4f0bb97d1b03a9c12e77721fb9873b7f26dbf5281abb677903c785fcd9a68da7ecfea17f5d555143b0417db4ddd8d8d59603805c17f2b33d170a5f1b92264d38a2db044c5feb0b10fc2a421e216ad36d69dd8077468c9f766b59daf2f1f7dfa765cb3f970d61e278d5d66bc38e16b61521a9f64d28613b47b7d4017d4af8957d9a8bdec9292de1918683c7eb4b0863bca3d91cecbd5019b1ff9d0777064d228d71b1a8eea824fb1f2cbc84b73a1713a1448b0c82803de997c82c28313d7d767f38bf1efce70707b8a64f0a384c8e7b64544d054d84293f5aacd853a70610c0d158706822cdbd3deb76bdfeb83925c61194e0fefe8b48ffb0673a9836a6ec578bb0253bdfbd8d40333580eae6d057be1330d9ade3a5d6cdbf528d8ab3ad4a329d71ec94c1fc678c79d6ed2711daaa140b9786b3b0f8ed7ae278005fdfaa847bd23b88cce3334b666e9275b26ad1d41d2d557291a80ce5518246bafcbca8167c414cb87808d313fd46a5ac90935cec845ea1de14d2aa1ab427b580560240c72df20fd36e849e0a584d18a54d783c8da309f4f1a6e0645198b3e5940b9934428bbbc9adcc97cb1f369ac19d92af6c9e154c3ca2a969c1e5910f09b50c5f6569476dde02499b03d54774fe35f3531aca81b5f9421280611a019d473945371dc537540f68f17ec4b9b7a67cb154006e3b931f46c381633f18c7b9baf2f9dd46fd1eba40dff10f0d7184db95c2a68b9851759c5c5aa21059057067d11e3e3def5685cc07f9b896acbe38cafff63043567dd95c193ff5c53c506638b70a776b1de61a1f7eda5bba8436913af8c79f04c9030c16417a82709ecb249cea74c41468f5b06d390ef0acacb5a680fab8dab543e395a21d41e092c43b8c000d2ba8693ae993715c425d7228fc5e6569333534da189cc4f59030857751476f5778c1df9f8ac645e5f93e05cc706194dd27b32d0308b0f5994a2412246a96a2f39b9083a64b467a187c3ab7caa35d67e574799a761b7e6816d54f72fd3e1cfe48ffb23e4caf481c41d70c3bae43ac88210f2490408182db2e2c55afcfde6ab74483285a4e90c804d1eeb229873b38f4753faa34f5599e63454d62714df7094c08bdf4e4080fd1ae5c7a578a1861bd17b7db568acc6bbbda1a0c463dbfeb18e4a2539e3654164f31cc8162c3837a3bdcf5b6c3b090e3f8af007dd8e60284e6f87490fe46f1208ebc3b7d5a3ffddfff5a1cd45a956b2708e146e6f295837974f90d856c87ff7681078fb102ddf950b463ee353c82134ef42bf710f3565fa2dfd665c812dfb855ebd84cc27363d0dec0d9e40ae392b4bcb81cb776a24aeb1ef3a84fd9e35b438049fcad1152f82522b13b4e832eec6f2baae8592d4ee5d17fcb12e83b77b962a30e8e3c8459ee7c558c35a49678eeccefb83d0de7b8718c46f6911c2ca858d3cb3d4b89fac321ce05782b55d73295f963dd05a67a57730f194a41a9829e0f9d3dc77c658fe86546946c0781fb110eae8ac4caf16efbb9a41afe0550fc13744f04bfca430c8a0af677929595f7530d72e73696f44ee5a1db4b34f5ceef9409adae9d388ff18ce658875f7cba1a1c969766bceb17de8eb4456e46d0785b1249ebf1f410daff7c9e53bb4374f03ec8c205d9d29a4784773f2e60886c6e65a05a692d6e730553ca778df0dcd89e05cddce3c46c2c52ce32122ff57aab4da91e4c88642af12aa7234e00929eed60298e273fd922663d8ea41734b222be67f6ed69d6039c062ab7a076e22fe434461d7051d2ff67041e6c0ad03fc4c4e4ae6576177992359e364ced85e1eedbd4b9d059ab6184c0d795ae0ce88b64a76cc7e55bd9e13fddf682e03222176c802fb5221d142b1ca6dd51b401e5a46392b407333a5dbef7a705a2fda9a9fd50a21f14758d53f6d1dfeef698bb59e8612ed719be52a19d3beb0884a7776cdc133fa93579238a624b11e385f162dadd61d3683aaffe25a6681519666e68a6160285feaccfe5dfb5a6cb0f1c203c3c896c9fe6c78f751cd9550a9f1ba947fab9693c7e233116313d61dd6ef0de39cdfb74e950689c4bbefd7281a8a9ad0e30f22e4f977fa73f8a73904571d71c3ca6c7758cab72cdb08e9dc0e0b118406b9e68e91510f3a47900b7cb2e93171d0dff19c1064afd58fd28a7bdd7b4c692d0daae009ea9ee91f82ad431aeed14d897d8a3d5962aad9d2b9d2caa816ee8e8a7320a3da0f5f0f6d2cb048b273623d0c503a1e37f686b2cdc7fb839aae262aba27d3a3098364b7f22064d7734b5ec5a6e36eff3e2bf4cbcce611e331d69e8bab9895e618d84ae4c544b047b419183db1a86862654e92cd388c0c72ac877726d57a96e496955644bbdadb06a33068761280dc01508d5fbbf4435e375700e1ba72b33b31c0235dd1a9ce80310ebfeed004a2345ed5f0b6db83bc3e0da996c607dc492545bf0a46b8533e325ba5d98863762549e39ffc8f292f12a7b67a1207054ba90610be97dea3b8fb567705a27368f7f9afef056847694fee32e263f34e6e1959af0f599a44fca35e0ed13e92a83f9a500cf29abec530cdd808efe22d9943727976b41c2f7543cc56b764f11bffc8dffdbe42dfb07ecdd5fa8cfa09252eec347a7338617c586dc7eae7f203dc94f6c7ce242ff15479cc1969c9982156b01d9df5025cbc89b8fa6682fe5df0ab317f5a245ee06cd54690a25358be271c372b5fe32f306560a0b49e8b3dd6d071a2b7353fc0c01fe70899ea97ba5576fd504310b255d63351c4b88123a07c36367a6d6001494e2f31bf430bc3a24ef186fa6656d27378597948490429e0ff2be1e5ec258a2f428c42b5369aad94b3ad3c406eede78572337ab97d771a7d14677bd41ad9044fd01f1b10c5f57690a710f76d07e8938033b6f7ab58cc53b440b952f1220ae910fda4602419b8832526ebc93d8922a972f1fc02b9492965111d46ffaf6d1deef0cf7ed35c405ca632b560029ff682b67c5fa3defab66de1773fe34a970fbc360693ad0151e8304256b56d4045c20472be2e0a803d894eb6acd4870294498b28225bcf67539bb4394da674df39bbf27ac828efbbe4a3cd52ac1b319959438b99f16736fc237e7c9a0ed88506ac6cdf18d2da5384af0aca5f7f3d90c5c307267fb193f2281d919e9316e242c4b21605f5f752166a268487bc0b665819c4bc1ebf34d8c6ec3680d510ac8d869308cb66cc6ec5e7e287711175a437f415a262ffc9f8d5ff9326bdb0d541c425492646ce04361ff37cfcca9485b7af670fd771ba2cf266346dc32f050a616de78f5add7b303ed007eb187747eaeecb00642ca3ae6c8d12ee7b3bd85bc12b9b2f4e04eb0623ffaf674d77054bb31d3867e37b87e0229581b7fb484a9490c3db3321b8b0696b45603de20df5363f239558057fe022117548eccfb10b6157a69f02105616b301dc4e8b34ab2fe26bae3eb264a809b9b0cd97e95e89baae4a4cb53060758dce0ed252e39f59eb59648c02b52a0d742b0338d42edd40b86483f7908450e360fc38cc6e1dbb2284248cf1179d74440c3a54e654375d0ac8e7e07a32729f45149f3dffaa496790c50c12f77d0f394a3dfb279c8ebce07c7208cbcb1b354458b31545902c27c44bb7e1614187fa9fa6865817426541b2bff88e36c4b92651662e542d954bdf7cb6d758e5f98d4fdd7b80579a82bb12bd21b314dcae8bf750d31a8b23dec08da7f8b2e2c8e583070368ddff56041eca78137c8bec5a3e3fd4fb542b70664c89534404ae58d18d2e2453c3998a58e9c051fbb6885b661f6e859ea289a503615b9608ea708264fd9eb17d63f5a3c15b11d784f7c615211e41426b2ab036007176e414e79c158a2fffd76021c3d4a27f6435879a3db029e952faec01f6d93133645c668f7f11687e93289a6e892e948bd57146d6cd722375e6d7304687028dc6101c00c81b840bbbcbcbe2c0ae909526a66ce61d5f1aeb7c83ab962946de01e0035bfb46c177f96be1084b8f22c6d992544555ea5af853845cbca5bc8c4f7968cf684747b4999d1cc2eb0d74ed99066c28060d8bf7f56380104898d24cc6506a9daa2e3328c914929199b3c2d47409de53b455a988349d0acc2d4a26e23576078bc732a7f2438bc13e1746a5811dd69aba4c82590f0fb6c90c8901cef3c85a50d4d8d943a1671666838b393d0f16b7f1ec877e64ab9c1d943ba3ac8397f55328a898ecd0aae35d98f1ccda5b5d55c7c86ccf2eb9786ff0bd41a887d99d0934d061622abdd9515571fec2db1e136c221df32567c7e725b07a9ee94f5d70656d1fc0709139426bb0e5da9ed0f9f754aa7724a9d6bf1258393c1c3159a0df80e378c600484f81db1d90a6812fb13c8fa220bd44145fcab9188dccc46947b7ff34f75d76d98a775c1fe108a0c8e01162a3a0c5ca312f383ecc1fbc080facb2dd334fc3c8db09aeef7262b96a869409d9450d5b1a1c370ef3e459d6ea4cd91874a03192af6c471ac9cc87aa72b3923e249ab7ba3bcfc0eeb6fcb212a435aad31659b6177123db3f088d06968809695976837d1e069bfe204ff30db756a5b460edd735a9d53a613d911f1497a4819be99c142da0bc0568bd05118d6dfd20f5cbb3a2412bb0d3cd0259fd2ee1a56c2153e5f305326d28b3193f70b3f78d6564b326dd7db40c0fd84a4c135f3c0c5d34f131b08ef74578574e737a023845b9912007c6215b398172d4ac8839038c632d7581f047be4d9a85ffabc4609b9293169a6db3168d13d393713327bba65732f2664c7b0a68a45d96fcaac206b848e75ff29f28c3ccc6824cb333ea97eb9ed8be3d5803e9acb9e62a148a6bf61e4f93dd620bc958594650ddbf086fc56222697fafe216f486f88", 0x1000}, {&(0x7f0000002000)="e5e1944502f3fe1b78d5a200183745a8bd3bf9d20292333d97271bc150d1bd0a298ad5f2f5a463fb9d121173c39c4b734e284a77b298a386abc3af9ff8ec2a5ca9bdb41d1cb63c15f939fe4d363f7ac38d65fa4b4a2a213a24e6c8dae09d2ccb91309a7f3746ff9ae46d7de1ba0ca1a3fa5f44f20ca747b7b18ca052260bb6467d05ef2d89ff53a546a6917d426234aac0c7bcf129106f6e7c032e089e309e2d569d9d19b55f036ba6261b9e90b63d7551dc33376a0b682bc7bb63be4ebbab931bdc6a4e5a4a357d36c4b8af9dda002ad80ac959932eea4ad065d6da385a4a4fc7ff6c9353fa83f20d0c9e9f4f96805322b02874e00c", 0xf6}, {&(0x7f0000002100)="c769c7da62b96c7862c89cb6a217ed4e9647b5072f1034f5f56ba0d3030a2955843245120bbb326ab8fc7acdcec007719464a871eabfb43154207d5b3541f84b73c3b2", 0x43}, {&(0x7f0000002180)="89b9eb97ef444320ee89c4eda5636998c6252465df57409985c175ddba49452bea8eae903ea5f75c87d5855ddb18948eb59cfb981b16ccdd67d2b54de7a09c11a1d4d6d4af4e52b5242b0b29f4f939e4c737c67f3746489914e720b251d3cd3385c397a78e0085cba9938ebe3b446e563dff45b7f4dbca9e629bfa4ced29c14a348191550a8db63dd503a3", 0x8b}, {&(0x7f0000002240)="d3606dc80e9c3022aa5d51862539103512c138cafb8e25f3a62e67ace6186ff165a412d2573833c62b53a3f788f07747af903d9a2b6951a64ab2e102ac99a6001175ece833c83bccdd07df9ef4208d8f76f9bc54607afa15d32dfdb592519b6ade3ff9dbe872e905b0a340450c60020b1332667393391abb3256fe8dd10728c0122412860f0ebe873e42415ed2337640d7607ea7b96967d3565b125b6475f5f28feee826888192d0d934f4aef146adacd59fb83f71ed8dbf7ac87b", 0xbb}], 0x6, &(0x7f0000002340)=[{0xb8, 0x14, 0x5, "22e023968e85ebe49cee835d934ee56de9914e91c0eabde3f1b922c0f0905c689ed9713ae86d9ac4ee3ada6583d018db07facb654593c68461b1d56def61a3f6222e7219dd72b73b2630764fa4f717a37b7369bc820087edb7356215aa6adbeeb7a08f93fab07071ed92c996f9c91226802e8524e219cd62d35c0e767a9d656be862aba491c852822385015b3ea356a4be678fa1d2c61eba0d28ff1dfe628c6c8af5b52d06f9487cc5e488"}, {0xa8, 0x119, 0xe4, "071a26c1039ac5f698e18a797f9d744eacc5619e2c91d7a5873ba6500c5574135a3d6bdd7fb1968da98801adc158a122024e6090e0a6891399b8976c8ad00c60ef49c3017214ee3d9661460e76ca4b610e92cb68e06226d57f0f8b79e9bbb2eacb3cdd87091f082ba0b72ebc39206f7afb89e816a99575ed3781336826d6e305b5dbbb184237391eff7ca30b6c3a1b6875d3b367f998fb8b98ef5c"}], 0x160}}, {{&(0x7f00000024c0)=@isdn={0x22, 0xda, 0x4, 0xfe, 0x40}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002540)="3326f6cd933f67644cb8312b31f31500504279baa6746e", 0x17}, {&(0x7f0000002640)="9ae4791d998927bbc2186d9f6583a4cee353e163dc67dad129c86cce5443adb35766cae47bfb5ef099c8ff5e317b42f1372c9a393e5bf45e29c901807fedad64d9a306475f9d99f2006567d13d8a78a2687dca85f83216b1a00d61b6ee0e6f1098db3543e828146640a79c41130b08fe04d125b3e915a5cccad2fe64467aaa7c1affffe5f66556736a", 0x89}, {&(0x7f0000002700)="592095d10ea93f345a4bbfe7ecf791751b529e92389964837e2192461da55fa9f00dcc621d0a5886bc9ae357d2206648d19375558393bc1b63308368b46a365969f0bec68bc9e172a6ad7912f3a1bf3c888edd05cc5cd91c3293fac5da67da3dfd98cf10fdf29c04a1c7f1a460de3a2d04569e271db4fc4ace1cfa1ba8bf4e6cf9cf89c5f789461d13bcb899d5a08b24db8bb31b1d884bf90657da448dacc8f3bb0c790fc801d1a6d3329bee8394786fcf1f0e0b8730f5ac60bf8a79830ce3cee35349bcda53406bb247004497912dba5360107afea621212a", 0xd9}], 0x3, &(0x7f0000002800)=[{0xbc, 0x119, 0x0, "721dc99347a1e4bed9f091a1b51f096098ae323320e99a6b61a16c7fb5c5f67ed7f0d0f308954a861e8134fe9f81e4bc95f110f4416ba4cf59bd7c12ea30f12c07234007764681ac3e6d5c42c4946b20753250e1a32dc6371b5677c79882f9b2c47691de7eb59867fcbb26a7eeefb7f1b639f2fcae54a908c46b640eeb6504bceac1b7fffad755388681e6b99368893b23fb59cb37c23fe3df11b66a55ed1a4a4ac00688e2dbb7e2cc82f1bf8f84d1b5"}], 0xbc}}], 0x5, 0x800) listen(r1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) write$FUSE_LSEEK(r3, &(0x7f0000000140)={0x18, 0x0, 0x4, {0x7fff}}, 0x18) r4 = socket$unix(0x1, 0x5, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r4, 0x0) connect$unix(r4, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) r6 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r6, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$EVIOCGKEY(r6, 0xc0487c04, &(0x7f0000000200)=""/195) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r4, &(0x7f00000000c0)={r5, r0, 0x2000000}) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 302.103755][T11687] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 302.113252][T11687] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 19:04:23 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) [ 302.282164][T11691] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 302.291862][T11691] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 302.301424][T11691] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 19:04:23 executing program 0: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 19:04:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2000000, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030313030302c6d6f64653d30303030303030303030303030303030b03030303030342c6d6f64653d30313737373737373737373717373737373737373030302c6d6f64653d30303030303030303030303030303030303030303031302c6d6f64653d3030303030303030303030303030303031312c6f626a5f747970653d2776626f786e65743076666f786e65743170707030747275737465645c7070703173656c696e7578266d643573756d2c00"]) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:wtmp_t:s0\x00', 0x1c, 0x0) getdents64(r0, &(0x7f00000003c0)=""/244, 0xf4) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$SNDCTL_DSP_GETTRIGGER(r1, 0x80045010, &(0x7f00000000c0)) 19:04:23 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) [ 302.893748][T11705] hfs: can't find a HFS filesystem on dev loop0 [ 302.911416][T11707] bpf: Bad value for 'mode' [ 302.957043][T11707] bpf: Bad value for 'mode' [ 303.008852][T11705] hfs: can't find a HFS filesystem on dev loop0 [ 303.060136][T11704] IPVS: ftp: loaded support on port[0] = 21 19:04:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x2, 0x7, 0x3ff, 0x0, 0x10}}) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x15}]}}}}}}}}, 0x0) [ 303.167090][T11712] IPVS: ftp: loaded support on port[0] = 21 19:04:24 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908000075780f00000000c46f00050000000600"/32], 0x20) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) sendmsg$nl_xfrm(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@newspdinfo={0x3c, 0x24, 0x400, 0x70bd27, 0x25dfdbfe, 0x3, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) [ 303.467360][T11721] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 303.478686][T11721] TCP: tcp_parse_options: Illegal window scaling value 21 > 14 received [ 303.532622][T11724] SELinux: policydb string length 1962934280 does not match expected length 8 [ 303.568053][T11724] SELinux: failed to load policy [ 303.601387][T11724] SELinux: policydb string length 1962934280 does not match expected length 8 [ 303.612378][T11727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 303.624356][T11727] TCP: tcp_parse_options: Illegal window scaling value 21 > 14 received [ 303.656252][T11724] SELinux: failed to load policy [ 303.984951][T11704] chnl_net:caif_netlink_parms(): no params data found [ 304.042716][T11712] chnl_net:caif_netlink_parms(): no params data found [ 304.188275][T11704] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.195598][T11704] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.204993][T11704] device bridge_slave_0 entered promiscuous mode [ 304.258398][T11704] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.265868][T11704] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.275437][T11704] device bridge_slave_1 entered promiscuous mode [ 304.305358][T11712] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.312581][T11712] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.322024][T11712] device bridge_slave_0 entered promiscuous mode [ 304.348800][T11712] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.356301][T11712] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.365979][T11712] device bridge_slave_1 entered promiscuous mode [ 304.422542][T11704] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.437590][T11712] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.452207][T11704] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.466672][T11712] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.530776][T11712] team0: Port device team_slave_0 added [ 304.560512][T11704] team0: Port device team_slave_0 added [ 304.577206][T11712] team0: Port device team_slave_1 added [ 304.593448][T11704] team0: Port device team_slave_1 added [ 304.667177][T11704] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 304.674334][T11704] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.700445][T11704] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 304.719894][T11704] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 304.727105][T11704] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.753262][T11704] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 304.787918][T11712] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 304.795284][T11712] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.821390][T11712] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 304.939721][T11704] device hsr_slave_0 entered promiscuous mode [ 305.014007][T11704] device hsr_slave_1 entered promiscuous mode [ 305.071009][T11704] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 305.078801][T11704] Cannot create hsr debugfs directory [ 305.089383][T11712] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 305.096572][T11712] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.123168][T11712] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 305.410080][T11712] device hsr_slave_0 entered promiscuous mode [ 305.445050][T11712] device hsr_slave_1 entered promiscuous mode [ 305.544260][T11712] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 305.551913][T11712] Cannot create hsr debugfs directory [ 305.817496][T11704] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 305.928618][T11704] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 306.048681][T11704] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 306.107499][T11704] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 306.436770][T11712] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 306.497216][T11712] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 306.576441][T11712] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 306.699761][T11712] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 307.029712][T11704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 307.089432][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.098678][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.124947][T11704] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.157991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.168950][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.178293][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.185549][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.200550][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.229644][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.239515][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.249099][ T3395] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.256358][ T3395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.354282][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.365797][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 307.376936][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 307.388087][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.399190][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.409733][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.420120][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.430356][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.449005][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 307.460254][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.470084][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.508115][T11704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 307.580587][T11712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 307.643271][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 307.651048][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 307.695948][T11704] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 307.711313][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.720685][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.755025][T11712] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.785639][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.796717][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.806095][ T3395] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.813351][ T3395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.880563][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.890221][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.900315][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.909689][ T3395] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.917049][ T3395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.926124][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.937184][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 308.020319][T11712] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 308.030874][T11712] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 308.048143][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 308.059293][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 308.069746][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 308.080266][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 308.090715][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 308.100290][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.110629][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 308.120354][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.156064][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 308.166014][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 308.175074][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 308.185356][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.261977][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 308.270544][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 308.286411][T11712] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.326018][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.336315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.370283][T11704] device veth0_vlan entered promiscuous mode [ 308.380106][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.389236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.429953][T11704] device veth1_vlan entered promiscuous mode [ 308.493225][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 308.502395][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 308.511868][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 308.522340][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.608353][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 308.618723][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 308.639898][T11704] device veth0_macvtap entered promiscuous mode [ 308.681363][T11704] device veth1_macvtap entered promiscuous mode [ 308.728467][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 308.738000][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 308.747890][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.757489][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.789127][T11712] device veth0_vlan entered promiscuous mode [ 308.810271][T11704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 308.821023][T11704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.831112][T11704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 308.841712][T11704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.852642][T11704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 308.863232][T11704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.877704][T11704] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 308.904115][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.915082][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.924121][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 308.934176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 308.949259][T11704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 308.959876][T11704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.970006][T11704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 308.981178][T11704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.991274][T11704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 309.001810][T11704] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.015632][T11704] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 309.025001][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 309.035052][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 309.092726][T11712] device veth1_vlan entered promiscuous mode [ 309.241966][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.252689][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.275647][T11712] device veth0_macvtap entered promiscuous mode [ 309.305859][T11712] device veth1_macvtap entered promiscuous mode [ 309.362508][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 309.374989][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.385005][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 309.395537][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.405542][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 309.416093][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.426122][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 309.436698][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.450172][T11712] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 309.458723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 309.468139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 309.477542][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 309.487630][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 309.559098][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 309.569817][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.579981][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 309.590578][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.600966][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 309.611538][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.621466][T11712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 309.632042][T11712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.645592][T11712] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 309.654077][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 309.664301][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 19:04:31 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x15, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad"}, 0x15, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:04:31 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:31 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r2) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x9, 0x3, 0x8}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3000000010000002d9713366101a58aae5da12afb1f503871b4840401fa7ecdd5dac495fbd314a770a71e97ab64f95776d7e98f190eb2082a53e2e6d685807f146067237ef0d4231915518dd56a2be3ce7d40b6c7e60fe58aba932e809c6edd5272ed9", @ANYRES32=0x0, @ANYBLOB="082004000000000008001d000800000008002c0008000000"], 0x30}}, 0x0) setgroups(0x0, &(0x7f0000000200)) 19:04:31 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="250000001000050fd25a80648c63940d0300fc0010ef12ae2b00a16d053582c137153e3709", 0x25}], 0x1}, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) r3 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$EVIOCGKEY(r3, 0xc0487c04, &(0x7f00000001c0)=""/233) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000180)) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4c0441) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000100)={@remote}, &(0x7f0000000140)=0x14) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x80000001, 0x28000) r5 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r5, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000300)={0x4, 0xa, 0x26, "76b228bf70c4346e91946d11d78d7588ba54cd01110371e1546bb9f56945f13804d20136f6fdf97516231e7a90dea1ff357a65fd51114b169628e7d4", 0x0, "80613d3a1fe39d859ee6640bebbc2ae5c3718c198a4230623d0a70f1c7b26d88710ac0d6428f2ca6cd1ae3e20f8c9192ab7e347552f67a365084c53c", 0x28}) 19:04:31 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) read$midi(r0, &(0x7f0000000040)=""/192, 0xc0) r1 = accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c, 0x800) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000180)={{0x0, 0x0, @descriptor="80429103246090fe"}, 0x7, [], "282fedeab30bcc"}) r2 = socket$pppoe(0x18, 0x1, 0x0) listen(r2, 0x400) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000200)={'broute\x00'}, &(0x7f0000000280)=0x50) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={0x1bc, r3, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf6}]}, @TIPC_NLA_LINK={0x64, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xadb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_MEDIA={0xac, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa171}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x55}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x200}]}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1bc}}, 0x8000) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000580)=0x5) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x80, 0x0) bind$l2tp(r4, &(0x7f0000000600)={0x2, 0x0, @multicast2, 0x4}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r5, 0x10e, 0x8, &(0x7f0000000640)=""/254, &(0x7f0000000740)=0xfe) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt(r6, 0x66, 0x5722, &(0x7f0000000780)="f317b027f44c67ec7fef7c7adc7ad5eb3c6dde006b40169e268c1e1ad4e7391355b4582b6afc2a9dfb3be53cff080dff1085d5e69688c09398211b0921bcf70c447483c4f15fc76af4360eb32590fe1c109b33615bc676118e66e783", 0x5c) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x2c000, 0x0) ioctl$NBD_DISCONNECT(r7, 0xab08) ioctl$MON_IOCX_GET(r7, 0x400c9206, &(0x7f00000008c0)={&(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000880)=""/48, 0x30}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000900)={0x2, 0xde, "6065f56f6b17aeab6e483c1fe1a1ab5b44c5dd411562a312bc50dc21d50c404c650e524d3c4d545265ad90ccd61b6d58d2af18167c15609a94e846092ae59c6af39eb43275327b842f0a54e6b70563b65c5107e4f30607eb3832ec889e3e0a57060c0854a207444539715cbd9b8d9992e07de0ad03b89f23cbbffc082ca4f9a2dac50e06df244221416a580d0ba6ef800d6e741fad77eba0890e5d740c64b82da836dafd40551697ce2a33848c114d48cfe71559a3b302f6b49883e6314998e6b6124a0755d0acb6ff9613bcee33fa8930f68b07952038c4a767be54fb28"}) 19:04:31 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 19:04:31 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xb0003, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:04:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000200)={0xb0003, 0x0, [0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 310.799944][ C1] hrtimer: interrupt took 59622 ns [ 310.988316][T11811] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 311.116001][T11819] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 19:04:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x100000006) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000100)={0x2}) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f00000000c0)=ANY=[]}) 19:04:32 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:32 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:04:32 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x3, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000001}, 0x28000009) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000140)={0x0, 0x5a, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, 0x0, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x24}}, 0x0) r6 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x4040000) [ 312.026261][T11845] FAT-fs (loop0): Directory bread(block 1) failed [ 312.033018][T11845] FAT-fs (loop0): Directory bread(block 2) failed [ 312.039525][T11845] FAT-fs (loop0): Directory bread(block 3) failed [ 312.046222][T11845] FAT-fs (loop0): Directory bread(block 4) failed [ 312.053800][T11845] FAT-fs (loop0): Directory bread(block 5) failed [ 312.060304][T11845] FAT-fs (loop0): Directory bread(block 6) failed [ 312.066993][T11845] FAT-fs (loop0): Directory bread(block 7) failed [ 312.073808][T11845] FAT-fs (loop0): Directory bread(block 8) failed [ 312.080328][T11845] FAT-fs (loop0): Directory bread(block 9) failed [ 312.086940][T11845] FAT-fs (loop0): Directory bread(block 10) failed 19:04:33 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x186082) r1 = memfd_create(&(0x7f00000004c0)=']selfeth1\x0f\x9e^\x00', 0x0) pwritev(r1, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x8180d) sendfile(r0, r1, 0x0, 0x20000102000007) [ 312.626499][T11840] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 313.025804][T11836] IPVS: ftp: loaded support on port[0] = 21 [ 313.953044][T11836] chnl_net:caif_netlink_parms(): no params data found [ 314.255462][ T858] tipc: TX() has been purged, node left! [ 315.126472][T11836] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.133829][T11836] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.143445][T11836] device bridge_slave_0 entered promiscuous mode [ 315.444292][T11836] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.451536][T11836] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.461665][T11836] device bridge_slave_1 entered promiscuous mode [ 315.659751][T11836] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.714197][T11836] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.748000][T11836] team0: Port device team_slave_0 added [ 315.758278][T11836] team0: Port device team_slave_1 added [ 315.786348][T11836] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 315.793521][T11836] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 315.820066][T11836] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 315.878338][T11836] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 315.885977][T11836] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 315.912489][T11836] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 316.029681][T11836] device hsr_slave_0 entered promiscuous mode [ 316.084132][T11836] device hsr_slave_1 entered promiscuous mode [ 316.143058][T11836] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 316.150698][T11836] Cannot create hsr debugfs directory [ 316.330806][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 316.338704][ T858] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 316.347904][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 316.355638][ T858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 316.365034][ T858] device bridge_slave_1 left promiscuous mode [ 316.371915][ T858] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.416207][ T858] device bridge_slave_0 left promiscuous mode [ 316.422722][ T858] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.480299][ T858] device veth1_macvtap left promiscuous mode [ 316.486472][ T858] device veth0_macvtap left promiscuous mode [ 316.492612][ T858] device veth1_vlan left promiscuous mode [ 316.498930][ T858] device veth0_vlan left promiscuous mode [ 318.193647][ T858] device hsr_slave_0 left promiscuous mode [ 318.234678][ T858] device hsr_slave_1 left promiscuous mode [ 318.307247][ T858] team0 (unregistering): Port device team_slave_1 removed [ 318.322313][ T858] team0 (unregistering): Port device team_slave_0 removed [ 318.341067][ T858] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 318.391367][ T858] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 318.514635][ T858] bond0 (unregistering): Released all slaves [ 318.678857][T11836] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 318.729845][T11836] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 318.789858][T11836] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 318.841432][T11836] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 319.217172][T11836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.260215][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.269646][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.302501][T11836] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.321755][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.331692][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.340838][ T3636] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.348149][ T3636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.361749][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.380449][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.390392][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.401055][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.408294][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.424501][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 319.450377][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 319.479439][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 319.490300][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 319.507052][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.522086][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 319.533018][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.574093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 319.584186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.610444][T11836] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 319.624071][T11836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.635582][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 319.644866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.687181][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 319.696130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 319.737322][T11836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.944137][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.954303][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.035638][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 320.045725][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.107466][T11836] device veth0_vlan entered promiscuous mode [ 320.116975][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.125858][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.153545][T11836] device veth1_vlan entered promiscuous mode [ 320.210597][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 320.220000][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 320.229458][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.238603][ T3636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.278954][T11836] device veth0_macvtap entered promiscuous mode [ 320.351549][T11836] device veth1_macvtap entered promiscuous mode [ 320.504608][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 320.515320][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.525598][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 320.536742][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.546750][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 320.557385][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.567387][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 320.578007][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.592006][T11836] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 320.604122][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 320.613797][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.623272][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.633797][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.655115][ T858] tipc: TX() has been purged, node left! [ 321.360534][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.371960][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.382025][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.392597][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.402596][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.413158][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.423139][T11836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.433858][T11836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.448620][T11836] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 321.458272][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.468407][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 322.426542][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 322.434456][ T858] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 322.445421][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 322.453660][ T858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 322.464041][ T858] device bridge_slave_1 left promiscuous mode [ 322.471249][ T858] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.518106][ T858] device bridge_slave_0 left promiscuous mode [ 322.524958][ T858] bridge0: port 1(bridge_slave_0) entered disabled state 19:04:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x100002, 0x20040006}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xf) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a96725a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66", 0x4c, 0x7, 0x0, 0x0) 19:04:43 executing program 3: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000240)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xb, 0x10012, r1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) 19:04:43 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 322.599497][ T858] device veth1_macvtap left promiscuous mode [ 322.607723][ T858] device veth0_macvtap left promiscuous mode [ 322.613966][ T858] device veth1_vlan left promiscuous mode [ 322.619818][ T858] device veth0_vlan left promiscuous mode 19:04:43 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002e00d510000000000000000700000000", @ANYRES32, @ANYBLOB="00000040000000000007f1ffa7e3280ef416d4a5f66be5bcc4e24e22bef9d01e4d4ab7c9558a48c7481da626cfea"], 0x24}}, 0x4) 19:04:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='sched\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9003, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x9c}}, 0x0) dup(0xffffffffffffffff) 19:04:44 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000880)="b1", 0x1}], 0x1) 19:04:44 executing program 1: socket(0x10, 0x802, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:46 executing program 1: socket(0x10, 0x802, 0x0) r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:46 executing program 5: 19:04:46 executing program 5: 19:04:46 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) [ 327.087286][ T858] device hsr_slave_0 left promiscuous mode [ 327.123604][ T858] device hsr_slave_1 left promiscuous mode [ 327.198064][ T858] team0 (unregistering): Port device team_slave_1 removed [ 327.213425][ T858] team0 (unregistering): Port device team_slave_0 removed [ 327.229342][ T858] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 327.280997][ T858] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 327.387861][ T858] bond0 (unregistering): Released all slaves [ 327.570303][T12010] IPVS: ftp: loaded support on port[0] = 21 [ 327.593874][T12008] IPVS: ftp: loaded support on port[0] = 21 [ 327.997781][T12010] chnl_net:caif_netlink_parms(): no params data found [ 328.101066][T12008] chnl_net:caif_netlink_parms(): no params data found [ 328.305530][T12010] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.312771][T12010] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.322298][T12010] device bridge_slave_0 entered promiscuous mode [ 328.351876][T12010] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.359423][T12010] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.369516][T12010] device bridge_slave_1 entered promiscuous mode [ 328.420782][T12008] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.428456][T12008] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.437377][T12008] device bridge_slave_0 entered promiscuous mode [ 328.451726][T12010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 328.477262][T12010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 328.487448][T12008] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.494771][T12008] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.503502][T12008] device bridge_slave_1 entered promiscuous mode [ 328.569945][T12010] team0: Port device team_slave_0 added [ 328.582166][T12008] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 328.595134][T12010] team0: Port device team_slave_1 added [ 328.644102][T12008] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 328.663245][T12010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 328.670899][T12010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.697265][T12010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 328.734688][T12008] team0: Port device team_slave_0 added [ 328.747852][T12008] team0: Port device team_slave_1 added [ 328.769097][T12010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 328.776313][T12010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.802712][T12010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 328.848965][T12008] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 328.856307][T12008] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.886088][T12008] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 328.912438][T12008] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 328.919780][T12008] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.945923][T12008] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 328.997726][T12010] device hsr_slave_0 entered promiscuous mode [ 329.054106][T12010] device hsr_slave_1 entered promiscuous mode [ 329.093016][T12010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 329.100742][T12010] Cannot create hsr debugfs directory [ 329.187141][T12008] device hsr_slave_0 entered promiscuous mode [ 329.233983][T12008] device hsr_slave_1 entered promiscuous mode [ 329.273040][T12008] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 329.281614][T12008] Cannot create hsr debugfs directory [ 329.809981][T12008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.846640][T12010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.875437][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 329.884651][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.905568][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 329.914545][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.930003][T12008] 8021q: adding VLAN 0 to HW filter on device team0 [ 329.942502][T12010] 8021q: adding VLAN 0 to HW filter on device team0 [ 329.968084][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 329.978070][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.987403][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.994671][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.050627][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 330.059420][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 330.070060][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.079098][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.086444][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.095044][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 330.104963][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.114360][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.121471][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.130208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 330.140084][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.149262][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.156575][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.165734][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 330.176326][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 330.210598][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 330.220730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 330.230723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 330.252735][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 330.263192][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 330.305655][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 330.315791][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 330.326240][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 330.336174][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 330.346828][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 330.356478][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 330.366607][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 330.386232][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 330.396033][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 330.406183][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.419730][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 330.429452][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.465793][T12010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 330.478215][T12010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 330.489281][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 330.499263][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.508783][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 330.518043][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.530940][T12008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 330.578011][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 330.586260][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 330.635859][T12010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.664937][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 330.672726][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 330.713211][T12008] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.863962][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 330.874043][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 330.945104][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 330.955147][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 330.982279][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 330.992244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.017488][T12010] device veth0_vlan entered promiscuous mode [ 331.026314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.035331][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.094969][T12010] device veth1_vlan entered promiscuous mode [ 331.115766][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 331.125987][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 331.135824][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.147561][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.158049][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.167291][T12008] device veth0_vlan entered promiscuous mode [ 331.216574][T12008] device veth1_vlan entered promiscuous mode [ 331.257617][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 331.267109][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 331.276363][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 331.285898][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.296365][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.324863][T12010] device veth0_macvtap entered promiscuous mode [ 331.361979][T12010] device veth1_macvtap entered promiscuous mode [ 331.377544][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 331.386942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 331.395774][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.405609][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.434327][T12008] device veth0_macvtap entered promiscuous mode [ 331.477378][T12008] device veth1_macvtap entered promiscuous mode [ 331.488200][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.499094][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.509050][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.519571][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.529927][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.540440][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.550373][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.561109][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.574371][T12010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 331.597307][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 331.607168][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 331.616498][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 331.626522][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 331.648241][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 331.659328][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.669494][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 331.680001][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.689999][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 331.700654][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.710679][T12010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 331.721274][T12010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.734878][T12010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 331.744029][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 331.754651][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 331.815003][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.826865][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.836885][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.847465][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.857466][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.868026][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.878034][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.888529][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.898557][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.909073][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.921725][T12008] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 331.936815][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 331.947065][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 331.986943][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 331.999113][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.009124][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.019663][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.029617][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.040141][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.050138][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.060966][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.070966][T12008] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.081538][T12008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.095217][T12008] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 332.107844][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.117903][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 19:04:53 executing program 3: [ 332.631346][T12072] ptrace attach of "/root/syz-executor.3"[12071] was attempted by "/root/syz-executor.3"[12072] [ 333.117083][T12080] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:04:54 executing program 1: r0 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:54 executing program 5: 19:04:54 executing program 4: 19:04:54 executing program 0: 19:04:54 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:04:54 executing program 3: 19:04:54 executing program 5: 19:04:54 executing program 0: 19:04:54 executing program 3: 19:04:54 executing program 4: 19:04:54 executing program 1: r0 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:54 executing program 5: 19:04:55 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:04:55 executing program 3: 19:04:55 executing program 5: 19:04:55 executing program 4: 19:04:55 executing program 0: 19:04:55 executing program 1: r0 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:55 executing program 3: 19:04:55 executing program 5: [ 334.528533][ T858] tipc: TX() has been purged, node left! 19:04:55 executing program 4: 19:04:55 executing program 1: syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) 19:04:55 executing program 0: 19:04:55 executing program 3: 19:04:56 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:04:56 executing program 5: 19:04:56 executing program 0: 19:04:56 executing program 3: 19:04:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86900278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee03652b5bf9e1c3e79f40a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b1", 0x65}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:04:56 executing program 5: 19:04:56 executing program 1: syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) [ 335.679703][T12139] ptrace attach of "/root/syz-executor.4"[12138] was attempted by "/root/syz-executor.4"[12139] 19:04:56 executing program 4: 19:04:56 executing program 3: 19:04:56 executing program 0: 19:04:57 executing program 5: 19:04:57 executing program 1: syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) [ 337.141700][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 337.149329][ T858] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 337.159546][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 337.167331][ T858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 337.177888][ T858] device bridge_slave_1 left promiscuous mode [ 337.184743][ T858] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.226182][ T858] device bridge_slave_0 left promiscuous mode [ 337.232590][ T858] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.291576][ T858] device veth1_macvtap left promiscuous mode [ 337.298589][ T858] device veth0_macvtap left promiscuous mode [ 337.304835][ T858] device veth1_vlan left promiscuous mode [ 337.310615][ T858] device veth0_vlan left promiscuous mode [ 338.340323][ T0] NOHZ: local_softirq_pending 08 [ 339.185257][ T858] device hsr_slave_0 left promiscuous mode [ 339.233102][ T858] device hsr_slave_1 left promiscuous mode [ 339.299368][ T858] team0 (unregistering): Port device team_slave_1 removed [ 339.316685][ T858] team0 (unregistering): Port device team_slave_0 removed [ 339.332569][ T858] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 339.383676][ T858] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 339.500518][ T858] bond0 (unregistering): Released all slaves [ 339.611767][T12161] IPVS: ftp: loaded support on port[0] = 21 [ 339.777950][T12161] chnl_net:caif_netlink_parms(): no params data found [ 339.981009][T12161] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.988430][T12161] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.998246][T12161] device bridge_slave_0 entered promiscuous mode [ 340.020274][T12161] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.027745][T12161] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.037496][T12161] device bridge_slave_1 entered promiscuous mode [ 340.101675][T12161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 340.124367][T12161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 340.175248][T12161] team0: Port device team_slave_0 added [ 340.194794][T12161] team0: Port device team_slave_1 added [ 340.225762][T12161] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 340.233158][T12161] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 340.260736][T12161] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 340.277311][T12161] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 340.284417][T12161] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 340.310550][T12161] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 340.386805][T12161] device hsr_slave_0 entered promiscuous mode [ 340.447173][T12161] device hsr_slave_1 entered promiscuous mode [ 340.493153][T12161] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 340.500816][T12161] Cannot create hsr debugfs directory [ 340.771053][T12161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 340.797580][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.806482][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.825169][T12161] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.844429][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.854695][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.863704][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.870823][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.880926][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.904453][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.914527][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.923929][T11928] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.931066][T11928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.948439][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 340.969961][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 340.995762][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 341.007262][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 341.021734][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 341.031089][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 341.041381][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 341.063693][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 341.073958][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.097220][T12161] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 341.110664][T12161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 341.122102][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.131637][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.172020][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 341.179912][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 341.203399][T12161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 341.316664][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 341.328115][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.374817][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 341.384237][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.396999][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.406282][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.420032][T12161] device veth0_vlan entered promiscuous mode [ 341.446629][T12161] device veth1_vlan entered promiscuous mode [ 341.501266][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 341.510660][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 341.520120][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 341.529323][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.549825][T12161] device veth0_macvtap entered promiscuous mode [ 341.566049][T12161] device veth1_macvtap entered promiscuous mode [ 341.607487][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.619455][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.629470][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.640139][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.650155][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.660679][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.670674][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.681298][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.691748][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 341.702389][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.716850][T12161] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 341.726027][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 341.735519][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.744882][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 341.755543][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.777124][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.787807][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.798679][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.810950][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.820949][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.831487][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.841543][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.852097][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.862240][T12161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.872747][T12161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.886665][T12161] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 341.897841][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.907605][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 19:05:03 executing program 4: 19:05:03 executing program 0: 19:05:03 executing program 3: 19:05:03 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:05:03 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:03 executing program 5: 19:05:03 executing program 5: 19:05:03 executing program 3: 19:05:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x400300, &(0x7f00000000c0)=[{&(0x7f0000000240)="24000000010207031dfffd946ff20c0020200a0009000200021d8568031baba20400ff7e", 0x24}], 0x14}, 0x0) 19:05:03 executing program 4: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xaf930100, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="ae0e3f5e9198ea5bc0a5796bc26ad49c341715cf8a05c97c3b622643c83c9861be6566cdc1e133e2fd853386dba2eb4c22b08fac46e50e776b2deceafa446aafc47a00fd753af52816820d42c33e5d43d6d80908ee09c2c454e787fe730b99dc651551e42e705f96138a25419732bd7f8da899d82e320e7c9e5b0ae6ebfa48c2352916abe9f74bd8e8f6341fb06e542de68a88328febdd3de31f9b15c1b70b296f3983aafabbdb8ee88aff20cf5019f79b8221ad0f49d8ae01bd81c38b05335894f47b95e6b2ef3d6d4999250ab8faff"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) 19:05:03 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:05:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x2e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff080045fffb200000000002016478ac1414bbac1e00018302000008009078009e2800"], 0x0) 19:05:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x8a41) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 19:05:04 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) [ 343.556970][T12214] device vxlan0 entered promiscuous mode [ 343.664268][T12018] tipc: TX() has been purged, node left! 19:05:04 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffbd}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=@deltaction={0x14, 0x31, 0x11}, 0x14}}, 0x0) 19:05:04 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x11, 0x802, 0x0) bind(r1, &(0x7f00000000c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c954"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 19:05:04 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) close(r2) 19:05:04 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:05:05 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) [ 344.091046][ T32] audit: type=1800 audit(1584212705.140:55): pid=12251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16686 res=0 19:05:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000740)=""/95) mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) [ 344.338759][ T32] audit: type=1400 audit(1584212705.390:56): avc: denied { prog_run } for pid=12238 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 19:05:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000100)='\xbb\x02\xb1\x91^\x00\x00\x01\x00\x00\x00\x00\x00\x00\xfa\xe3\xa0\xd42\x90YJ\x89]\xad\x01\xc3\\:;\x99\xbck\xf9=\xfa\xe8HB\xf7\x92\x16\xbc\x11\xc4\xff\xa1\xea\xf9l', 0x0) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="c5", 0x1}], 0x1, 0x40ee1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000009000/0xf000)=nil, 0xf000, 0x380010a, 0x100812, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000000), 0x52698b21) 19:05:05 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:05 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c00e7f323000705000000000700000000000000", @ANYRES32], 0x2}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\b\x00\x00*'], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:05:05 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) 19:05:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='projid_map\x00') sendfile(r1, r0, 0x0, 0x8) 19:05:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000004c0)="c3401c344654f3c7d9fe1ba48c8e390002000000002000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c000000000081eaf18a6fa08dbc800000", 0xfffffffffffffde2, 0x4081, 0x0, 0xffffffffffffff8e) sendmsg(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000400)='Y', 0x1}], 0x1}, 0x0) 19:05:06 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), &(0x7f0000000080)=0x28) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) [ 345.093629][ T32] audit: type=1400 audit(1584212706.140:57): avc: denied { map } for pid=12270 comm="syz-executor.4" path="/dev/loop0" dev="devtmpfs" ino=17924 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 345.302082][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 19:05:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup3(r5, r1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 19:05:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000000)='./file0\x00') [ 345.415008][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 [ 345.448623][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 [ 345.562436][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 19:05:06 executing program 4: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fcntl$setstatus(r1, 0x4, 0x4000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0x3, &(0x7f0000000140)=0x0) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 19:05:06 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) r1 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) [ 345.653595][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 [ 345.732308][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 [ 345.870678][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 19:05:07 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x210, 0x0, 0x0, 0xc0, 0x0, 0xc0, 0x178, 0x178, 0x178, 0x178, 0x178, 0x3, 0x0, {[{{@ip={@remote, @dev, 0x0, 0x0, 'macvlan1\x00', 'ip_vti0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@socket1={{0x28, 'socket\x00'}, 0x2}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xc0}}, {{@ip={@remote, @remote, 0x0, 0x0, 'macvlan0\x00', 'veth1_to_hsr\x00'}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x270) [ 345.918141][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 [ 345.937211][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 [ 345.998609][T12271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12271 comm=syz-executor.0 19:05:07 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) [ 346.993805][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 347.001384][T12018] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 347.014563][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 347.022076][T12018] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 347.035143][T12018] device bridge_slave_1 left promiscuous mode [ 347.041788][T12018] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.118204][T12018] device bridge_slave_0 left promiscuous mode [ 347.125180][T12018] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.180709][T12018] device veth1_macvtap left promiscuous mode [ 347.186989][T12018] device veth0_macvtap left promiscuous mode [ 347.193306][T12018] device veth1_vlan left promiscuous mode [ 347.199118][T12018] device veth0_vlan left promiscuous mode [ 348.923500][T12018] device hsr_slave_0 left promiscuous mode [ 348.963795][T12018] device hsr_slave_1 left promiscuous mode [ 349.037555][T12018] team0 (unregistering): Port device team_slave_1 removed [ 349.053155][T12018] team0 (unregistering): Port device team_slave_0 removed [ 349.068362][T12018] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 349.122024][T12018] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 349.230957][T12018] bond0 (unregistering): Released all slaves [ 349.341777][T12325] IPVS: ftp: loaded support on port[0] = 21 [ 349.585885][T12325] chnl_net:caif_netlink_parms(): no params data found [ 349.762629][T12325] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.770477][T12325] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.780125][T12325] device bridge_slave_0 entered promiscuous mode [ 349.802232][T12325] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.809676][T12325] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.819548][T12325] device bridge_slave_1 entered promiscuous mode [ 349.886364][T12325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 349.904859][T12325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 349.941924][T12325] team0: Port device team_slave_0 added [ 349.956981][T12325] team0: Port device team_slave_1 added [ 350.000264][T12325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 350.007489][T12325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 350.034999][T12325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 350.050710][T12325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 350.057930][T12325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 350.084037][T12325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 350.162438][T12325] device hsr_slave_0 entered promiscuous mode [ 350.204031][T12325] device hsr_slave_1 entered promiscuous mode [ 350.253150][T12325] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 350.260803][T12325] Cannot create hsr debugfs directory [ 350.537329][T12325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 350.561640][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.570475][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.591123][T12325] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.609888][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.619629][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.629020][T11835] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.636303][T11835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.646230][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.661234][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.671406][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.681193][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.688464][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.707895][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 350.744791][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 350.755390][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 350.765865][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 350.778813][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 350.796704][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 350.806393][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 350.827849][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 350.837854][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.861876][T12325] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 350.875093][T12325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 350.884674][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.894427][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.941002][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 350.948820][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 350.973695][T12325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 351.081730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 351.091892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 351.137040][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 351.146297][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.159925][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.169079][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.181679][T12325] device veth0_vlan entered promiscuous mode [ 351.207571][T12325] device veth1_vlan entered promiscuous mode [ 351.261482][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 351.271412][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 351.280465][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 351.298556][T12325] device veth0_macvtap entered promiscuous mode [ 351.318288][T12325] device veth1_macvtap entered promiscuous mode [ 351.343473][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 351.366590][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.377775][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.387823][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.398350][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.408299][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.418876][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.428811][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.439350][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.449284][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.459802][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.472173][T12325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 351.480242][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 351.490355][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 351.516442][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.526997][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.537092][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.547603][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.557629][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.568241][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.580466][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.591029][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.601033][T12325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.611721][T12325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.626019][T12325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 351.637533][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 351.647596][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.222226][T12357] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:05:13 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:13 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r2, 0x40000001, 0x0) unlink(&(0x7f0000000200)='./file0/file0\x00') 19:05:13 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) 19:05:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000180)={0x53, 0x0, 0x51, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000240)="476113176bae", 0x0, 0x0, 0x10024, 0x0, 0x0}) 19:05:13 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0xd8, 0x0, 0x0, 0x0, 0xd8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x87b, 0x0, '\x00', 'syz0\x00'}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'ip6_vti0\x00', 'ipvlan1\x00'}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x288) 19:05:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup3(r5, r1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 352.504979][ C1] sd 0:0:1:0: [sg0] tag#2534 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 352.515655][ C1] sd 0:0:1:0: [sg0] tag#2534 CDB: Play audio msf [ 352.522244][ C1] sd 0:0:1:0: [sg0] tag#2534 CDB[00]: 47 61 13 17 6b ae 00 00 00 00 00 00 00 00 00 00 [ 352.532082][ C1] sd 0:0:1:0: [sg0] tag#2534 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 352.541929][ C1] sd 0:0:1:0: [sg0] tag#2534 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 352.551888][ C1] sd 0:0:1:0: [sg0] tag#2534 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 352.561863][ C1] sd 0:0:1:0: [sg0] tag#2534 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 352.571670][ C1] sd 0:0:1:0: [sg0] tag#2534 CDB[50]: 00 19:05:13 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) 19:05:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000), 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 19:05:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x2699) 19:05:13 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) 19:05:14 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) 19:05:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x1) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') sendfile(r1, r2, 0x0, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00') socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r7, r3) [ 353.526539][ T32] audit: type=1400 audit(1584212714.580:58): avc: denied { watch watch_reads } for pid=12402 comm="syz-executor.3" path="/proc/12402" dev="proc" ino=34779 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 19:05:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:14 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0xd8, 0x0, 0x0, 0x0, 0xd8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x3, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0xbba6, '\x00', 'syz0\x00'}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'ip6_vti0\x00', 'ipvlan1\x00'}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x288) 19:05:14 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, 0x0) [ 353.793256][ T374] tipc: TX() has been purged, node left! 19:05:15 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000006dc0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="8584670ae4564d6ae8119e1ba6ccd148635ee70c4e29", 0x16}], 0x1}}], 0x1, 0x8000) write(r0, &(0x7f0000000400)='\x00\x00', 0x2) 19:05:15 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="95"], 0x1, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)={{0x0}}) 19:05:15 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, 0x0) 19:05:16 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 19:05:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000d80)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000020030000f001000098000000980000009800000098000000880200008802000088020000880200008802000004000000000000000000000000000000ac1414bb00000000000000006772657461703000f0ffffffffffff7f657076707d8e1032000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300158010000000000000000000000000000000000000000c000636f6e6e747261636b000000000000000000000000000000000000000002fe80000000000000000000000000000000000000000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000ff01000000000000000000000000000100000000000000000000000000000000fe8000000000000000000000000000bb000000000000000000000000000000000000000000000000000000000000000000000027fff700000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) 19:05:16 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="95"], 0x1, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)={{0x0}}) 19:05:16 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x141003, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000180)=""/246) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x8000) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4c4080, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup3(0xffffffffffffffff, r4, 0x80000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) io_setup(0x5, &(0x7f0000000300)=0x0) io_submit(r6, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r5, 0x0, 0x12f}]) io_cancel(r6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x53e, r2, &(0x7f0000000040)="705016057fa34eda7d4f0ac5606e36da2ed571e4638b44a88f0339a51c5b6bd13a57e851bce2cf4947d7fe8a49c20d26bfd30d842df2e8843d16a2d4af16912079664feb402321db9c3c97d8886370b36539b839820e5bbacd687ee391a30c6350e9cd7fa4152913a3068cced9d313f3e98303778193822b985eb18774f82aad22d2e650fb47641958ceeea73842c7f71c08084a34873ba8e9f9bbba04d09b6e15994c19a0961aaa917f", 0xaa, 0x80000000d683, 0x0, 0x1, r2}, &(0x7f00000002c0)) pread64(r1, 0x0, 0x0, 0x4) ioctl$EVIOCGREP(r0, 0x4004743c, 0x0) 19:05:16 executing program 1: r0 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040), 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, 0x0) 19:05:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r1, 0x11, 0x0, 0xfff9) truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 356.065536][T12451] syz-executor.0 (12451) used obsolete PPPIOCDETACH ioctl 19:05:17 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xe0) 19:05:17 executing program 5: unshare(0x20000000) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x28000000) r0 = memfd_create(&(0x7f00000005c0)='/pr\x83\xe4EA\xeaoc/V\xa4\x96\xd6bB\xa6sys\xaf\xc9\xa8\xecB\xc0xngnore_T}nneled\x00\x00\xcc\xaaa\xfd\xfb\xd7Z8\x912\xberA3\x82s\xe6\x13\x82\xbc\x9d\xafR|\xa5o\xcfX\xf1+E\n\x9b\x1b\xcd\xef\xa3\xaa\xfd\xf5\xba\xbe\xbb\xfc\xf4\xfae\xacmS\xee\xb9\b8\xf4\xe6!\"B\x05\xfcB\xa9\x8fP\x98\xd5|\xbe\x94\x1b\x96@\xe4\xc2\xaatu\x85\xcf\x1e\x98\xc2/\x8c\x82\\\x89\x1a\xad\x8b\r\x80\xb0p\xdb\xc5\x84\x86\x12H\xb7\xe5\x83i\x91\xb5 \x98\xa0\x13K\x00\xd0\xaa\xf1\xf5\xcd\xaa\x7f[\x14k\r\x06\x00\x00\x00H07\x0e\x14\x7f\xc2\xa4x\x1b\x9e{\xe3\xb2-\x18&\xc7\xe4\xd1\xaeZ\xbf\b\xd9E\xab\x05\x87$\x98\x92\xc5\xa3)\xb1\xf5\xbc\v;\x05Q6\xbc9', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x80000000, 0x0}, 0x0, 0x8, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') [ 356.475451][ T32] audit: type=1400 audit(1584212717.530:59): avc: denied { map } for pid=12463 comm="syz-executor.5" path=2F6D656D66643A2F707283E44541EA6F632F56A496D66242A6737973AFC9A8EC42C0786E676E6F72655F547D6E6E656C6564202864656C6574656429 dev="tmpfs" ino=35900 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 356.867090][ T374] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 356.874929][ T374] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 356.920240][ T374] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 356.928267][ T374] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 356.943014][ T374] device bridge_slave_1 left promiscuous mode [ 356.949695][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.001607][ T374] device bridge_slave_0 left promiscuous mode [ 357.008750][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.075278][ T374] device veth1_macvtap left promiscuous mode [ 357.081469][ T374] device veth0_macvtap left promiscuous mode [ 357.087883][ T374] device veth1_vlan left promiscuous mode [ 357.094100][ T374] device veth0_vlan left promiscuous mode [ 359.153813][ T374] device hsr_slave_0 left promiscuous mode [ 359.193116][ T374] device hsr_slave_1 left promiscuous mode [ 359.288804][ T374] team0 (unregistering): Port device team_slave_1 removed [ 359.306469][ T374] team0 (unregistering): Port device team_slave_0 removed [ 359.325508][ T374] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 359.388540][ T374] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 359.496530][ T374] bond0 (unregistering): Released all slaves [ 359.631525][T12477] IPVS: ftp: loaded support on port[0] = 21 [ 359.856217][T12477] chnl_net:caif_netlink_parms(): no params data found [ 360.008682][T12477] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.016610][T12477] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.026373][T12477] device bridge_slave_0 entered promiscuous mode [ 360.045089][T12477] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.052316][T12477] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.062144][T12477] device bridge_slave_1 entered promiscuous mode [ 360.113550][T12477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 360.133230][T12477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 360.184185][T12477] team0: Port device team_slave_0 added [ 360.199427][T12477] team0: Port device team_slave_1 added [ 360.238638][T12477] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 360.246027][T12477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 360.272259][T12477] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 360.289080][T12477] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 360.296260][T12477] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 360.322484][T12477] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 360.418600][T12477] device hsr_slave_0 entered promiscuous mode [ 360.475691][T12477] device hsr_slave_1 entered promiscuous mode [ 360.513371][T12477] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 360.520981][T12477] Cannot create hsr debugfs directory [ 360.796655][T12477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.822458][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.831093][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.849669][T12477] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.868959][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.878873][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.888175][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.895430][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.906182][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.922499][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.931959][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.941698][T11835] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.950732][T11835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.988251][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.998192][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.015322][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.025431][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.056576][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.065849][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.077119][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.087666][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.098841][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.120886][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.134345][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.152523][T12477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.196230][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.204428][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.230548][T12477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.342648][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 361.354261][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.404608][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 361.414931][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.427708][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.437082][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.451488][T12477] device veth0_vlan entered promiscuous mode [ 361.478951][T12477] device veth1_vlan entered promiscuous mode [ 361.533865][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 361.543235][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 361.552272][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 361.561837][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.581023][T12477] device veth0_macvtap entered promiscuous mode [ 361.599230][T12477] device veth1_macvtap entered promiscuous mode [ 361.638668][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 361.650264][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.662266][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 361.673291][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.683314][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 361.696620][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.707061][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 361.717953][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.727957][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 361.738545][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.751538][T12477] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 361.760804][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 361.770137][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 361.778899][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 361.788953][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.809538][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 361.821077][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.831751][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 361.842420][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.852335][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 361.862966][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.872971][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 361.883542][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.894263][T12477] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 361.904818][T12477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.917503][T12477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 361.928181][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.938885][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.505961][T12515] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:05:23 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@gettaction={0x18, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 19:05:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 19:05:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0x0, 0x90, 0x0, 0x178, 0x178, 0x178, 0x178, 0x178, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) 19:05:23 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:23 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x9, [@int, @restrict, @fwd, @restrict, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd9}, 0x20) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 19:05:24 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1000000000000a}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') shutdown(r0, 0x1) sendfile(r0, r1, 0x0, 0xedc0) [ 362.913472][T12530] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 362.948284][T12530] selinux_netlink_send: 5 callbacks suppressed [ 362.948345][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 19:05:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 19:05:24 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000000c0)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) 19:05:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_init1(0x0) [ 363.083399][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 [ 363.171552][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 [ 363.273462][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 [ 363.313738][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 [ 363.388365][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 19:05:24 executing program 4: [ 363.445255][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 [ 363.515518][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 19:05:24 executing program 3: [ 363.572408][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 [ 363.654618][T12530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12530 comm=syz-executor.1 19:05:24 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:24 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1000000000000a}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') shutdown(r0, 0x1) sendfile(r0, r1, 0x0, 0xedc0) [ 363.831354][T12554] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 363.842251][ T88] tipc: TX() has been purged, node left! 19:05:24 executing program 4: 19:05:25 executing program 3: 19:05:25 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1000000000000a}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') shutdown(r0, 0x1) sendfile(r0, r1, 0x0, 0xedc0) 19:05:25 executing program 5: 19:05:25 executing program 4: 19:05:25 executing program 3: 19:05:25 executing program 5: 19:05:25 executing program 0: 19:05:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 364.709836][T12573] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 19:05:25 executing program 4: 19:05:26 executing program 5: 19:05:26 executing program 3: 19:05:26 executing program 0: 19:05:26 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:26 executing program 5: 19:05:26 executing program 4: 19:05:26 executing program 0: 19:05:26 executing program 3: 19:05:26 executing program 5: 19:05:27 executing program 4: [ 366.127720][T12598] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 366.800762][ T88] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 366.808444][ T88] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 366.818664][ T88] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 366.826365][ T88] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 366.836973][ T88] device bridge_slave_1 left promiscuous mode [ 366.843420][ T88] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.885814][ T88] device bridge_slave_0 left promiscuous mode [ 366.892249][ T88] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.940621][ T88] device veth1_macvtap left promiscuous mode [ 366.946881][ T88] device veth0_macvtap left promiscuous mode [ 366.953119][ T88] device veth1_vlan left promiscuous mode [ 366.959661][ T88] device veth0_vlan left promiscuous mode [ 368.854368][ T88] device hsr_slave_0 left promiscuous mode [ 368.894433][ T88] device hsr_slave_1 left promiscuous mode [ 368.968018][ T88] team0 (unregistering): Port device team_slave_1 removed [ 368.983557][ T88] team0 (unregistering): Port device team_slave_0 removed [ 369.000177][ T88] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 369.033891][ T88] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 369.150788][ T88] bond0 (unregistering): Released all slaves [ 369.270705][T12610] IPVS: ftp: loaded support on port[0] = 21 [ 369.485745][T12610] chnl_net:caif_netlink_parms(): no params data found [ 369.677887][T12610] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.685653][T12610] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.695231][T12610] device bridge_slave_0 entered promiscuous mode [ 369.712277][T12610] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.719850][T12610] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.729514][T12610] device bridge_slave_1 entered promiscuous mode [ 369.794830][T12610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 369.811404][T12610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 369.842583][T12610] team0: Port device team_slave_0 added [ 369.854579][T12610] team0: Port device team_slave_1 added [ 369.882518][T12610] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 369.889699][T12610] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 369.916095][T12610] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 369.931526][T12610] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 369.939320][T12610] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 369.966397][T12610] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 370.079904][T12610] device hsr_slave_0 entered promiscuous mode [ 370.123845][T12610] device hsr_slave_1 entered promiscuous mode [ 370.163051][T12610] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 370.170644][T12610] Cannot create hsr debugfs directory [ 370.451257][T12610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.478785][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.488944][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.508227][T12610] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.526535][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.536351][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.546393][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.553691][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.578220][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 370.587962][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 370.597975][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.607341][T11741] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.615240][T11741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.630737][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 370.654360][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 370.672413][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 370.684326][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 370.716676][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 370.726391][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 370.736450][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 370.747405][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 370.757388][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 370.775430][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 370.785428][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 370.802691][T12610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 370.847630][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 370.855752][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 370.881286][T12610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 370.990206][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 371.001778][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.046669][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 371.055956][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.074763][T12610] device veth0_vlan entered promiscuous mode [ 371.084859][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.094637][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.120496][T12610] device veth1_vlan entered promiscuous mode [ 371.178625][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 371.187811][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 371.197404][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 371.207478][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.224668][T12610] device veth0_macvtap entered promiscuous mode [ 371.241422][T12610] device veth1_macvtap entered promiscuous mode [ 371.281601][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.293045][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.303066][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.313630][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.323659][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.334218][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.344287][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.354936][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.364977][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.375557][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.389605][T12610] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 371.400104][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 371.409796][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 371.419193][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 371.428599][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.448828][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.459496][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.469558][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.480130][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.490085][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.500778][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.510813][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.521421][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.531484][T12610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.542057][T12610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.556168][T12610] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 371.567688][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 371.578162][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.151754][T12642] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:05:33 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:33 executing program 0: 19:05:33 executing program 5: 19:05:33 executing program 3: 19:05:33 executing program 4: 19:05:33 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:33 executing program 4: 19:05:33 executing program 5: [ 372.501265][T12649] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 19:05:33 executing program 0: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001d00)) recvmmsg(0xffffffffffffffff, &(0x7f0000001b80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{0x0}], 0x1, &(0x7f0000001b00)=""/96, 0x60}, 0x6}], 0x2, 0x40, &(0x7f0000001d40)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$inet6(0xa, 0x0, 0x6) [ 372.548191][T12649] selinux_netlink_send: 50 callbacks suppressed [ 372.548240][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 19:05:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty}, 0xc) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=""/99, 0x63}, 0xfffff258}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, &(0x7f0000002880)=[{&(0x7f0000001580)=""/12, 0xc}, {&(0x7f0000002680)=""/200, 0xc8}], 0x2}}], 0x3, 0x40000103, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x4000000000000001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r4, &(0x7f00000017c0), 0x1a0, 0xf0ffff) [ 372.726977][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 [ 372.822778][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 [ 372.922668][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 19:05:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) prctl$PR_SET_UNALIGN(0x6, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) fchdir(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_open_dev$vcsn(0x0, 0x1, 0x0) 19:05:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000480)='hfsplus\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 372.983494][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 [ 373.048746][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 [ 373.156744][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 [ 373.263831][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 19:05:34 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) setresgid(0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x6, 0xfffffffd, 0x0, 0xffffffffffffff77}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x11, 0x800000003, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) [ 373.350564][T12673] hfsplus: unable to find HFS+ superblock [ 373.393805][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 [ 373.487422][T12649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12649 comm=syz-executor.1 [ 373.524467][ T858] tipc: TX() has been purged, node left! 19:05:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)='$', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="4675b43fc72523a6f080933939caa3e42b4c48857ebd84971c17dacf0b4ac3d7a7e1d2579bcfa92e38daeb46b28b2d04dd6b780cc3fd8761806fe314356fa04b9a72760d17fe2645feaf5ea12284b9ecff1c279fa1e0234fbbb6345c800042235ab5eb4ec93e66952cd9d5631ca7da0a1ee68f00ae131dc47d2a6d95b12e7362dfbe18fac32223106b8e6e2a4bca349948f01e8adfc7c7306011b2ebe355fccca62ed64695656014f928ecd5dec2e45289c5839ac707d52a5a9bc91fb2bd3cc9aae425de7f8e879058", 0xc9}, {&(0x7f0000000000)="95ca03dae7007c6967d097c7992b7483e6434abe2dcfe3c39daf9c8dcb40e0c1a4e5dc4ee9b1f5d07ab037b82378d70fd017fe1a6060b2ed1a4da712dd4c61c7", 0x40}, {&(0x7f00000002c0)="9dfbbc6e3c3cfcff83dca2316c6fbadb1516633d838dd24e64b71ff8cce05efa0e1c499542b0b7617be6527f3531ec94bc8ffb5412abf403c76f254e21fdad585db2fb0fb268aafd5644b77e7aa6eab71948baa66a93bf694d9cdf934012ab5a47c5774811ba74ce79e5cf8ffaacc9a56de8a487d11e43089cd1229f4b23fb489464db6de65f0356552c2a2d6b68201ced94f1628c433fc17212b48eff6d9516abc3b955bd446fc1ad6a4d6e7a8353522d9984259da17d484c2063b205a0c4e84af6c52550be529f4685c3d828258854ce38b8be5384db", 0xd7}, {&(0x7f0000000480)="1ecc2b95ee20845349ad7689e2b22a5488fbd6f09e85e70af9fd3ff0c0893a66247b78f759e71b7c4f5889ef6d4c1de2bc8b376fe1320365dc44b61cb9f502437dc45d3bcf036533254558fc9245e662a09d9c897a4ecbfb78b2e3ad7a6f2a109d5f280529aad6a3466b5d7953c2db3a5aa60a8ba4769fd3673ad6d88b50edd6d8f0b84549cee265903f24271757866577af9f8bd683022898cfe3e063a30654d1154285dacd82d860b14bcfa5a4880cb536d5bbc346e306dbe984e5854955048acc4ff0210d1b09bb90036c668e7c2947110e00b0b97161af081ffcab", 0xdd}, {&(0x7f00000005c0)="40b18a215e5e71132884d3b1bf41c6768df863331427c8080fbfe973e1630bd5f3ee24f35a229dbf57429d1b4b0b95418f0ab08092bac6b2298f43dce9f7ac53405eda99d4f00fac8e93c446c5eae4d630432d36332391ffa22ed71877fda5a88cfd200273bb1904e245ab86b3808e2eb701aba1858d303416e9e307982010274361418265c8", 0x86}, {&(0x7f0000000f00)="492d93e43293a2e8ad303f03440b36553486aa2166a0289c2296366242715b42a377d2d70f2d9008456073205fe545a213ccf7757b0ea55d4490fd86e49f4cbeda809b42de8958d306472e19965d7e2c735d3fd26c14ae5bd734831421f9de158d512fe2dc8e0d8305723aa73a55d5b02524c3d6b42b5cbd8824ba5bf77ee8aac0c294ca25eabc163a5e53c7cb46169bfaa216b95b13e816d91c5e7ca88ca476f51fecca368f35035f56440f48b68e21e385dddcbe1e4acf8e7746973d7e8008e7d4b29d9662fac1bbe22eec018993d12c35428e110b478835e4f21e7e1a5724f2ec2ab7bd836880b523a95642f4d1c335c987bbe35eadfbe29699c20ae179e28d72c6bac37499231a52df074cd2317b3039ed1d1f99b71e61a489271ec15a8fdf23f3f63f495cb3d492786866a74d9ff8bf31c8da52ab556680307686920b8bfb0f5f3c5cdeaf43facd0a4c52e017ffa187fa0b6def27b8fc0b71d9f03aa4e989edb102aea76f556562d9f9b3f56019eb65dd80d0b266fe3c4abc098a9fe515d54c3b1a5d1aa30c5c14fa3d5e1f16b78da12637d079bbd259c0382149a4a7c7e6c947bb4268c91eec95dfa45fae678dfbdba5351f3b1a02525077512b52711f2450ec6c58e8665cde8f27ff089f2d8928e37fb68b1da2ab4cdd408c5d15b217a5def48454889940eb69f81ae78729160e66cd8dc3937756a4a87dcbf3014b14615015925125edb7ab63285389bd0b0925695bbd6617b5f8fdb426d016f961c54076fed801f5c9fb4c97d8adb91e638866f79af19ce7d55ad4d60534826b89924b7e73b1560809ac000706bda6bba9f56e03a87f4d832211847c32d384cfd1602c356c2c9e10d8d4e83c0fb5e4", 0x26d}], 0x6}}], 0x2, 0x600d054) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup3(r1, r0, 0x0) 19:05:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x24) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x80000000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) r2 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) keyctl$chown(0x4, r2, 0x0, 0x0) keyctl$update(0x2, r2, 0x0, 0x0) 19:05:34 executing program 5: perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x24) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x80000000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 19:05:34 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:05:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f0000000000), &(0x7f0000000040)) 19:05:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) prctl$PR_SET_UNALIGN(0x6, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 19:05:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) 19:05:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) fchdir(0xffffffffffffffff) 19:05:35 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) prctl$PR_SET_UNALIGN(0x6, 0x0) fchdir(0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 19:05:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) prctl$PR_SET_UNALIGN(0x6, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 19:05:36 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x141, 0x2}}) 19:05:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9419552f7d95716, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000005c0)=ANY=[]) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty}, 0xc) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000700)=""/131, 0x83}, {&(0x7f0000000540)=""/28, 0x1c}], 0x2, &(0x7f00000007c0)=""/231, 0xe7}, 0x8}, {{0x0, 0x0, &(0x7f0000001000)=[{0x0}, {0x0}], 0x2, &(0x7f0000001040)=""/99, 0x63}, 0xfffff258}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000010c0)=""/101, 0x65}, {&(0x7f0000001200)=""/21, 0x15}, {0x0}, {&(0x7f0000001280)=""/242, 0xf2}], 0x4, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, &(0x7f0000002880)=[{&(0x7f0000001580)=""/12, 0xc}, {0x0}, {&(0x7f0000002680)=""/200, 0xc8}, {&(0x7f0000002780)=""/201, 0xc9}], 0x4}, 0xc28}], 0x4, 0x40000103, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x4000000000000001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r4, &(0x7f00000017c0), 0x1a0, 0xf0ffff) [ 375.509970][ T32] audit: type=1400 audit(1584212736.560:60): avc: denied { write } for pid=12727 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 19:05:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001d00)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b80)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f00000008c0)=""/77, 0x4d}], 0x1, &(0x7f0000001e80)=""/205, 0xcd}, 0x1f}, {{0x0, 0x0, &(0x7f00000001c0)}, 0x66a}, {{&(0x7f0000000400)=@x25={0x9, @remote}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)=""/140, 0x8c}], 0x1, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000000580)=@rc, 0x80, 0x0, 0x0, &(0x7f00000006c0)=""/161, 0xa1}, 0x7}, {{0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000001d80)=""/213, 0xd5}}, {{&(0x7f0000001a00)=@rc, 0x80, &(0x7f0000001ac0), 0x0, &(0x7f0000001b00)=""/96, 0x60}, 0x6}], 0x6, 0x40, &(0x7f0000001d40)={r3, r4+30000000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r5 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r5, &(0x7f0000007e00), 0x400000000000058, 0x0) 19:05:36 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) recvmmsg(r0, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 19:05:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'xfrm0\x00'}) 19:05:37 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x24) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x80000000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) recvmmsg(r1, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:05:37 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) [ 377.474424][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 377.482040][ T858] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 377.555519][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 377.563294][ T858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 377.573517][ T858] device bridge_slave_1 left promiscuous mode [ 377.580186][ T858] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.626285][ T858] device bridge_slave_0 left promiscuous mode [ 377.633301][ T858] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.690423][ T858] device veth1_macvtap left promiscuous mode [ 377.696665][ T858] device veth0_macvtap left promiscuous mode [ 377.703051][ T858] device veth1_vlan left promiscuous mode [ 377.709738][ T858] device veth0_vlan left promiscuous mode [ 379.374517][ T858] device hsr_slave_0 left promiscuous mode [ 379.413602][ T858] device hsr_slave_1 left promiscuous mode [ 379.491712][ T858] team0 (unregistering): Port device team_slave_1 removed [ 379.509981][ T858] team0 (unregistering): Port device team_slave_0 removed [ 379.528628][ T858] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 379.581891][ T858] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 379.693446][ T858] bond0 (unregistering): Released all slaves [ 379.821762][T12771] IPVS: ftp: loaded support on port[0] = 21 [ 380.032228][T12771] chnl_net:caif_netlink_parms(): no params data found [ 380.216884][T12771] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.224375][T12771] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.234041][T12771] device bridge_slave_0 entered promiscuous mode [ 380.253399][T12771] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.260642][T12771] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.271340][T12771] device bridge_slave_1 entered promiscuous mode [ 380.347230][T12771] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 380.365158][T12771] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 380.397833][T12771] team0: Port device team_slave_0 added [ 380.412364][T12771] team0: Port device team_slave_1 added [ 380.439695][T12771] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 380.446822][T12771] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.474363][T12771] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 380.510139][T12771] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 380.517393][T12771] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.543600][T12771] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 380.638216][T12771] device hsr_slave_0 entered promiscuous mode [ 380.683843][T12771] device hsr_slave_1 entered promiscuous mode [ 380.734095][T12771] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 380.741732][T12771] Cannot create hsr debugfs directory [ 381.019291][T12771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 381.045956][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.054857][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.074941][T12771] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.094923][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.105272][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.114676][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.121825][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.150900][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.160340][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.171857][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.180997][T11741] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.188228][T11741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.197430][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 381.217843][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 381.243666][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 381.254112][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 381.265510][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 381.280752][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 381.290418][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 381.313912][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 381.323650][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 381.347949][T12771] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 381.360198][T12771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 381.369774][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 381.379639][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.423676][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 381.431278][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 381.456661][T12771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 381.568096][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 381.578553][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 381.621207][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 381.630955][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.644370][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.654097][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.669641][T12771] device veth0_vlan entered promiscuous mode [ 381.693958][T12771] device veth1_vlan entered promiscuous mode [ 381.749031][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 381.758527][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 381.767971][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 381.787514][T12771] device veth0_macvtap entered promiscuous mode [ 381.802913][T12771] device veth1_macvtap entered promiscuous mode [ 381.828284][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 381.856248][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 381.867918][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.878023][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 381.888543][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.898518][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 381.909084][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.919079][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 381.929597][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.939602][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 381.950193][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 381.964097][T12771] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 381.975532][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 381.985761][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 382.001810][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 382.012615][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 382.024326][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 382.034976][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 382.044934][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 382.056411][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 382.066361][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 382.076909][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 382.086920][T12771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 382.097531][T12771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 382.110457][T12771] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 382.119042][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 382.128968][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 382.684927][T12804] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:05:43 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) pipe(&(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000005c0)=ANY=[]) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000540)=""/28, 0x1c}], 0x1, &(0x7f00000007c0)=""/231, 0xe7}, 0x8}, {{0x0, 0x0, &(0x7f0000001000)=[{0x0}], 0x1, &(0x7f0000001040)=""/99, 0x63}, 0xfffff258}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, &(0x7f0000002880)=[{&(0x7f0000001580)=""/12, 0xc}, {0x0}, {&(0x7f0000002680)=""/200, 0xc8}, {&(0x7f0000002780)=""/201, 0xc9}], 0x4}, 0xc28}], 0x4, 0x40000103, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x4000000000000001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r4, &(0x7f00000017c0), 0x1a0, 0xf0ffff) 19:05:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) 19:05:43 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 19:05:43 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) prctl$PR_SET_UNALIGN(0x6, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) fchdir(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:05:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) 19:05:44 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 383.736304][ T88] tipc: TX() has been purged, node left! 19:05:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x6, 0xfffffffd, 0x0, 0xffffffffffffff77}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x100, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x11, 0x800000003, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) 19:05:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9419552f7d95716, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty}, 0xc) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000700)=""/131, 0x83}, {&(0x7f0000000540)=""/28, 0x1c}], 0x2, &(0x7f00000007c0)=""/231, 0xe7}, 0x8}, {{0x0, 0x0, &(0x7f0000001000)=[{0x0}, {0x0}], 0x2, &(0x7f0000001040)=""/99, 0x63}, 0xfffff258}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000010c0)=""/101, 0x65}, {&(0x7f0000001200)=""/21, 0x15}, {0x0}, {&(0x7f0000001280)=""/242, 0xf2}], 0x4, &(0x7f0000001400)=""/232, 0xe8}}, {{&(0x7f0000001500), 0x80, &(0x7f0000002880)=[{0x0}, {0x0}, {&(0x7f0000002680)=""/200, 0xc8}, {&(0x7f0000002780)=""/201, 0xc9}], 0x4}, 0xc28}], 0x4, 0x40000103, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x4000000000000001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x1a0, 0xf0ffff) 19:05:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 19:05:45 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:45 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(r0) 19:05:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9419552f7d95716, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000005c0)=ANY=[]) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002d80)={@dev={0xac, 0x14, 0x14, 0x43}, @empty}, 0xc) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/231, 0xe7}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=""/99, 0x63}, 0xfffff258}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x4000000000000001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x1a0, 0xf0ffff) 19:05:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001d00)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b80)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f00000008c0)=""/77, 0x4d}], 0x1, &(0x7f0000001e80)=""/205, 0xcd}, 0x1f}, {{0x0, 0x0, &(0x7f00000001c0)}, 0x66a}, {{&(0x7f0000000400)=@x25={0x9, @remote}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)=""/140, 0x8c}], 0x1, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000000580)=@rc, 0x80, &(0x7f0000000680)=[{&(0x7f0000000600)=""/78, 0x4e}], 0x1, &(0x7f00000006c0)=""/161, 0xa1}, 0x7}, {{0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000001d80)=""/213, 0xd5}}, {{&(0x7f0000001a00)=@rc, 0x80, &(0x7f0000001ac0), 0x0, &(0x7f0000001b00)=""/96, 0x60}, 0x6}], 0x6, 0x40, &(0x7f0000001d40)={r3, r4+30000000}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r5 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r5, &(0x7f0000007e00), 0x400000000000058, 0x0) 19:05:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[]}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001d00)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b80)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f00000008c0)=""/77, 0x4d}], 0x1, &(0x7f0000001e80)=""/205, 0xcd}, 0x1f}, {{0x0, 0x0, &(0x7f00000001c0)}, 0x66a}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000480)=""/140, 0x8c}], 0x1, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000001d80)=""/213, 0xd5}}, {{&(0x7f0000001a00)=@rc, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/45, 0x2d}], 0x1, &(0x7f0000001b00)=""/96, 0x60}, 0x6}], 0x5, 0x40, &(0x7f0000001d40)={r3, r4+30000000}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r5 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r5, &(0x7f0000007e00), 0x400000000000058, 0x0) 19:05:46 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x0}, 0x0, 0x0, 0x6, 0x0, 0x800}) 19:05:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x1000004001) 19:05:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001840)={&(0x7f0000000000)={0x2, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @loopback}}}}], 0x28}, 0x0) [ 386.916018][T12897] IPVS: ftp: loaded support on port[0] = 21 [ 386.969877][ T88] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 386.980151][ T88] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 387.002987][ T88] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 387.010550][ T88] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 387.032242][ T88] device bridge_slave_1 left promiscuous mode [ 387.039131][ T88] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.095376][ T88] device bridge_slave_0 left promiscuous mode [ 387.101807][ T88] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.168986][ T88] device veth1_macvtap left promiscuous mode [ 387.175173][ T88] device veth0_macvtap left promiscuous mode [ 387.181246][ T88] device veth1_vlan left promiscuous mode [ 387.187241][ T88] device veth0_vlan left promiscuous mode [ 388.874037][ T88] device hsr_slave_0 left promiscuous mode [ 388.913839][ T88] device hsr_slave_1 left promiscuous mode [ 388.988297][ T88] team0 (unregistering): Port device team_slave_1 removed [ 389.005806][ T88] team0 (unregistering): Port device team_slave_0 removed [ 389.028356][ T88] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 389.091429][ T88] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 389.219642][ T88] bond0 (unregistering): Released all slaves [ 389.416661][T12897] chnl_net:caif_netlink_parms(): no params data found [ 389.580454][T12897] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.588265][T12897] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.597867][T12897] device bridge_slave_0 entered promiscuous mode [ 389.614301][T12897] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.624254][T12897] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.633994][T12897] device bridge_slave_1 entered promiscuous mode [ 389.704672][T12897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 389.726700][T12897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 389.785421][T12897] team0: Port device team_slave_0 added [ 389.804077][T12897] team0: Port device team_slave_1 added [ 389.864245][T12897] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 389.871330][T12897] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 389.901133][T12897] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 389.921094][T12897] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 389.928465][T12897] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 389.955071][T12897] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 390.032225][T12897] device hsr_slave_0 entered promiscuous mode [ 390.073926][T12897] device hsr_slave_1 entered promiscuous mode [ 390.113353][T12897] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 390.120991][T12897] Cannot create hsr debugfs directory [ 390.291655][T12897] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.299031][T12897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.306883][T12897] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.314263][T12897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.414074][T11928] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.425730][T11928] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.468441][T12897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 390.495919][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 390.505069][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 390.522401][T12897] 8021q: adding VLAN 0 to HW filter on device team0 [ 390.539448][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 390.549489][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 390.558854][T11928] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.566022][T11928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.588058][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 390.598711][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 390.608165][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.616100][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.654534][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 390.665950][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 390.675677][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 390.686099][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 390.699571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 390.710233][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 390.720943][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 390.744009][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 390.753319][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 390.776266][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 390.786622][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 390.805392][T12897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 390.842767][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 390.850995][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 390.885788][T12897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 390.994643][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 391.004775][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 391.046983][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 391.056298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.069681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.080610][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 391.096852][T12897] device veth0_vlan entered promiscuous mode [ 391.120781][T12897] device veth1_vlan entered promiscuous mode [ 391.177440][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 391.186238][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 391.195941][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 391.206013][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 391.226205][T12897] device veth0_macvtap entered promiscuous mode [ 391.241972][T12897] device veth1_macvtap entered promiscuous mode [ 391.282299][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 391.293086][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.303438][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 391.314023][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.323986][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 391.334531][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.344455][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 391.355003][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.364910][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 391.375462][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.387822][T12897] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 391.396723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 391.405648][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 391.415262][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 391.424602][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 391.445559][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 391.457292][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.467326][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 391.477842][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.487822][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 391.498365][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.508413][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 391.518959][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.528959][T12897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 391.540134][T12897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.553013][T12897] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 391.562711][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 391.574760][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 392.132955][T12929] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:05:53 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:53 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000fc0)=@raw={'raw\x00', 0x2, 0x3, 0x2dc, 0x198, 0x0, 0x64, 0x198, 0x198, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, 0x0, {[{{@ip={@multicast1, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'vlan0\x00'}, 0x0, 0x164, 0x198, 0x0, {0x9000000}, [@common=@inet=@recent0={{0xf4, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}]}, @common=@inet=@SET3={0x34, 'SET\x00'}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "81db31d1c2f70542e67d03a69365a2dbd5ba005345b7f6063831d5ea0400"}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x338) socketpair(0x0, 0x0, 0x0, 0x0) 19:05:53 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:53 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0xbaa) dup(0xffffffffffffffff) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) epoll_create1(0x0) 19:05:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:05:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:53 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000fc0)=@raw={'raw\x00', 0x2, 0x3, 0x2dc, 0x198, 0x0, 0x64, 0x198, 0x198, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, 0x0, {[{{@ip={@multicast1, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'vlan0\x00'}, 0x0, 0x164, 0x198, 0x0, {0x9000000}, [@common=@inet=@recent0={{0xf4, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}]}, @common=@inet=@SET3={0x34, 'SET\x00'}}, {{@ip={@multicast2, @empty, 0x0, 0x0, '\x00', 'vlan1\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "81db31d1c2f70542e67d03a69365a2dbd5ba005345b7f6063831d5ea0400"}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x338) socketpair(0x0, 0x0, 0x0, 0x0) [ 392.465037][T12939] Cannot find add_set index 0 as target [ 392.481357][T12941] device bridge1 entered promiscuous mode [ 392.487950][T12944] Cannot find add_set index 0 as target 19:05:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 19:05:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)='$', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)='F', 0x1}], 0x1}}], 0x2, 0x600d054) [ 392.732119][T12951] Cannot find add_set index 0 as target 19:05:54 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 393.035931][T12960] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 393.069732][T12947] device bridge_slave_0 left promiscuous mode [ 393.077231][T12947] bridge0: port 1(bridge_slave_0) entered disabled state 19:05:54 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 393.123111][T12947] bridge1: port 1(bridge_slave_0) entered blocking state [ 393.130418][T12947] bridge1: port 1(bridge_slave_0) entered disabled state [ 393.139837][T12947] device bridge_slave_0 entered promiscuous mode [ 393.148553][T12947] bridge1: port 1(bridge_slave_0) entered blocking state [ 393.155925][T12947] bridge1: port 1(bridge_slave_0) entered forwarding state 19:05:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) close(r0) [ 393.303498][ T858] tipc: TX() has been purged, node left! 19:05:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:54 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:05:54 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:05:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ec3ef2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:05:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:05:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:05:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:55 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) [ 394.893416][T12985] device bridge2 entered promiscuous mode [ 395.077569][T12988] device bridge_slave_0 left promiscuous mode [ 395.084898][T12988] bridge1: port 1(bridge_slave_0) entered disabled state [ 395.130235][T12988] bridge2: port 1(bridge_slave_0) entered blocking state [ 395.137691][T12988] bridge2: port 1(bridge_slave_0) entered disabled state [ 395.147474][T12988] device bridge_slave_0 entered promiscuous mode [ 395.156068][T12988] bridge2: port 1(bridge_slave_0) entered blocking state [ 395.163641][T12988] bridge2: port 1(bridge_slave_0) entered forwarding state [ 395.186260][T12993] device bridge1 entered promiscuous mode 19:05:56 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc0505510, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000014"]) [ 396.288347][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 396.296164][ T858] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 396.328454][ T858] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 396.337020][ T858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 396.352739][ T858] device bridge_slave_1 left promiscuous mode [ 396.359712][ T858] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.400346][ T858] device bridge_slave_0 left promiscuous mode [ 396.407633][ T858] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.469150][ T858] device veth1_macvtap left promiscuous mode [ 396.475974][ T858] device veth0_macvtap left promiscuous mode [ 396.482129][ T858] device veth1_vlan left promiscuous mode [ 396.489000][ T858] device veth0_vlan left promiscuous mode 19:05:57 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x541b, &(0x7f00000003c0)={'gretap0\x00'}) 19:05:57 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) 19:05:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:05:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:05:57 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x7f499eb2ae778c31}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = memfd_create(&(0x7f0000000100)='#\x00', 0x0) write(r5, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r5, 0x0) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0xb00000000000000) r6 = dup3(r0, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r6, &(0x7f00000001c0)={0x0, 0x3f00}) [ 396.922603][ T32] audit: type=1400 audit(1584212757.970:61): avc: denied { block_suspend } for pid=13024 comm="syz-executor.5" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 399.165808][ T858] device hsr_slave_0 left promiscuous mode [ 399.206044][ T858] device hsr_slave_1 left promiscuous mode [ 399.282128][ T858] team0 (unregistering): Port device team_slave_1 removed [ 399.301137][ T858] team0 (unregistering): Port device team_slave_0 removed [ 399.323014][ T858] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 399.383683][ T858] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 399.506320][ T858] bond0 (unregistering): Released all slaves [ 399.619983][T13020] device bridge3 entered promiscuous mode [ 399.630227][T13026] device bridge_slave_0 left promiscuous mode [ 399.636954][T13026] bridge2: port 1(bridge_slave_0) entered disabled state [ 399.687193][T13026] bridge3: port 1(bridge_slave_0) entered blocking state [ 399.694588][T13026] bridge3: port 1(bridge_slave_0) entered disabled state [ 399.703142][T13026] device bridge_slave_0 entered promiscuous mode [ 399.710911][T13026] bridge3: port 1(bridge_slave_0) entered blocking state [ 399.718209][T13026] bridge3: port 1(bridge_slave_0) entered forwarding state [ 399.764466][T13011] IPVS: ftp: loaded support on port[0] = 21 [ 400.054476][T13011] chnl_net:caif_netlink_parms(): no params data found [ 400.204024][T13011] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.211240][T13011] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.220839][T13011] device bridge_slave_0 entered promiscuous mode [ 400.233191][T13011] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.240354][T13011] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.250029][T13011] device bridge_slave_1 entered promiscuous mode [ 400.299896][T13011] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 400.319574][T13011] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 400.354539][T13011] team0: Port device team_slave_0 added [ 400.366050][T13011] team0: Port device team_slave_1 added [ 400.395034][T13011] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 400.402092][T13011] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 400.428243][T13011] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 400.442420][T13011] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 400.449548][T13011] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 400.479453][T13011] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 400.556805][T13011] device hsr_slave_0 entered promiscuous mode [ 400.603635][T13011] device hsr_slave_1 entered promiscuous mode [ 400.644697][T13011] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 400.653127][T13011] Cannot create hsr debugfs directory [ 400.933375][T13011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 400.960382][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 400.975841][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.994627][T13011] 8021q: adding VLAN 0 to HW filter on device team0 [ 401.012386][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.021767][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.031140][T11741] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.038322][T11741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.064174][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 401.073500][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.083153][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.092029][T11741] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.099290][T11741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.108546][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 401.131102][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 401.166812][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 401.176513][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.187244][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.197021][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.224986][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.234575][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.244413][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.253792][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 401.263908][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.279937][T13011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 401.326875][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 401.335675][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 401.360026][T13011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 401.466499][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 401.515130][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.525181][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.535523][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.550692][T13011] device veth0_vlan entered promiscuous mode [ 401.576720][T13011] device veth1_vlan entered promiscuous mode [ 401.633539][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 401.642253][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 401.652677][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 401.670736][T13011] device veth0_macvtap entered promiscuous mode [ 401.688223][T13011] device veth1_macvtap entered promiscuous mode [ 401.700185][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 401.741873][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.752636][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.762877][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.773964][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.784039][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.794734][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.805235][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.815814][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.825753][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 401.836473][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.849016][T13011] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 401.857895][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 401.868568][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 401.889028][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.900085][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.910841][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.921466][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.931552][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.942638][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.953573][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.964175][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.974103][T13011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 401.984651][T13011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 401.997014][T13011] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 402.007436][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 402.017161][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 402.544493][T13066] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:03 executing program 5: 19:06:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480), r1, 0x0, 0x1, 0x4}}, 0x20) 19:06:03 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) 19:06:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:03 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:06:03 executing program 3: [ 402.847978][T13077] device bridge4 entered promiscuous mode 19:06:04 executing program 5: 19:06:04 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@empty, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ec3ef2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 19:06:04 executing program 3: syz_emit_ethernet(0x8a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd600000000000000000bbfe3ef7fffff21c00000000000000ea11659706fe95620000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) [ 403.420541][T13077] device bridge_slave_0 left promiscuous mode [ 403.427499][T13077] bridge3: port 1(bridge_slave_0) entered disabled state [ 403.479264][T12018] tipc: TX() has been purged, node left! [ 403.483942][T13077] bridge4: port 1(bridge_slave_0) entered blocking state [ 403.492443][T13077] bridge4: port 1(bridge_slave_0) entered disabled state [ 403.501775][T13077] device bridge_slave_0 entered promiscuous mode [ 403.510529][T13077] bridge4: port 1(bridge_slave_0) entered blocking state [ 403.517887][T13077] bridge4: port 1(bridge_slave_0) entered forwarding state 19:06:04 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) 19:06:04 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000014"]) 19:06:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:04 executing program 5: 19:06:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r4, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r4}}}], 0x20}, 0x0) 19:06:05 executing program 3: 19:06:05 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:05 executing program 5: [ 404.285935][T13108] device bridge5 entered promiscuous mode 19:06:05 executing program 3: 19:06:05 executing program 5: 19:06:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r4, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r4}}}], 0x20}, 0x0) 19:06:05 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:06 executing program 3: 19:06:06 executing program 5: [ 405.144432][T13121] device bridge6 entered promiscuous mode [ 405.156316][T13127] selinux_netlink_send: 5 callbacks suppressed [ 405.156368][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 19:06:06 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 405.251645][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 [ 405.342239][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 19:06:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r4, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r4}}}], 0x20}, 0x0) [ 405.386906][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 [ 405.493330][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 19:06:06 executing program 3: [ 405.591962][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 19:06:06 executing program 5: [ 405.703716][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 [ 405.767177][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 [ 405.851038][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 [ 405.935552][T13127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13127 comm=syz-executor.1 19:06:07 executing program 3: [ 406.017638][T13136] device bridge7 entered promiscuous mode 19:06:07 executing program 5: 19:06:07 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) 19:06:07 executing program 5: 19:06:07 executing program 3: 19:06:07 executing program 5: [ 406.900818][T13157] device bridge_slave_0 left promiscuous mode [ 406.908364][T13157] bridge4: port 1(bridge_slave_0) entered disabled state [ 407.254567][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 407.262162][T12018] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 407.274646][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 407.282238][T12018] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 407.293360][T12018] device bridge_slave_1 left promiscuous mode [ 407.300031][T12018] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.344422][T12018] device bridge_slave_0 left promiscuous mode [ 407.350973][T12018] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.400942][T12018] device veth1_macvtap left promiscuous mode [ 407.407363][T12018] device veth0_macvtap left promiscuous mode [ 407.413618][T12018] device veth1_vlan left promiscuous mode [ 407.419586][T12018] device veth0_vlan left promiscuous mode [ 409.353999][T12018] device hsr_slave_0 left promiscuous mode [ 409.394222][T12018] device hsr_slave_1 left promiscuous mode [ 409.488226][T12018] team0 (unregistering): Port device team_slave_1 removed [ 409.506922][T12018] team0 (unregistering): Port device team_slave_0 removed [ 409.523350][T12018] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 409.543920][T12018] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 409.660875][T12018] bond0 (unregistering): Released all slaves [ 409.770438][T13169] IPVS: ftp: loaded support on port[0] = 21 [ 409.906497][T13169] chnl_net:caif_netlink_parms(): no params data found [ 410.114664][T13169] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.121911][T13169] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.131744][T13169] device bridge_slave_0 entered promiscuous mode [ 410.151284][T13169] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.159243][T13169] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.168976][T13169] device bridge_slave_1 entered promiscuous mode [ 410.233719][T13169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 410.254568][T13169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 410.308782][T13169] team0: Port device team_slave_0 added [ 410.321948][T13169] team0: Port device team_slave_1 added [ 410.349210][T13169] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 410.357091][T13169] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.383099][T13169] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 410.401292][T13169] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 410.408435][T13169] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.435016][T13169] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 410.529431][T13169] device hsr_slave_0 entered promiscuous mode [ 410.584060][T13169] device hsr_slave_1 entered promiscuous mode [ 410.623033][T13169] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 410.630670][T13169] Cannot create hsr debugfs directory [ 410.806400][T13169] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.813716][T13169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.821231][T13169] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.828511][T13169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.841318][T11928] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.852680][T11928] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.962573][T13169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 410.989848][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 410.998709][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.017450][T13169] 8021q: adding VLAN 0 to HW filter on device team0 [ 411.035830][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.045111][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.054519][T11835] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.061710][T11835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.083561][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 411.092680][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 411.102466][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.109825][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.144270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 411.154667][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 411.165971][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 411.176416][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 411.190403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 411.200013][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 411.209767][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 411.234084][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 411.246243][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 411.259524][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 411.269211][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 411.288270][T13169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 411.331453][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 411.339380][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 411.363515][T13169] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 411.470697][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 411.480494][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 411.523943][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 411.534240][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.549890][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 411.559068][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 411.571699][T13169] device veth0_vlan entered promiscuous mode [ 411.597036][T13169] device veth1_vlan entered promiscuous mode [ 411.650623][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 411.659710][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 411.669329][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 411.678476][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 411.696133][T13169] device veth0_macvtap entered promiscuous mode [ 411.717551][T13169] device veth1_macvtap entered promiscuous mode [ 411.757106][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.769514][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.779562][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.790140][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.800132][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.812387][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.822410][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.832962][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.842979][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 411.853465][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.867042][T13169] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 411.876592][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 411.886066][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 411.894690][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 411.904672][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 411.924219][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.935893][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.945917][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.956462][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.966474][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.977009][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 411.986975][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 411.997532][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 412.007616][T13169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 412.018197][T13169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 412.030663][T13169] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 412.039490][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 412.049725][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 412.617729][T13201] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:13 executing program 5: 19:06:13 executing program 3: 19:06:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) 19:06:13 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:13 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:14 executing program 5: [ 412.978692][T13212] selinux_netlink_send: 22 callbacks suppressed [ 412.978741][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 19:06:14 executing program 3: [ 413.058455][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 [ 413.163919][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 [ 413.176882][T13218] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) [ 413.251507][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 [ 413.323440][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 [ 413.392159][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 19:06:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:14 executing program 5: [ 413.495454][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 19:06:14 executing program 3: [ 413.569929][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 [ 413.675962][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 [ 413.744723][T13212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13212 comm=syz-executor.1 19:06:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x20}, 0x0) 19:06:14 executing program 5: [ 413.958840][T13230] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:15 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:15 executing program 3: 19:06:15 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:15 executing program 5: 19:06:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x20}, 0x0) 19:06:15 executing program 3: [ 414.719326][T13255] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:15 executing program 5: 19:06:15 executing program 3: 19:06:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x20}, 0x0) 19:06:16 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:16 executing program 5: 19:06:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:16 executing program 3: 19:06:16 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:16 executing program 5: 19:06:16 executing program 3: 19:06:16 executing program 5: [ 415.886252][T12018] tipc: TX() has been purged, node left! 19:06:17 executing program 3: 19:06:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:06:17 executing program 5: 19:06:17 executing program 3: 19:06:17 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:17 executing program 5: 19:06:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:17 executing program 3: [ 416.682098][T13293] device bridge8 entered promiscuous mode 19:06:17 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:18 executing program 5: 19:06:18 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:18 executing program 3: 19:06:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:06:18 executing program 5: 19:06:18 executing program 3: 19:06:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0xff8) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:19 executing program 5: [ 417.985907][T13319] device bridge9 entered promiscuous mode 19:06:19 executing program 3: 19:06:19 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r6}}}], 0x20}, 0x0) 19:06:19 executing program 5: 19:06:19 executing program 3: [ 418.762363][T13337] selinux_netlink_send: 51 callbacks suppressed [ 418.762420][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.797968][T13340] device bridge10 entered promiscuous mode [ 418.823653][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.873926][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.901776][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.918621][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.933862][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.947990][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.963270][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 418.996693][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 419.065253][T13337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13337 comm=syz-executor.1 [ 419.517063][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 419.524813][T12018] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 419.539303][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 419.547013][T12018] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 419.562381][T12018] device bridge_slave_1 left promiscuous mode [ 419.569968][T12018] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.619267][T12018] device bridge_slave_0 left promiscuous mode [ 419.626098][T12018] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.680573][T12018] device veth1_macvtap left promiscuous mode [ 419.687156][T12018] device veth0_macvtap left promiscuous mode [ 419.693511][T12018] device veth1_vlan left promiscuous mode [ 419.699351][T12018] device veth0_vlan left promiscuous mode [ 421.394163][T12018] device hsr_slave_0 left promiscuous mode [ 421.433571][T12018] device hsr_slave_1 left promiscuous mode [ 421.517516][T12018] team0 (unregistering): Port device team_slave_1 removed [ 421.534777][T12018] team0 (unregistering): Port device team_slave_0 removed [ 421.552363][T12018] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 421.601762][T12018] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 421.720080][T12018] bond0 (unregistering): Released all slaves [ 421.831426][T13350] IPVS: ftp: loaded support on port[0] = 21 [ 422.039974][T13350] chnl_net:caif_netlink_parms(): no params data found [ 422.210068][T13350] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.218064][T13350] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.227812][T13350] device bridge_slave_0 entered promiscuous mode [ 422.249372][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.256791][T13350] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.266506][T13350] device bridge_slave_1 entered promiscuous mode [ 422.317050][T13350] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 422.337925][T13350] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 422.392520][T13350] team0: Port device team_slave_0 added [ 422.404722][T13350] team0: Port device team_slave_1 added [ 422.433770][T13350] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 422.440967][T13350] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.476359][T13350] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 422.496637][T13350] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 422.505217][T13350] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.532455][T13350] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 422.608430][T13350] device hsr_slave_0 entered promiscuous mode [ 422.664188][T13350] device hsr_slave_1 entered promiscuous mode [ 422.703161][T13350] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 422.710779][T13350] Cannot create hsr debugfs directory [ 422.878604][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.885810][T13350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.893694][T13350] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.900872][T13350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.916717][T12230] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.926108][T12230] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.040813][T13350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 423.074482][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 423.083325][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 423.100452][T13350] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.118407][T12230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 423.127688][T12230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 423.137245][T12230] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.144510][T12230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.185068][T12230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 423.195658][T12230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 423.205123][T12230] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.212275][T12230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.222306][T12230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 423.232097][T12230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 423.247247][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 423.257981][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 423.287976][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 423.297010][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 423.307720][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 423.322595][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 423.333334][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 423.350891][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 423.361863][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 423.383678][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 423.425322][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 423.433195][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 423.456192][T13350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 423.568026][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 423.578730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 423.624316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 423.634031][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.644842][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.654409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.671524][T13350] device veth0_vlan entered promiscuous mode [ 423.696571][T13350] device veth1_vlan entered promiscuous mode [ 423.751250][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 423.760126][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 423.769611][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 423.779059][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 423.798322][T13350] device veth0_macvtap entered promiscuous mode [ 423.814598][T13350] device veth1_macvtap entered promiscuous mode [ 423.851263][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 423.862593][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.872583][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 423.883141][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.893147][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 423.903678][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.913877][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 423.924418][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.934534][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 423.945087][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.957909][T13350] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 423.968652][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 423.978206][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 423.988067][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 423.997846][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 424.019741][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 424.030288][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.041392][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 424.051945][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.061895][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 424.072459][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.082461][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 424.093017][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.103169][T13350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 424.113727][T13350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.128244][T13350] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 424.136511][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 424.146174][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 424.726509][T13382] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:25 executing program 5: 19:06:25 executing program 3: 19:06:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) 19:06:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0xff8) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:25 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:26 executing program 3: [ 425.080281][T13392] selinux_netlink_send: 5 callbacks suppressed [ 425.080331][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 19:06:26 executing program 5: [ 425.181763][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 [ 425.295267][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 19:06:26 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) [ 425.359458][T13397] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 425.389648][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 [ 425.443730][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 19:06:26 executing program 3: ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x1, 0x1000, 0xa0a, &(0x7f0000ffe000/0x1000)=nil) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0xfffffff0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r1, 0x325, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 425.509506][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 19:06:26 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000300)={0x0, "449a2d8d7a547945bde665e203f2e594a908dad953516b7ae106ec8f2fb6dd61df93554abc0235ed83d8aeea5b4dd593da3875b72624d22f86f3e0cc8f593d72"}) [ 425.563867][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 19:06:26 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 425.725638][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 [ 425.846076][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 19:06:27 executing program 5: fsopen(&(0x7f0000000080)='bpf\x00', 0x0) 19:06:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) 19:06:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0xff8) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='Z\x00') [ 426.021684][T13392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13392 comm=syz-executor.1 [ 426.172725][T13418] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:27 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="a19fa4c1a11d793a"], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:06:27 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)) 19:06:27 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) [ 426.592372][T13432] NFSv4: Unsupported transport protocol udp [ 426.632308][T13436] NFSv4: Unsupported transport protocol udp 19:06:27 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0x48, 0x0, &(0x7f0000000400)=[@exit_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 19:06:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) dup3(r0, r1, 0x0) [ 427.074673][T13444] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) 19:06:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket$kcm(0x29, 0x1000000000002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1ab, 0x500) 19:06:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x4b65, 0x0) 19:06:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x36, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xc0fe) [ 427.829357][T13470] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r5}}}], 0x20}, 0x0) 19:06:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:06:29 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r4, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r4}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r4}}}], 0x20}, 0x0) [ 428.710192][T13490] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 428.917060][T13496] device bridge11 entered promiscuous mode 19:06:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') read$rfkill(r0, 0x0, 0x0) 19:06:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:30 executing program 3: unshare(0x28060400) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180), 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr="30f37c267dd424a10376e27153fa02ac"}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 19:06:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:30 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) [ 429.618193][T13517] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:30 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000400)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) [ 429.789906][T13521] device bridge12 entered promiscuous mode 19:06:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:31 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:06:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)) r2 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) sendfile(r2, r2, &(0x7f0000000200), 0xff8) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 430.468320][ T32] audit: type=1400 audit(1584212791.520:62): avc: denied { setopt } for pid=13519 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:06:31 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:31 executing program 3: socket$netlink(0x10, 0x3, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000b94000)=""/246) ioctl$PPPIOCSPASS(r0, 0x80047456, &(0x7f0000000200)={0x0, 0x0}) 19:06:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 430.879245][T13541] device bridge13 entered promiscuous mode [ 430.951363][T13559] selinux_netlink_send: 20 callbacks suppressed [ 430.951412][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 [ 430.995464][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 [ 431.034951][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 [ 431.069534][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 [ 431.089441][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 [ 431.117044][T12018] tipc: TX() has been purged, node left! [ 431.123088][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 [ 431.142101][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 [ 431.179206][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 19:06:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) [ 431.229939][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 19:06:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 431.278621][T13559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13559 comm=syz-executor.1 19:06:32 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) sendfile(r2, r2, &(0x7f0000000200), 0xff8) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:32 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 431.963872][T13570] device bridge14 entered promiscuous mode 19:06:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 432.589672][T13588] device bridge15 entered promiscuous mode 19:06:33 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x48, 0x2a, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28}]}, 0x48}}, 0x0) 19:06:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r2}}}], 0x20}, 0x0) 19:06:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r1, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0xff8) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:34 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 433.253760][T13605] device bridge16 entered promiscuous mode [ 434.020644][T13618] IPVS: ftp: loaded support on port[0] = 21 [ 434.177008][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 434.185870][T12018] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 434.201252][T12018] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 434.209327][T12018] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 434.220912][T12018] device bridge_slave_1 left promiscuous mode [ 434.227488][T12018] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.264924][T12018] device bridge_slave_0 left promiscuous mode [ 434.271397][T12018] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.321673][T12018] device veth1_macvtap left promiscuous mode [ 434.327871][T12018] device veth0_macvtap left promiscuous mode [ 434.334171][T12018] device veth1_vlan left promiscuous mode [ 434.340070][T12018] device veth0_vlan left promiscuous mode [ 436.066050][T12018] device hsr_slave_0 left promiscuous mode [ 436.113175][T12018] device hsr_slave_1 left promiscuous mode [ 436.200294][T12018] team0 (unregistering): Port device team_slave_1 removed [ 436.219290][T12018] team0 (unregistering): Port device team_slave_0 removed [ 436.238567][T12018] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 436.291580][T12018] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 436.411986][T12018] bond0 (unregistering): Released all slaves [ 436.614530][T13618] chnl_net:caif_netlink_parms(): no params data found [ 436.787196][T13618] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.794654][T13618] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.806888][T13618] device bridge_slave_0 entered promiscuous mode [ 436.825155][T13618] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.832419][T13618] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.844101][T13618] device bridge_slave_1 entered promiscuous mode [ 436.906659][T13618] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 436.926812][T13618] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 436.990351][T13618] team0: Port device team_slave_0 added [ 437.011099][T13618] team0: Port device team_slave_1 added [ 437.065026][T13618] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 437.072098][T13618] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 437.098434][T13618] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 437.118866][T13618] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 437.126153][T13618] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 437.152300][T13618] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 437.229789][T13618] device hsr_slave_0 entered promiscuous mode [ 437.275976][T13618] device hsr_slave_1 entered promiscuous mode [ 437.303380][T13618] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 437.311029][T13618] Cannot create hsr debugfs directory [ 437.492007][T13618] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.499369][T13618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.507190][T13618] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.514504][T13618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.534518][T11835] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.548148][T11835] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.649548][T13618] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.678405][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 437.687147][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.707895][T13618] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.724565][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 437.734549][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.743816][T11835] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.750922][T11835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.778959][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.788316][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.797777][T11835] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.805025][T11835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.815709][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 437.835883][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 437.853510][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 437.864748][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 437.876215][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 437.893567][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 437.904102][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.936144][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.945791][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.957591][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 437.966810][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.983107][T13618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 438.027826][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 438.035740][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 438.059975][T13618] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 438.170555][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 438.185592][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 438.234821][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 438.245084][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.261899][T13618] device veth0_vlan entered promiscuous mode [ 438.271067][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 438.280066][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 438.307188][T13618] device veth1_vlan entered promiscuous mode [ 438.359546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 438.368492][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 438.378477][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 438.388575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 438.407543][T13618] device veth0_macvtap entered promiscuous mode [ 438.425696][T13618] device veth1_macvtap entered promiscuous mode [ 438.462692][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 438.473765][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.483862][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 438.494599][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.504584][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 438.515122][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.525057][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 438.535579][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.545618][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 438.556573][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.568851][T13618] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 438.580261][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 438.589074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 438.598022][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 438.607332][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 438.628118][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 438.639317][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.649437][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 438.660412][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.670459][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 438.680995][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.691071][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 438.701651][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.711669][T13618] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 438.722186][T13618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 438.735755][T13618] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 438.746619][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 438.756885][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 439.322625][T13651] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x0, 0x0, 0x0) 19:06:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r1, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0xff8) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r2}}}], 0x20}, 0x0) 19:06:40 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) [ 439.671919][T13660] device bridge17 entered promiscuous mode [ 439.708438][T13664] selinux_netlink_send: 35 callbacks suppressed 19:06:40 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 439.708488][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 [ 439.736595][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 [ 439.789484][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 19:06:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r2, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r2}}}], 0x20}, 0x0) [ 439.873475][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 [ 439.928981][T13667] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 439.973166][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 19:06:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 440.022060][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 19:06:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffbfff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d08dc94999ab7e98e21c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b292675dac2bca78dc9f6a8edac23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a000000000000844700002aacc6f70ccf52efb122060000"], 0x24}}, 0x0) [ 440.166964][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 19:06:41 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 440.263100][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 [ 440.388793][T13678] device bridge18 entered promiscuous mode [ 440.433470][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 19:06:41 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 440.492480][T13664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13664 comm=syz-executor.1 19:06:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 440.764357][T13685] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab7baa81cf128f5f61a199ab7c2badfb67c00ca0130d28e15c05fb9a13f9557e4a9191f6c4777f30dd903a033da4c91cdb59070000001f10aca3e062d95598fbf27def5237116d72d45ead01d0cb6ad41f7185ad6f4506ae44b9c79abba5de97372bd4a87357cd6c895700dcebe3841073e60b046593009b800ad382a20c977b2bc05a92ef537fba6c7aa8ace4028620a6dbcdc47aa8deb098bdc4dffcf0c83781dca42c3b84e4413287a9826258021148cd41bd1ea970a4e83414e7792fd58775c016148b3b897d13fceee05de01a1ac64bd3a46aaa670a91144a57f9ba831d2bfdab353e056a1b4ab9880cb4dc429ffd9fb073c079a94f3593bff338e344cde2713320e1e170f3768eefd484a84a6d1823df95d157a641aaa7dc6b75c3bfd706"], 0x5}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x200, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x84}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x4924924924923aa, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x332, 0x0) 19:06:41 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:42 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:42 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 19:06:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$session_to_parent(0x12) [ 441.500627][T13708] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:42 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 19:06:43 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000540)) 19:06:43 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 442.228709][T13729] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:43 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff400000000a0001006e6574656d0000003c000200001e000000000000800008000bf9ff0000fb0310290000000c0003"], 0x3}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 19:06:43 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:43 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x2d4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f0b000000553a09d5fff7", @ANYRES32, @ANYBLOB="00000001f1ffffff0000000008000100636271"], 0x3}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 19:06:44 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) [ 443.134239][T13758] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) [ 443.202593][T13762] netlink: 2212 bytes leftover after parsing attributes in process `syz-executor.3'. 19:06:44 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:44 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) 19:06:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:44 executing program 4: r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) 19:06:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="8c0000000001ff050000000000000000000000003c0001002c000100140003000000000000000000000000000000000114000400fe8000000000000000000000000000bb0c0002000500010000000000240002000c000200050001000000000014000100080001000000000008000200e0000001080007000000000008001500000000000800080000000000"], 0x8c}}, 0x0) 19:06:45 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:45 executing program 4: r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0}}, 0x0) 19:06:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x2c0}], 0x3b6, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) preadv(r0, &(0x7f0000000480), 0x19d, 0x0) 19:06:45 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) [ 444.766970][T13809] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:45 executing program 4: r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0}}, 0x0) 19:06:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:46 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:46 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x4785, 0x0, 0x1798}) r0 = memfd_create(&(0x7f0000000340)='q\x05\x00\x00\x00\xdd\x035I\xa6\xc0\x10$\xabb\x00\x00\x00\x00\x00\x00\x01\xcb/S\xdc\xdd\x0e\a\x00\x005+\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x8aC\x96\x8c\xd0\xe6\x83\xaaw\xaa\x93\xea\xa6\xcf \x8e\xa3]\xfe\x91u\x1d\x90\xa0Z\\Y\xc4dl\xfd|o\xde\x9e\xa5\x93h\x84\x8a\xd0\xce\xff\x80\xf3/\x16u\x15\x03\xfb\xc1$\x0f\xa6[d\xd9EC\xd6~-\xcd\tey\xa0\xa8\xd7\x88\xd2{vf5\xeaX\r\xea\xb1\x1d(xb\xe80\xa5\x8e\x97Mc\x17\xb4f\xb2\xeej)\xb4\xb5\xa8\x05\\f9v\x9e\xd8\x9fT\xf4\xafD\xbb\x96\xfe\xd2\f\xb1\x12\xe6\xa5n\x1e\x90r1G\x110\x99\x18\xee@\xb1F', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 445.351066][T13830] device bridge19 entered promiscuous mode 19:06:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0}}, 0x0) 19:06:46 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) [ 445.680883][T13834] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x416, &(0x7f0000000080)=[&(0x7f000001b000/0x2000)=nil, &(0x7f000001a000/0x1000)=nil], &(0x7f0000001380), &(0x7f0000000140), 0x0) 19:06:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 19:06:47 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:47 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 446.094227][T13848] device bridge20 entered promiscuous mode 19:06:47 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r0, &(0x7f00000010c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x3a) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x2, 0x808000, 0x4) 19:06:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) [ 446.392215][T13863] selinux_netlink_send: 67 callbacks suppressed [ 446.392267][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.422334][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.476324][T13861] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 446.513404][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.597663][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 19:06:47 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 446.656560][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.705603][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.734811][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 19:06:47 executing program 3: syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x0) r0 = syz_open_dev$usbfs(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x11, r0, 0x0) 19:06:47 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 446.751389][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.770971][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.794133][T13863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13863 comm=syz-executor.1 [ 446.895159][T13873] device bridge21 entered promiscuous mode 19:06:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) [ 447.085141][ T32] audit: type=1400 audit(1584212808.140:63): avc: denied { map } for pid=13877 comm="syz-executor.3" path="/dev/bus/usb/007/001" dev="devtmpfs" ino=17992 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 19:06:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:48 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:48 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:48 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x18, 0x4800000000000000}}], 0x1, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r1, &(0x7f0000005c00), 0x400000000000162, 0x0) 19:06:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:48 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 447.669244][T13893] device bridge22 entered promiscuous mode 19:06:48 executing program 3: 19:06:48 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 447.856771][ T88] tipc: TX() has been purged, node left! 19:06:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:49 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:06:49 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:49 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:49 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:49 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) [ 448.761896][T13911] device bridge23 entered promiscuous mode 19:06:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:50 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:50 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:06:50 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:50 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 449.671937][T13935] device bridge24 entered promiscuous mode 19:06:50 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) [ 450.710138][ T88] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 450.717941][ T88] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 450.732615][ T88] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 450.740380][ T88] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 450.785412][ T88] device bridge_slave_1 left promiscuous mode [ 450.792153][ T88] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.836226][ T88] device bridge_slave_0 left promiscuous mode [ 450.843095][ T88] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.875371][ T88] device veth1_macvtap left promiscuous mode [ 450.881464][ T88] device veth0_macvtap left promiscuous mode [ 450.887979][ T88] device veth1_vlan left promiscuous mode [ 450.894032][ T88] device veth0_vlan left promiscuous mode [ 450.978066][ T0] NOHZ: local_softirq_pending 08 [ 452.593872][ T88] device hsr_slave_0 left promiscuous mode [ 452.643225][ T88] device hsr_slave_1 left promiscuous mode [ 452.719710][ T88] team0 (unregistering): Port device team_slave_1 removed [ 452.736758][ T88] team0 (unregistering): Port device team_slave_0 removed [ 452.753830][ T88] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 452.813310][ T88] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 452.932709][ T88] bond0 (unregistering): Released all slaves [ 453.050938][T13961] IPVS: ftp: loaded support on port[0] = 21 [ 453.240401][T13961] chnl_net:caif_netlink_parms(): no params data found [ 453.427400][T13961] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.434892][T13961] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.444582][T13961] device bridge_slave_0 entered promiscuous mode [ 453.463881][T13961] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.471121][T13961] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.481232][T13961] device bridge_slave_1 entered promiscuous mode [ 453.555098][T13961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 453.579245][T13961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 453.613566][T13961] team0: Port device team_slave_0 added [ 453.626863][T13961] team0: Port device team_slave_1 added [ 453.658285][T13961] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 453.665607][T13961] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 453.691657][T13961] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 453.709341][T13961] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 453.716451][T13961] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 453.742590][T13961] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 453.848418][T13961] device hsr_slave_0 entered promiscuous mode [ 453.924385][T13961] device hsr_slave_1 entered promiscuous mode [ 453.963215][T13961] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 453.970858][T13961] Cannot create hsr debugfs directory [ 454.243438][T13961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 454.273527][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.281834][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.299356][T13961] 8021q: adding VLAN 0 to HW filter on device team0 [ 454.320229][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.329440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.338819][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.346136][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.364949][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 454.381467][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 454.392179][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 454.401653][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.408982][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.428655][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 454.463181][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 454.473621][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 454.483980][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 454.501998][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 454.513853][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 454.525058][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 454.545041][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 454.554777][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 454.579754][T13961] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 454.595276][T13961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 454.605427][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 454.615700][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 454.661479][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 454.669348][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 454.693194][T13961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 454.800489][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 454.810610][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 454.854681][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 454.864730][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.878956][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.889288][T11928] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 454.904156][T13961] device veth0_vlan entered promiscuous mode [ 454.929674][T13961] device veth1_vlan entered promiscuous mode [ 454.985428][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 454.995054][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 455.004513][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 455.014612][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 455.032025][T13961] device veth0_macvtap entered promiscuous mode [ 455.051757][T13961] device veth1_macvtap entered promiscuous mode [ 455.088369][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 455.099177][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.109136][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 455.119722][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.129744][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 455.140425][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.150473][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 455.161220][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.171230][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 455.182834][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.195466][T13961] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 455.204462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 455.214058][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 455.227660][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 455.237249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 455.261527][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 455.272181][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.284424][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 455.294999][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.305183][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 455.315769][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.325738][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 455.337203][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.347198][T13961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 455.357940][T13961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.370237][T13961] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 455.380498][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 455.390142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 455.897248][T13993] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:06:57 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) 19:06:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:57 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:06:57 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:57 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x80, 0x16, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x54, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc8}}, 0x0) [ 456.133320][T13997] device bridge25 entered promiscuous mode [ 456.227974][T14005] selinux_netlink_send: 54 callbacks suppressed [ 456.228022][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 19:06:57 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) [ 456.303657][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 19:06:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) [ 456.383846][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 19:06:57 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9", 0x21) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 456.443322][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 19:06:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) [ 456.513891][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 [ 456.604366][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 [ 456.677153][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 [ 456.750419][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 [ 456.784091][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 19:06:57 executing program 3: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) [ 456.831064][T14005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14005 comm=syz-executor.1 19:06:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 456.946454][T14022] device bridge26 entered promiscuous mode 19:06:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 19:06:58 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 457.094226][ T374] tipc: TX() has been purged, node left! 19:06:58 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:58 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:06:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) 19:06:58 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:06:58 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) [ 457.897326][T14043] device bridge27 entered promiscuous mode 19:06:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x78, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0xc0}}, 0x0) 19:06:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:06:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:06:59 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe2, 0x0) 19:06:59 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:06:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x78, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0xc0}}, 0x0) 19:06:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:07:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:07:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x78, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}], {0x14}}, 0xc0}}, 0x0) 19:07:00 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) [ 460.208166][T14092] IPVS: ftp: loaded support on port[0] = 21 [ 460.370580][ T374] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 460.379557][ T374] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 460.390112][ T374] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 460.398599][ T374] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 460.408936][ T374] device bridge_slave_1 left promiscuous mode [ 460.415683][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.454863][ T374] device bridge_slave_0 left promiscuous mode [ 460.461481][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.520930][ T374] device veth1_macvtap left promiscuous mode [ 460.527264][ T374] device veth0_macvtap left promiscuous mode [ 460.533531][ T374] device veth1_vlan left promiscuous mode [ 460.539430][ T374] device veth0_vlan left promiscuous mode [ 461.215773][ T0] NOHZ: local_softirq_pending 08 [ 461.220984][ T0] NOHZ: local_softirq_pending 08 [ 462.233720][ T374] device hsr_slave_0 left promiscuous mode [ 462.273094][ T374] device hsr_slave_1 left promiscuous mode [ 462.359449][ T374] team0 (unregistering): Port device team_slave_1 removed [ 462.379604][ T374] team0 (unregistering): Port device team_slave_0 removed [ 462.395609][ T374] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 462.433944][ T374] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 462.547045][ T374] bond0 (unregistering): Released all slaves [ 462.671717][T14092] chnl_net:caif_netlink_parms(): no params data found [ 462.818408][T14092] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.825969][T14092] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.835693][T14092] device bridge_slave_0 entered promiscuous mode [ 462.855611][T14092] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.863175][T14092] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.872705][T14092] device bridge_slave_1 entered promiscuous mode [ 462.936611][T14092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 462.980317][T14092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 463.041174][T14092] team0: Port device team_slave_0 added [ 463.056265][T14092] team0: Port device team_slave_1 added [ 463.100198][T14092] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 463.107359][T14092] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 463.134220][T14092] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 463.155310][T14092] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 463.162392][T14092] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 463.188527][T14092] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 463.268215][T14092] device hsr_slave_0 entered promiscuous mode [ 463.304131][T14092] device hsr_slave_1 entered promiscuous mode [ 463.345465][T14092] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 463.353257][T14092] Cannot create hsr debugfs directory [ 463.519755][T14092] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.526994][T14092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.535474][T14092] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.542673][T14092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.671841][T14092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 463.697299][T11835] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.706496][T11835] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.720716][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 463.745189][T14092] 8021q: adding VLAN 0 to HW filter on device team0 [ 463.754417][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 463.763359][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 463.786991][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 463.796532][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 463.805815][T11835] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.813096][T11835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.832527][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 463.842549][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 463.851876][T11741] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.859168][T11741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.880373][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 463.903669][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 463.923605][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 463.934375][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 463.957091][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 463.966206][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 463.976765][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 463.990915][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 464.001107][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 464.025728][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 464.034742][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 464.054063][T14092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 464.093194][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 464.100912][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 464.124971][T14092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 464.236623][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 464.246948][T11741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 464.292189][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 464.302095][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 464.314677][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 464.324285][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 464.339737][T14092] device veth0_vlan entered promiscuous mode [ 464.367049][T14092] device veth1_vlan entered promiscuous mode [ 464.423831][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 464.432652][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 464.442208][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 464.452081][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 464.469077][T14092] device veth0_macvtap entered promiscuous mode [ 464.488656][T14092] device veth1_macvtap entered promiscuous mode [ 464.530870][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 464.543115][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.553141][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 464.563691][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.573709][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 464.586356][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.596387][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 464.607171][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.617151][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 464.628067][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.640725][T14092] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 464.649009][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 464.658227][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 464.666970][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 464.676800][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 464.698381][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 464.709943][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.720058][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 464.731121][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.741331][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 464.751914][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.762948][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 464.773699][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.783714][T14092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 464.794320][T14092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.807415][T14092] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 464.816027][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 464.827374][T11835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 465.288085][T14124] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:07:06 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:07:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x78, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc0}}, 0x0) 19:07:06 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:07:06 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3], 0x2}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:07:06 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:07:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) 19:07:06 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:07:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x78, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc0}}, 0x0) 19:07:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x20}, 0x0) 19:07:07 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) 19:07:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x78, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x4c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xc0}}, 0x0) 19:07:07 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}}, 0x120) [ 466.441647][T14136] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 466.476721][T14136] selinux_netlink_send: 38 callbacks suppressed [ 466.476773][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.501230][T12018] tipc: TX() has been purged, node left! [ 466.518065][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.559441][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.653320][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.730078][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.786816][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.838303][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.876594][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.923389][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 [ 466.960431][T14136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14136 comm=syz-executor.1 19:07:08 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:07:08 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa8", 0x11) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:07:08 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:07:08 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3], 0x2}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:07:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x20}, 0x0) 19:07:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 19:07:08 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:07:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0x88}}, 0x0) [ 467.441563][T14177] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 19:07:08 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa8", 0x11) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:07:08 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:07:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x20}, 0x0) 19:07:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0x88}}, 0x0) 19:07:08 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x535ac68b0f51297d, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x2, 0x300) accept4(r0, &(0x7f00000002c0)=@tipc=@name, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)=ANY=[], 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x63, 0x3, 0x0, "f99861b833a89f1a4d328e5b170014ad", "848f9e677b5b5c5c66bece1af91ae0cd1498f45cec619e1f528dc468d2baeb6f0754205bd1ee9911957035cc3adb05834e42d4dcf884ebef5d4641161e0e78c87aec61405c0138457af2a4212908"}, 0x63, 0x0) socket(0x10, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 19:07:09 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r3], 0x2}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 19:07:09 executing program 4: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa8", 0x11) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 19:07:09 executing program 3: r0 = epoll_create1(0x0) r1 = socket(0x1, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)={0x6}) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$inet(0xa, 0x801, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x80001, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x11000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 19:07:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1405, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x6c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x40, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'sit0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0xb4}}, 0x0) 19:07:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) sendmsg$inet6(r0, &(0x7f00000028c0)={&(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f0000002880)=[@pktinfo={{0x20, 0x29, 0x32, {@ipv4={[], [], @local}, r3}}}], 0x20}, 0x0) [ 468.765903][T14208] ===================================================== [ 468.772923][T14208] BUG: KMSAN: uninit-value in nf_flow_table_offload_setup+0x964/0xac0 [ 468.781092][T14208] CPU: 1 PID: 14208 Comm: syz-executor.5 Not tainted 5.6.0-rc2-syzkaller #0 [ 468.789869][T14208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.799940][T14208] Call Trace: [ 468.803259][T14208] dump_stack+0x1c9/0x220 [ 468.807617][T14208] kmsan_report+0xf7/0x1e0 [ 468.812068][T14208] __msan_warning+0x58/0xa0 [ 468.816599][T14208] nf_flow_table_offload_setup+0x964/0xac0 [ 468.822446][T14208] ? nf_flow_rule_route_inet+0x1d0/0x1d0 [ 468.828107][T14208] ? nf_flow_table_offload_flush+0xa0/0xa0 [ 468.833936][T14208] nf_tables_newflowtable+0x233c/0x3e30 [ 468.839552][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 468.845380][T14208] ? nf_tables_delobj+0x1990/0x1990 [ 468.850633][T14208] nfnetlink_rcv+0x155e/0x3ab0 [ 468.855474][T14208] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 468.861556][T14208] ? netlink_deliver_tap+0xdb0/0xea0 [ 468.866863][T14208] ? __netlink_lookup+0x8b9/0x980 [ 468.871935][T14208] ? kmsan_set_origin_checked+0x95/0xf0 [ 468.877517][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 468.883347][T14208] netlink_unicast+0xf9e/0x1100 [ 468.888247][T14208] ? nfnetlink_net_exit_batch+0x280/0x280 [ 468.893992][T14208] netlink_sendmsg+0x1246/0x14d0 [ 468.898951][T14208] ? netlink_getsockopt+0x1440/0x1440 [ 468.904349][T14208] ____sys_sendmsg+0x12b6/0x1350 [ 468.909314][T14208] __sys_sendmsg+0x451/0x5f0 [ 468.914066][T14208] ? kmsan_get_metadata+0x11d/0x180 [ 468.919298][T14208] ? kmsan_get_metadata+0x11d/0x180 [ 468.924512][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 468.930337][T14208] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 468.936427][T14208] ? prepare_exit_to_usermode+0x1ca/0x520 [ 468.942147][T14208] ? kmsan_get_metadata+0x4f/0x180 [ 468.947495][T14208] ? kmsan_get_metadata+0x4f/0x180 [ 468.952616][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 468.958435][T14208] __ia32_compat_sys_sendmsg+0xed/0x130 [ 468.963996][T14208] ? compat_mc_getsockopt+0x19a0/0x19a0 [ 468.978325][T14208] do_fast_syscall_32+0x3c7/0x6e0 [ 468.983362][T14208] entry_SYSENTER_compat+0x68/0x77 [ 468.988997][T14208] RIP: 0023:0xf7f5dd99 [ 468.993082][T14208] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 469.022505][T14208] RSP: 002b:00000000f5d580cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 469.030914][T14208] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020003e00 [ 469.038876][T14208] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 469.046861][T14208] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 469.054852][T14208] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 469.062830][T14208] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 469.070813][T14208] [ 469.073130][T14208] Local variable ----bo@nf_flow_table_offload_setup created at: [ 469.080762][T14208] nf_flow_table_offload_setup+0xba/0xac0 [ 469.086695][T14208] nf_flow_table_offload_setup+0xba/0xac0 [ 469.092411][T14208] ===================================================== [ 469.099328][T14208] Disabling lock debugging due to kernel taint [ 469.105511][T14208] Kernel panic - not syncing: panic_on_warn set ... [ 469.112119][T14208] CPU: 1 PID: 14208 Comm: syz-executor.5 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 469.122194][T14208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.132254][T14208] Call Trace: [ 469.135552][T14208] dump_stack+0x1c9/0x220 [ 469.139904][T14208] panic+0x3d5/0xc3e [ 469.143830][T14208] kmsan_report+0x1df/0x1e0 [ 469.148340][T14208] __msan_warning+0x58/0xa0 [ 469.152854][T14208] nf_flow_table_offload_setup+0x964/0xac0 [ 469.158674][T14208] ? nf_flow_rule_route_inet+0x1d0/0x1d0 [ 469.164298][T14208] ? nf_flow_table_offload_flush+0xa0/0xa0 [ 469.170099][T14208] nf_tables_newflowtable+0x233c/0x3e30 [ 469.175673][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 469.181476][T14208] ? nf_tables_delobj+0x1990/0x1990 [ 469.186680][T14208] nfnetlink_rcv+0x155e/0x3ab0 [ 469.191482][T14208] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 469.197538][T14208] ? netlink_deliver_tap+0xdb0/0xea0 [ 469.203344][T14208] ? __netlink_lookup+0x8b9/0x980 [ 469.208378][T14208] ? kmsan_set_origin_checked+0x95/0xf0 [ 469.213934][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 469.219742][T14208] netlink_unicast+0xf9e/0x1100 [ 469.226504][T14208] ? nfnetlink_net_exit_batch+0x280/0x280 [ 469.232223][T14208] netlink_sendmsg+0x1246/0x14d0 [ 469.237203][T14208] ? netlink_getsockopt+0x1440/0x1440 [ 469.242565][T14208] ____sys_sendmsg+0x12b6/0x1350 [ 469.247515][T14208] __sys_sendmsg+0x451/0x5f0 [ 469.252134][T14208] ? kmsan_get_metadata+0x11d/0x180 [ 469.257325][T14208] ? kmsan_get_metadata+0x11d/0x180 [ 469.262527][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 469.268328][T14208] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 469.274390][T14208] ? prepare_exit_to_usermode+0x1ca/0x520 [ 469.280106][T14208] ? kmsan_get_metadata+0x4f/0x180 [ 469.285212][T14208] ? kmsan_get_metadata+0x4f/0x180 [ 469.290315][T14208] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 469.296116][T14208] __ia32_compat_sys_sendmsg+0xed/0x130 [ 469.301657][T14208] ? compat_mc_getsockopt+0x19a0/0x19a0 [ 469.307196][T14208] do_fast_syscall_32+0x3c7/0x6e0 [ 469.312227][T14208] entry_SYSENTER_compat+0x68/0x77 [ 469.317327][T14208] RIP: 0023:0xf7f5dd99 [ 469.321385][T14208] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 469.340984][T14208] RSP: 002b:00000000f5d580cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 469.349387][T14208] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020003e00 [ 469.358042][T14208] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 469.366001][T14208] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 469.374307][T14208] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 469.382274][T14208] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 469.391756][T14208] Kernel Offset: 0x11a00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 469.404785][T14208] Rebooting in 86400 seconds..