x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:12 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 12:43:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000040)={0x34}) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x1f, r2, 0x3, 0x3e) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 1219.309484] input: syz1 as /devices/virtual/input/input1161 12:43:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:12 executing program 0: prctl$PR_GET_ENDIAN(0x13, 0x0) ioctl$SIOCRSGL2CALL(0xffffffffffffffff, 0x89e5, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000004b40), 0x1e, &(0x7f0000004bc0)}, 0x2}], 0x19cbcb36e8172e, 0x5a) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000003c0)=@get={0x1, 0x0, 0x6}) 12:43:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000040)={0x8000, 0x14, [0x3, 0x3, 0x8, 0x507e, 0x80010000]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffef0}, 0x804) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x1f, 0x7) 12:43:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1219.651900] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1219.658960] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1219.672463] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1219.685268] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1219.695251] device bridge_slave_1 left promiscuous mode 12:43:12 executing program 5: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$addseals(r0, 0x409, 0x8) 12:43:12 executing program 0: ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001d40)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef7507020d447d9de49470d52bafd9c4361aad1970bfcb8129a6ef0ba57d7ef97a908829fd3354d6538094d26a9eacb2ae39233f0494050c730cdaee6d1639c8a46f7f20161953d41200205ebf8f117b054e35b249bdca000c81d6ddc903a3083406d3746b10dd8184a31d35194a085ea81f17fb6d4d5e38f35c4cba786884a3b3017e315c08f3c9f80b32e48420765b541b2ac4b93e41437bc36174974ec3aa2fd88df59fb261281a5d27a4b50f92af02f254ff31faf90e06a6eadcb3a2c32b93602761f605d79c233c4e9d3a80705c40b5ddcba24012a8f772a7b0eb9c64459d5542ad63d5d93ed38f69d8e24d7372a7176ef7f2673dff793142666f5eb1250aa87e390f2dbf5f492d19969046556d9298ec36c60fb64939f9635f482ee1531d2aa3bd9acaa772060ac6c6a13fd49059cc7d9c45c6b8e87ea32bdd1ecde70620928d97ea10256b3d86db053e5aa49c3d05ddb75429d04463fb147e09852d06693b68bdb35fae40b9ba433e2f7125050858b9da61dd96399c225c424c2ccd547636bb063473a7815d4cf929747860d5807166baf89e8fd7c7864f35548e538fec8acf6c88ed8cb821428c95f98eedbace40d968a8c002f717f27896b2cb0c848eeb530e7cabf5279ab6db8c8d1db068edf78842cf8fd21389b1e0cba8a0d5639e4c924b08666bfa69df3fa5a0e24004d2c5aae5ad5684054ab34c580febd3476281a4d395b4c3e44e0280f70204fb5c85257a47ce0db29eb7c8fa9971eedd57eaec5460a75cb9a95ca731fb1a0c605e715c374db4910eaf0c09b8c5d37da754121ea0eb69abf5e089ed1f7392df692b8aaa7ddd89f495c29a6df3140d0b603f1a1d7faf608ff1dbaa6bea8b39e90b979477ac4ed3c5da87266fc088667c8efc354b84e47831d84fed7c01e56bfc217f8253d1f8ce58fd92149b308eec10ca80127f101abac8d80e1fb0e98e14952daa0393a8823e7d95303e8f5ab35d7ee1ec6d201bd8ab06205cde4cc14df9447906c8568efe7269363d11fbd31e1706f9bc9184bbc8f5289262ff0e6b86c5015e720ff4032d536d463522fe145e1371780a0100010000000000b67b288b47c65ef8364383102c2d339925f27ed5a9881f7aa40982b6b4d76125c82cedd886cd34f54a3f3e84743d42f8b4a5999a0e1935d77f7a6d2c7449129afece0636929e5704b6bb4c2ab9b303f03d91968df461e5975d7a6adfc71549ed64b363f992e22283c3dd78ce6261161628937774dbed79c42bd2ef2aa5dc7a323a996fd6aeff3a8bca2577e831f1db77e789aa983f0c1de249679b60ac0975bcb954bbede81d851bdd1a0a7830962f5c6e4c5a88102171459862b07f4ca9f91f4ce7cb15b3bc2db2e95dacee55645d289b95c62920f506f65361aae1259dfe6e9108b5a9f72f4cefbf85539fff41ba76090907860c08c71a796d2133339eb0282bd9d09c93870b919c4a5423f6ded7cbfc661f74bebfc926"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) utime(0x0, 0x0) [ 1219.705351] bridge0: port 2(bridge_slave_1) entered disabled state [ 1219.775495] device bridge_slave_0 left promiscuous mode [ 1219.782593] bridge0: port 1(bridge_slave_0) entered disabled state 12:43:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1219.843577] device veth1_macvtap left promiscuous mode [ 1219.856438] device veth0_macvtap left promiscuous mode [ 1219.867561] device veth1_vlan left promiscuous mode [ 1219.883005] device veth0_vlan left promiscuous mode 12:43:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="ca", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003640)=[{0x10}], 0x10}}], 0x2, 0x0) [ 1220.206626] device hsr_slave_1 left promiscuous mode [ 1220.268192] device hsr_slave_0 left promiscuous mode [ 1220.340900] team0 (unregistering): Port device team_slave_1 removed [ 1220.369423] team0 (unregistering): Port device team_slave_0 removed [ 1220.394079] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1220.454309] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1220.531828] bond0 (unregistering): Released all slaves 12:43:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1222.370972] IPVS: ftp: loaded support on port[0] = 21 [ 1223.202019] IPVS: ftp: loaded support on port[0] = 21 [ 1223.264859] chnl_net:caif_netlink_parms(): no params data found [ 1223.318734] bridge0: port 1(bridge_slave_0) entered blocking state [ 1223.325266] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.332637] device bridge_slave_0 entered promiscuous mode [ 1223.339905] bridge0: port 2(bridge_slave_1) entered blocking state [ 1223.346776] bridge0: port 2(bridge_slave_1) entered disabled state [ 1223.354078] device bridge_slave_1 entered promiscuous mode [ 1223.402881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1223.415566] chnl_net:caif_netlink_parms(): no params data found [ 1223.425573] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1223.452485] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1223.459845] team0: Port device team_slave_0 added [ 1223.478842] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1223.486020] team0: Port device team_slave_1 added [ 1223.514832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1223.521301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1223.546566] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1223.556721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1223.563555] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.570735] device bridge_slave_0 entered promiscuous mode [ 1223.579741] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1223.586330] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1223.611734] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1223.621923] bridge0: port 2(bridge_slave_1) entered blocking state [ 1223.628271] bridge0: port 2(bridge_slave_1) entered disabled state [ 1223.638118] device bridge_slave_1 entered promiscuous mode [ 1223.644386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1223.658990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1223.723613] device hsr_slave_0 entered promiscuous mode [ 1223.760452] device hsr_slave_1 entered promiscuous mode [ 1223.812235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1223.820358] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1223.829337] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1223.844014] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1223.865722] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1223.873016] team0: Port device team_slave_0 added [ 1223.891391] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1223.898483] team0: Port device team_slave_1 added [ 1223.921546] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1223.927832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1223.954180] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1223.969775] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1223.976379] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1224.002004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1224.016336] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1224.034003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1224.103622] device hsr_slave_0 entered promiscuous mode [ 1224.140438] device hsr_slave_1 entered promiscuous mode [ 1224.184760] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1224.192367] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1224.209867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1224.216286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1224.223058] bridge0: port 1(bridge_slave_0) entered blocking state [ 1224.229407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1224.295883] bridge0: port 2(bridge_slave_1) entered blocking state [ 1224.302296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1224.308868] bridge0: port 1(bridge_slave_0) entered blocking state [ 1224.315253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1224.324726] bridge0: port 1(bridge_slave_0) entered disabled state [ 1224.331841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1224.339346] bridge0: port 1(bridge_slave_0) entered disabled state [ 1224.346464] bridge0: port 2(bridge_slave_1) entered disabled state [ 1224.365072] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1224.372637] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1224.380719] device bridge_slave_1 left promiscuous mode [ 1224.386183] bridge0: port 2(bridge_slave_1) entered disabled state [ 1224.431505] device bridge_slave_0 left promiscuous mode [ 1224.437069] bridge0: port 1(bridge_slave_0) entered disabled state [ 1224.552300] device hsr_slave_1 left promiscuous mode [ 1224.592636] device hsr_slave_0 left promiscuous mode [ 1224.637244] team0 (unregistering): Port device team_slave_1 removed [ 1224.647887] team0 (unregistering): Port device team_slave_0 removed [ 1224.656789] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1224.722888] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1224.780681] bond0 (unregistering): Released all slaves [ 1224.838025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1224.847291] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1224.857573] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1224.865843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1224.872849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1224.883910] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1224.889982] 8021q: adding VLAN 0 to HW filter on device team0 [ 1224.899764] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1224.907257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1224.915268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1224.922986] bridge0: port 1(bridge_slave_0) entered blocking state [ 1224.929331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1224.939845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1224.948583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1224.956724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1224.964955] bridge0: port 2(bridge_slave_1) entered blocking state [ 1224.971431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1224.981107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1224.988204] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1225.002308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1225.013867] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1225.021830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1225.032694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1225.042797] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1225.053140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1225.060293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1225.067390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1225.074504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1225.082458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1225.092453] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1225.098524] 8021q: adding VLAN 0 to HW filter on device team0 [ 1225.106410] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1225.162234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1225.170544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1225.178495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1225.187721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1225.194124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1225.202722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1225.211679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1225.221633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1225.229444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1225.238021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1225.246282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1225.259557] bridge0: port 2(bridge_slave_1) entered blocking state [ 1225.266098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1225.276374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1225.285271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1225.293443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1225.301187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1225.308763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1225.319770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1225.329902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1225.337983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1225.346426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1225.359209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1225.372035] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1225.378215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1225.393092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1225.400437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1225.408236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1225.425616] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1225.435774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1225.443655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1225.451402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1225.459227] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1225.473484] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1225.482936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1225.494821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1225.502155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1225.509113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1225.523622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1225.536046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1225.545275] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1225.559815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1225.574058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1225.586074] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1225.593514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1225.620779] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1225.628756] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1225.645297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1225.653748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1225.666214] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1225.815335] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1225.833521] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1225.852594] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1225.859693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1225.873809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1225.887097] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1225.906059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1225.918093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1225.971923] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1225.979089] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1225.987300] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1225.998831] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1226.007170] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1226.014457] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1226.024295] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1226.034774] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1226.046408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1226.060852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1226.068413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1226.076285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1226.083903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1226.091827] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1226.098871] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1226.105898] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1226.115478] device veth0_vlan entered promiscuous mode [ 1226.125223] device veth0_vlan entered promiscuous mode [ 1226.135049] device veth1_vlan entered promiscuous mode [ 1226.141126] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1226.152833] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1226.162050] device veth1_vlan entered promiscuous mode [ 1226.167829] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1226.181018] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1226.189643] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1226.198223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1226.208232] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1226.215507] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1226.223857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1226.232594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1226.242293] device veth0_macvtap entered promiscuous mode [ 1226.248312] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1226.257317] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1226.269049] device veth1_macvtap entered promiscuous mode [ 1226.276785] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1226.287860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1226.298022] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1226.308769] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1226.327028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1226.334838] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1226.350593] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1226.358104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1226.366320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1226.374008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1226.384763] device veth0_macvtap entered promiscuous mode [ 1226.392019] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1226.400615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.411313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.420599] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.430549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.439795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.449728] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.459634] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.469654] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.480675] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1226.488057] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1226.499327] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1226.507574] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1226.515428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1226.523785] device veth1_macvtap entered promiscuous mode [ 1226.532546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.544291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.553748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.564602] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.576255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.586639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.596176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.606104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.616175] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1226.623541] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1226.637204] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1226.644772] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1226.654311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1226.667098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1226.676733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.687190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.697181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.706939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.716603] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.727179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.736523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.746331] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.755797] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1226.765761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.776780] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1226.783974] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1226.794284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1226.802785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1226.813873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.835095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.844971] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.855354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.864650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.874554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.884438] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.894378] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.904267] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1226.914064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1226.924598] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1226.931726] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1226.943087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1226.951764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1227.192427] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.199086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.336376] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1227.348284] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:43:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) 12:43:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x40000, 0x0) write$input_event(r3, &(0x7f0000000200)={{0x77359400}, 0x11, 0x7, 0x7}, 0x18) write$fb(r2, &(0x7f0000000100)="641513edae692ccac81cdbd07dbc5980e44cc9354f6e3b6ac9adebbdbcee1f2dc3dc02d7044d8f77d38e4646bddcf0ff0c4ca5612699d342ef02f5250cae22596f6bfbafea0fa83dd18e14f9bfe3e7bd5e96ad0ea009c251e7732d4056af32c090dcbdb1c022", 0x66) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$cont(0x9, r4, 0x2, 0x9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1228.207344] audit: type=1804 audit(1579437801.076:19618): pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/134/file0" dev="sda1" ino=16785 res=1 [ 1228.208167] Process accounting resumed 12:43:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) [ 1228.258476] Process accounting resumed [ 1228.267739] Process accounting resumed [ 1228.275238] audit: type=1804 audit(1579437801.076:19619): pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/134/file0" dev="sda1" ino=16785 res=1 12:43:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000000)={[0xf000, 0x6000, 0x2, 0xd000], 0x6fa, 0x2c, 0x6}) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:43:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1228.352985] Process accounting resumed [ 1228.368182] audit: type=1804 audit(1579437801.126:19620): pid=1196 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/134/file0" dev="sda1" ino=16785 res=1 [ 1228.447674] Process accounting resumed [ 1228.464418] Process accounting resumed 12:43:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000200)={'bond_slave_0\x00', 0x6, 0x44d}) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1228.483489] audit: type=1804 audit(1579437801.126:19621): pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/134/file0" dev="sda1" ino=16785 res=1 12:43:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1228.592911] Process accounting resumed 12:43:21 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) socket$kcm(0x10, 0x0, 0x10) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) [ 1228.615346] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1228.642443] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1228.652787] input: syz1 as /devices/virtual/input/input1163 [ 1228.662593] audit: type=1804 audit(1579437801.136:19622): pid=1196 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/134/file0" dev="sda1" ino=16785 res=1 [ 1228.700802] Process accounting resumed [ 1228.717917] device bridge_slave_1 left promiscuous mode [ 1228.733240] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.742164] audit: type=1804 audit(1579437801.316:19623): pid=1208 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/135/file0" dev="sda1" ino=16732 res=1 [ 1228.771549] audit: type=1804 audit(1579437801.316:19624): pid=1208 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/135/file0" dev="sda1" ino=16732 res=1 [ 1228.798670] audit: type=1804 audit(1579437801.456:19625): pid=1221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/136/file0" dev="sda1" ino=16865 res=1 [ 1228.825683] audit: type=1804 audit(1579437801.466:19626): pid=1221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/136/file0" dev="sda1" ino=16865 res=1 [ 1228.853359] device bridge_slave_0 left promiscuous mode [ 1228.858973] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.914100] input: syz1 as /devices/virtual/input/input1164 [ 1229.023266] device hsr_slave_1 left promiscuous mode [ 1229.063889] device hsr_slave_0 left promiscuous mode [ 1229.111917] team0 (unregistering): Port device team_slave_1 removed [ 1229.123271] team0 (unregistering): Port device team_slave_0 removed [ 1229.135368] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1229.186361] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1229.312573] bond0 (unregistering): Released all slaves [ 1231.091370] IPVS: ftp: loaded support on port[0] = 21 12:43:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1231.873303] IPVS: ftp: loaded support on port[0] = 21 [ 1231.942804] chnl_net:caif_netlink_parms(): no params data found [ 1232.000951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1232.007559] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.014785] device bridge_slave_0 entered promiscuous mode [ 1232.031915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1232.038414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.049464] device bridge_slave_1 entered promiscuous mode [ 1232.113505] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1232.123475] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1232.141848] chnl_net:caif_netlink_parms(): no params data found [ 1232.166838] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1232.174168] team0: Port device team_slave_0 added [ 1232.187273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1232.194725] team0: Port device team_slave_1 added [ 1232.230811] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1232.237292] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1232.262820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1232.272912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1232.279511] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.286972] device bridge_slave_0 entered promiscuous mode [ 1232.294248] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1232.303307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1232.329765] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1232.341940] bridge0: port 2(bridge_slave_1) entered blocking state [ 1232.348392] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.357033] device bridge_slave_1 entered promiscuous mode [ 1232.366210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1232.374109] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1232.403122] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1232.412864] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1232.462296] device hsr_slave_0 entered promiscuous mode [ 1232.500401] device hsr_slave_1 entered promiscuous mode [ 1232.548054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1232.561469] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1232.568684] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1232.576446] team0: Port device team_slave_0 added [ 1232.586752] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1232.594077] team0: Port device team_slave_1 added [ 1232.627664] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1232.634357] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1232.660344] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1232.677093] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1232.683457] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1232.708701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1232.722559] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1232.736243] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1232.802543] device hsr_slave_0 entered promiscuous mode [ 1232.860432] device hsr_slave_1 entered promiscuous mode [ 1232.919633] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1232.930884] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1232.976686] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1233.005439] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1233.012542] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1233.019991] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1233.027015] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1233.036559] device bridge_slave_1 left promiscuous mode [ 1233.042159] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.080697] device bridge_slave_0 left promiscuous mode [ 1233.086438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.142187] device veth1_macvtap left promiscuous mode [ 1233.147526] device veth0_macvtap left promiscuous mode [ 1233.153003] device veth1_vlan left promiscuous mode [ 1233.158174] device veth0_vlan left promiscuous mode [ 1233.273391] device hsr_slave_1 left promiscuous mode [ 1233.332979] device hsr_slave_0 left promiscuous mode [ 1233.378796] team0 (unregistering): Port device team_slave_1 removed [ 1233.389551] team0 (unregistering): Port device team_slave_0 removed [ 1233.398591] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1233.433666] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1233.510122] bond0 (unregistering): Released all slaves [ 1233.569490] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1233.607647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1233.616956] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1233.626334] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1233.634867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1233.642285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1233.654014] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1233.660347] 8021q: adding VLAN 0 to HW filter on device team0 [ 1233.670707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1233.680863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1233.688646] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1233.697003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.703430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1233.713540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1233.719730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1233.728673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1233.737629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1233.745493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1233.755909] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.762441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1233.812848] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1233.827729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1233.835750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1233.851281] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1233.865675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1233.873903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1233.885643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1233.893788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1233.908869] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1233.916296] 8021q: adding VLAN 0 to HW filter on device team0 [ 1233.931437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1233.938971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1233.952607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1233.966265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1233.977628] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1233.988441] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1233.997617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1234.009185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1234.018674] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.025087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1234.032853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1234.040914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1234.051335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1234.062661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1234.078677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1234.086270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1234.098692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1234.106823] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.113234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1234.125281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1234.133049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1234.147112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1234.156758] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1234.168861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1234.176865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1234.188821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1234.199303] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1234.222428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1234.232060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1234.246172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1234.268155] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1234.278602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1234.289874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1234.298079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1234.308346] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1234.317283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1234.325443] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1234.333494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1234.340421] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1234.347182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1234.355305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1234.368216] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1234.377731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1234.385223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1234.395901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1234.416099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1234.426167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1234.443228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1234.458220] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1234.467608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1234.504726] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1234.524362] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1234.534768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1234.545102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1234.560872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1234.647027] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1234.659568] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1234.669065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1234.677981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1234.696369] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1234.706924] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1234.718150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1234.728143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1234.762127] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1234.769290] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1234.785461] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1234.798584] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1234.812476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1234.820485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1234.827867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1234.835126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1234.846835] device veth0_vlan entered promiscuous mode [ 1234.857401] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1234.865200] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1234.872874] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1234.882073] device veth1_vlan entered promiscuous mode [ 1234.887850] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1234.897820] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1234.905775] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1234.913487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1234.921175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1234.929734] device veth0_vlan entered promiscuous mode [ 1234.946299] device veth1_vlan entered promiscuous mode [ 1234.952525] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1234.959025] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1234.966277] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1234.973343] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1234.989754] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1235.001370] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1235.014872] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1235.022090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1235.031231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1235.041048] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1235.049903] device veth0_macvtap entered promiscuous mode [ 1235.058531] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1235.066063] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1235.073775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1235.081730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1235.090566] device veth0_macvtap entered promiscuous mode [ 1235.096586] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1235.105113] device veth1_macvtap entered promiscuous mode [ 1235.119782] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1235.129550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1235.139000] device veth1_macvtap entered promiscuous mode [ 1235.146074] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1235.157209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1235.171063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1235.178308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.188267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.197679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.209008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.219749] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.230159] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.239403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.249461] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.259948] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1235.267430] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1235.279822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1235.291782] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.301607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.311816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.322339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.332263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.342009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.351589] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.361571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.371183] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1235.380931] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.391859] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1235.398851] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1235.407650] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1235.417246] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1235.424608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1235.432106] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1235.440391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1235.448238] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1235.456227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1235.466523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.477152] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.486391] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.496160] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.505511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.515569] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.525019] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.535150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.546282] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1235.553823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1235.562971] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.573533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.582873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.593391] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.602629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.612392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.621557] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.631435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.640624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1235.650473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1235.660947] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1235.667917] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1235.675665] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1235.685969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1235.694200] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1235.702730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1236.396282] bridge0: port 2(bridge_slave_1) entered disabled state [ 1236.402988] bridge0: port 1(bridge_slave_0) entered disabled state [ 1236.459953] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1236.469603] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:43:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) dup2(r2, r0) 12:43:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e22, 0x0, @loopback, 0x5}, {0xa, 0x4e22, 0x6, @mcast1, 0xffffffc1}, 0x7, [0x9, 0x1, 0x8, 0x3, 0x4, 0x1000, 0x87d9]}, 0x5c) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:29 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x62, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb4181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0xfffffc96, 0x200007fe, &(0x7f0000000180)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0xfffffffffffffed7) [ 1237.064295] audit: type=1804 audit(1579437809.936:19627): pid=1306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/137/file0" dev="sda1" ino=17057 res=1 [ 1237.096167] Process accounting resumed 12:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000100)='./file0\x00') [ 1237.105855] audit: type=1804 audit(1579437809.966:19628): pid=1306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/137/file0" dev="sda1" ino=17057 res=1 [ 1237.138049] Process accounting resumed 12:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000100)='./file0\x00') [ 1237.156875] audit: type=1804 audit(1579437810.026:19629): pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/138/file0" dev="sda1" ino=17089 res=1 [ 1237.169816] Process accounting resumed [ 1237.214733] audit: type=1804 audit(1579437810.086:19630): pid=1326 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/139/file0" dev="sda1" ino=17073 res=1 [ 1237.223650] Process accounting resumed 12:43:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd839"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000100)='./file0\x00') 12:43:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:30 executing program 5: 12:43:30 executing program 5: 12:43:30 executing program 5: [ 1237.379352] audit: type=1804 audit(1579437810.246:19631): pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/140/file0" dev="sda1" ino=16721 res=1 [ 1237.404452] Process accounting resumed [ 1237.942013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1237.949510] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1237.957227] device bridge_slave_1 left promiscuous mode [ 1237.962982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.011024] device bridge_slave_0 left promiscuous mode [ 1238.016691] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.144233] device hsr_slave_1 left promiscuous mode [ 1238.204440] device hsr_slave_0 left promiscuous mode [ 1238.258313] team0 (unregistering): Port device team_slave_1 removed [ 1238.269676] team0 (unregistering): Port device team_slave_0 removed [ 1238.279431] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1238.343349] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1238.412966] bond0 (unregistering): Released all slaves 12:43:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) ptrace$setopts(0x4206, r0, 0x40000000, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:32 executing program 5: 12:43:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x7, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x661, 0x0) [ 1240.261294] IPVS: ftp: loaded support on port[0] = 21 [ 1241.047980] chnl_net:caif_netlink_parms(): no params data found [ 1241.089322] bridge0: port 1(bridge_slave_0) entered blocking state [ 1241.096015] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.103719] device bridge_slave_0 entered promiscuous mode [ 1241.111105] bridge0: port 2(bridge_slave_1) entered blocking state [ 1241.117500] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.124661] device bridge_slave_1 entered promiscuous mode [ 1241.147218] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1241.156761] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1241.174431] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1241.181654] team0: Port device team_slave_0 added [ 1241.187314] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1241.195166] team0: Port device team_slave_1 added [ 1241.214085] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1241.220421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1241.245707] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1241.256663] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1241.263011] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1241.288262] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1241.303046] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1241.310762] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1241.372113] device hsr_slave_0 entered promiscuous mode [ 1241.410405] device hsr_slave_1 entered promiscuous mode [ 1241.454351] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1241.461936] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1241.536405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1241.542839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1241.549477] bridge0: port 1(bridge_slave_0) entered blocking state [ 1241.555897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1241.591603] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1241.597802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1241.605983] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1241.618381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1241.625399] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.632546] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.643220] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1241.649292] 8021q: adding VLAN 0 to HW filter on device team0 [ 1241.662007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1241.669548] bridge0: port 1(bridge_slave_0) entered blocking state [ 1241.676054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1241.684710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1241.692697] bridge0: port 2(bridge_slave_1) entered blocking state [ 1241.699635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1241.718760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1241.726995] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1241.736485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1241.748698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1241.758624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1241.771400] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1241.777448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1241.786870] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1241.794163] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1241.802899] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1241.809619] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1241.817416] device bridge_slave_1 left promiscuous mode [ 1241.823261] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.860705] device bridge_slave_0 left promiscuous mode [ 1241.866216] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.922910] device veth1_macvtap left promiscuous mode [ 1241.928238] device veth0_macvtap left promiscuous mode [ 1241.933677] device veth1_vlan left promiscuous mode [ 1241.938732] device veth0_vlan left promiscuous mode [ 1242.063743] device hsr_slave_1 left promiscuous mode [ 1242.104169] device hsr_slave_0 left promiscuous mode [ 1242.169186] team0 (unregistering): Port device team_slave_1 removed [ 1242.178690] team0 (unregistering): Port device team_slave_0 removed [ 1242.188793] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1242.233715] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1242.289333] bond0 (unregistering): Released all slaves [ 1242.319829] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1242.327019] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1242.335700] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1242.345835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1242.353414] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1242.363390] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1242.431013] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1242.442890] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1242.449975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1242.458347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1242.551998] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1242.559737] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1242.571894] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1242.584845] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1242.593510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1242.605261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1242.616201] device veth0_vlan entered promiscuous mode [ 1242.626597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1242.635969] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1242.649177] device veth1_vlan entered promiscuous mode [ 1242.657350] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1242.672125] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1242.688904] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1242.705224] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1242.714915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1242.727589] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1242.736494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1242.747007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1242.759188] device veth0_macvtap entered promiscuous mode [ 1242.768715] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1242.783641] device veth1_macvtap entered promiscuous mode [ 1242.789980] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1242.805123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1242.817443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1242.832412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1242.844690] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.855950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1242.868022] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.879067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1242.892907] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.902837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1242.915789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.926978] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1242.937705] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1242.948533] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1242.961171] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1242.968805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1242.981265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1242.991521] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1243.006894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.016505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1243.031911] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.044020] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1243.054845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.066917] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1243.077735] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1243.092049] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1243.098982] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1243.109591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1243.126413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1244.280947] IPVS: ftp: loaded support on port[0] = 21 [ 1244.484232] bridge0: port 2(bridge_slave_1) entered disabled state [ 1244.491221] bridge0: port 1(bridge_slave_0) entered disabled state [ 1244.545855] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1244.555061] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:43:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:38 executing program 5: 12:43:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x64868000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10440, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)=0x4) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:38 executing program 5: 12:43:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1245.205635] audit: type=1804 audit(1579437818.076:19632): pid=1402 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/144/file0" dev="sda1" ino=16763 res=1 [ 1245.240574] Process accounting resumed [ 1245.256101] Process accounting resumed [ 1245.261327] audit: type=1804 audit(1579437818.106:19633): pid=1402 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/144/file0" dev="sda1" ino=16763 res=1 [ 1245.339811] chnl_net:caif_netlink_parms(): no params data found [ 1245.415561] bridge0: port 1(bridge_slave_0) entered blocking state [ 1245.422085] bridge0: port 1(bridge_slave_0) entered disabled state [ 1245.429031] device bridge_slave_0 entered promiscuous mode [ 1245.435911] bridge0: port 2(bridge_slave_1) entered blocking state [ 1245.442415] bridge0: port 2(bridge_slave_1) entered disabled state [ 1245.449472] device bridge_slave_1 entered promiscuous mode [ 1245.470424] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1245.479339] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1245.498074] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1245.505401] team0: Port device team_slave_0 added [ 1245.512710] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1245.519809] team0: Port device team_slave_1 added [ 1245.536293] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1245.542682] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1245.568275] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1245.583320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1245.589569] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1245.614907] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1245.625742] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1245.633308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1245.702154] device hsr_slave_0 entered promiscuous mode [ 1245.760393] device hsr_slave_1 entered promiscuous mode [ 1245.814033] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1245.823091] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1245.881352] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1245.912363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1245.920935] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1245.929504] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1245.936941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1245.944116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1245.955654] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1245.962083] 8021q: adding VLAN 0 to HW filter on device team0 [ 1245.970479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1245.977513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1245.985559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1245.993658] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.000187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.009398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1246.018204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1246.025407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1246.033651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1246.041427] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.047783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.056988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1246.064016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1246.074698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1246.082518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1246.092571] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1246.099994] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1246.108688] device bridge_slave_1 left promiscuous mode [ 1246.114282] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.152149] device bridge_slave_0 left promiscuous mode [ 1246.157743] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.263920] device hsr_slave_1 left promiscuous mode [ 1246.323932] device hsr_slave_0 left promiscuous mode [ 1246.367793] team0 (unregistering): Port device team_slave_1 removed [ 1246.378238] team0 (unregistering): Port device team_slave_0 removed [ 1246.387574] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1246.433077] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1246.509706] bond0 (unregistering): Released all slaves [ 1246.558608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1246.566292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1246.574258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1246.582167] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1246.592540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1246.599475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1246.607805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1246.617511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1246.627977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1246.635602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1246.643323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1246.651314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1246.658835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1246.668561] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1246.675174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1246.688239] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1246.696538] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1246.703105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1246.709978] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1246.722663] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1246.852202] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1246.867176] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1246.875842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1246.888372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1246.947676] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1246.961517] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1246.968272] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1246.983882] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1246.993521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1247.003014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1247.016064] device veth0_vlan entered promiscuous mode [ 1247.023808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1247.034411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1247.047505] device veth1_vlan entered promiscuous mode [ 1247.057743] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1247.069678] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1247.089554] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1247.105418] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1247.115831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1247.126104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1247.135978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1247.146030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1247.158567] device veth0_macvtap entered promiscuous mode [ 1247.167636] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1247.180060] device veth1_macvtap entered promiscuous mode [ 1247.188567] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1247.205354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1247.218763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1247.230772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1247.244925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.254608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1247.268402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.279900] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1247.293719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.302890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1247.316553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.327234] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1247.338437] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1247.348918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1247.361943] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1247.369201] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1247.380610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1247.390982] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.401420] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.415312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.425407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.439194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.449449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.462692] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1247.473905] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1247.487795] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1247.495649] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1247.506171] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1247.515214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:43:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:42 executing program 5: 12:43:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0xfffffffffffffd2a}, 0x884) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:42 executing program 5: [ 1249.334285] audit: type=1804 audit(1579437822.206:19634): pid=1448 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/145/file0" dev="sda1" ino=16691 res=1 [ 1249.376326] Process accounting resumed 12:43:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:42 executing program 5: 12:43:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1249.422368] Process accounting resumed 12:43:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:42 executing program 5: [ 1249.473572] audit: type=1804 audit(1579437822.246:19635): pid=1448 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/145/file0" dev="sda1" ino=16691 res=1 [ 1249.489572] Process accounting resumed 12:43:42 executing program 5: 12:43:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1249.580190] audit: type=1804 audit(1579437822.346:19636): pid=1462 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/146/file0" dev="sda1" ino=16770 res=1 [ 1249.612556] Process accounting resumed [ 1249.660171] audit: type=1804 audit(1579437822.346:19637): pid=1462 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/146/file0" dev="sda1" ino=16770 res=1 [ 1250.295427] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1250.314092] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1250.335663] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1250.343189] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1250.355163] device bridge_slave_1 left promiscuous mode [ 1250.360723] bridge0: port 2(bridge_slave_1) entered disabled state [ 1250.410931] device bridge_slave_0 left promiscuous mode [ 1250.416765] bridge0: port 1(bridge_slave_0) entered disabled state [ 1250.473368] device veth1_macvtap left promiscuous mode [ 1250.478996] device veth0_macvtap left promiscuous mode [ 1250.484777] device veth1_vlan left promiscuous mode [ 1250.490294] device veth0_vlan left promiscuous mode [ 1250.602904] device hsr_slave_1 left promiscuous mode [ 1250.642950] device hsr_slave_0 left promiscuous mode [ 1250.687656] team0 (unregistering): Port device team_slave_1 removed [ 1250.698668] team0 (unregistering): Port device team_slave_0 removed [ 1250.707720] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1250.753051] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1250.812328] bond0 (unregistering): Released all slaves 12:43:45 executing program 5: 12:43:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '}em1\x00'}, &(0x7f0000000080)='trustedwlan1{#\x00', 0xf, 0x1) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1252.600928] IPVS: ftp: loaded support on port[0] = 21 [ 1253.352435] IPVS: ftp: loaded support on port[0] = 21 [ 1253.422781] chnl_net:caif_netlink_parms(): no params data found [ 1253.482265] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.488711] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.496315] device bridge_slave_0 entered promiscuous mode [ 1253.523881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.530425] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.537565] device bridge_slave_1 entered promiscuous mode [ 1253.570806] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1253.578814] chnl_net:caif_netlink_parms(): no params data found [ 1253.587989] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1253.614389] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1253.621800] team0: Port device team_slave_0 added [ 1253.627757] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1253.635425] team0: Port device team_slave_1 added [ 1253.666572] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1253.673104] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1253.700511] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1253.712422] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1253.718769] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1253.744054] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1253.758683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1253.766212] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.773040] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.780270] device bridge_slave_0 entered promiscuous mode [ 1253.787057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1253.805499] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.812304] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.819502] device bridge_slave_1 entered promiscuous mode [ 1253.883877] device hsr_slave_0 entered promiscuous mode [ 1253.950394] device hsr_slave_1 entered promiscuous mode [ 1254.005875] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1254.013835] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1254.022000] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1254.037318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1254.056904] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1254.064963] team0: Port device team_slave_0 added [ 1254.071006] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1254.078524] team0: Port device team_slave_1 added [ 1254.105112] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1254.112010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1254.138021] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1254.156703] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1254.163517] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1254.192166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1254.205868] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1254.217628] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1254.302263] device hsr_slave_0 entered promiscuous mode [ 1254.340301] device hsr_slave_1 entered promiscuous mode [ 1254.380930] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1254.388581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1254.412890] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.419381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.426578] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.433278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.479858] bridge0: port 1(bridge_slave_0) entered disabled state [ 1254.489430] bridge0: port 2(bridge_slave_1) entered disabled state [ 1254.518325] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1254.539957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1254.549924] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1254.565527] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1254.572812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1254.579968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1254.592816] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1254.599920] 8021q: adding VLAN 0 to HW filter on device team0 [ 1254.610508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1254.619486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1254.627848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1254.636232] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.642632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.651625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1254.661173] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1254.669077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1254.677359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1254.685161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.691617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.698828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1254.712598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1254.722971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1254.732316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1254.741380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1254.750762] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1254.759456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1254.766682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1254.774822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1254.782601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1254.790614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1254.798363] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1254.808387] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1254.815589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1254.822643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1254.829802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1254.837578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1254.845299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1254.856125] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1254.863162] 8021q: adding VLAN 0 to HW filter on device team0 [ 1254.870763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1254.878256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1254.885921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1254.896249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1254.906529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1254.914465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1254.922172] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.928513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.936083] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1254.943867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1254.951752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1254.967114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1254.976353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1254.984854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1254.992586] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.998944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1255.006438] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1255.014626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1255.026509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1255.034096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1255.042049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1255.051514] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1255.059136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1255.066116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1255.075196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1255.082855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1255.090647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1255.098305] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1255.109331] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1255.119412] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1255.126981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1255.135177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1255.145987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1255.153793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1255.162620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1255.175111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1255.182821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1255.191439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1255.201538] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1255.207613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1255.224550] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1255.233747] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1255.240413] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1255.247186] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1255.259374] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1255.269378] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1255.284795] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1255.293015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1255.301820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1255.366675] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1255.374214] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1255.381682] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1255.391810] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1255.400668] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1255.409882] device veth0_vlan entered promiscuous mode [ 1255.416668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1255.424085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1255.434538] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1255.446245] device veth1_vlan entered promiscuous mode [ 1255.452998] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1255.459605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1255.466914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1255.474283] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1255.481924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1255.489762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1255.516122] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1255.527918] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1255.535161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1255.543250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1255.554533] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1255.562329] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1255.568934] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1255.575874] device veth0_macvtap entered promiscuous mode [ 1255.583279] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1255.593698] device veth1_macvtap entered promiscuous mode [ 1255.600528] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1255.610099] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1255.618024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1255.625493] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1255.633291] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1255.640719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1255.648074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1255.656455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1255.663697] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1255.675937] device veth0_vlan entered promiscuous mode [ 1255.684386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1255.695527] device veth1_vlan entered promiscuous mode [ 1255.702318] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1255.711588] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1255.721699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.731151] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1255.740937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.750759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1255.760675] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.769909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1255.780459] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.790865] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1255.797892] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1255.808259] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1255.819422] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1255.826817] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1255.834597] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1255.842622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1255.852159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1255.862365] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.871948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1255.882592] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.892015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1255.901790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.911973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1255.921934] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1255.932603] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1255.939710] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1255.947905] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1255.957031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1255.968804] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1255.982924] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1255.992681] device veth0_macvtap entered promiscuous mode [ 1255.998713] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1256.005724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1256.014216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1256.022280] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1256.032204] device veth1_macvtap entered promiscuous mode [ 1256.038384] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1256.048828] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1256.059822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1256.073765] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1256.083961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.093270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1256.103053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.112449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1256.122692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.131984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1256.142195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.151786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1256.162474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.172824] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1256.179801] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1256.188833] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1256.196727] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1256.204866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1256.214951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1256.225140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.234805] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1256.244829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.254326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1256.264195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.274096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1256.283925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.293125] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1256.303979] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1256.314439] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1256.321551] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1256.329020] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1256.338867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1256.705509] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.712224] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.765421] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1256.776853] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:43:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:50 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:50 executing program 5: 12:43:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:50 executing program 5: [ 1257.361913] audit: type=1804 audit(1579437830.236:19638): pid=1561 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/147/file0" dev="sda1" ino=16993 res=1 [ 1257.392708] Process accounting resumed [ 1257.408054] Process accounting resumed 12:43:50 executing program 5: 12:43:50 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1257.412370] audit: type=1804 audit(1579437830.266:19639): pid=1561 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/147/file0" dev="sda1" ino=16993 res=1 12:43:50 executing program 5: [ 1257.457565] audit: type=1804 audit(1579437830.326:19640): pid=1571 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/148/file0" dev="sda1" ino=16977 res=1 [ 1257.500807] Process accounting resumed [ 1257.518614] Process accounting resumed [ 1257.523509] audit: type=1804 audit(1579437830.376:19641): pid=1571 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/148/file0" dev="sda1" ino=16977 res=1 12:43:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:50 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:50 executing program 5: 12:43:50 executing program 5: [ 1257.691039] audit: type=1804 audit(1579437830.566:19642): pid=1577 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/149/file0" dev="sda1" ino=16755 res=1 [ 1257.693212] Process accounting resumed 12:43:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1257.758691] Process accounting resumed [ 1257.766854] audit: type=1804 audit(1579437830.566:19643): pid=1577 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/149/file0" dev="sda1" ino=16755 res=1 [ 1257.819639] audit: type=1804 audit(1579437830.686:19644): pid=1583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/150/file0" dev="sda1" ino=16849 res=1 [ 1257.855736] Process accounting resumed [ 1257.883535] Process accounting resumed [ 1257.907275] audit: type=1804 audit(1579437830.726:19645): pid=1583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/150/file0" dev="sda1" ino=16849 res=1 [ 1258.302093] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1258.309757] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1258.318247] device bridge_slave_1 left promiscuous mode [ 1258.323906] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.391008] device bridge_slave_0 left promiscuous mode [ 1258.396749] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.532691] device hsr_slave_1 left promiscuous mode [ 1258.583033] device hsr_slave_0 left promiscuous mode [ 1258.640782] team0 (unregistering): Port device team_slave_1 removed [ 1258.651238] team0 (unregistering): Port device team_slave_0 removed [ 1258.661141] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1258.695150] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1258.765009] bond0 (unregistering): Released all slaves 12:43:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:53 executing program 5: 12:43:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x460001, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r1, 0x4148, 0x0) 12:43:53 executing program 5: [ 1260.402898] audit: type=1804 audit(1579437833.276:19646): pid=1590 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/151/file0" dev="sda1" ino=16791 res=1 [ 1260.438161] Process accounting resumed 12:43:53 executing program 5: [ 1260.473995] Process accounting resumed [ 1260.497857] audit: type=1804 audit(1579437833.306:19647): pid=1590 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/151/file0" dev="sda1" ino=16791 res=1 [ 1260.601327] IPVS: ftp: loaded support on port[0] = 21 [ 1261.455463] chnl_net:caif_netlink_parms(): no params data found [ 1261.498853] bridge0: port 1(bridge_slave_0) entered blocking state [ 1261.506149] bridge0: port 1(bridge_slave_0) entered disabled state [ 1261.513244] device bridge_slave_0 entered promiscuous mode [ 1261.520605] bridge0: port 2(bridge_slave_1) entered blocking state [ 1261.526987] bridge0: port 2(bridge_slave_1) entered disabled state [ 1261.534091] device bridge_slave_1 entered promiscuous mode [ 1261.557529] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1261.567289] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1261.589611] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1261.597256] team0: Port device team_slave_0 added [ 1261.603375] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1261.610536] team0: Port device team_slave_1 added [ 1261.626519] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1261.632879] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1261.660065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1261.674564] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1261.682136] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1261.707705] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1261.718445] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1261.726402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1261.784054] device hsr_slave_0 entered promiscuous mode [ 1261.820483] device hsr_slave_1 entered promiscuous mode [ 1261.865189] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1261.872457] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1261.960703] bridge0: port 2(bridge_slave_1) entered blocking state [ 1261.967228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1261.974007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1261.980575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1262.020635] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1262.026853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1262.037042] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1262.045953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1262.054516] bridge0: port 1(bridge_slave_0) entered disabled state [ 1262.061350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1262.079171] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1262.085479] 8021q: adding VLAN 0 to HW filter on device team0 [ 1262.095577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1262.103875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1262.110401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1262.120594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1262.128110] bridge0: port 2(bridge_slave_1) entered blocking state [ 1262.134618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1262.149556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1262.158303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1262.167628] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1262.175308] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1262.184058] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1262.191143] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1262.199247] device bridge_slave_1 left promiscuous mode [ 1262.205590] bridge0: port 2(bridge_slave_1) entered disabled state [ 1262.260931] device bridge_slave_0 left promiscuous mode [ 1262.266516] bridge0: port 1(bridge_slave_0) entered disabled state [ 1262.311999] device veth1_macvtap left promiscuous mode [ 1262.317421] device veth0_macvtap left promiscuous mode [ 1262.323110] device veth1_vlan left promiscuous mode [ 1262.328272] device veth0_vlan left promiscuous mode [ 1262.437237] device hsr_slave_1 left promiscuous mode [ 1262.494053] device hsr_slave_0 left promiscuous mode [ 1262.537393] team0 (unregistering): Port device team_slave_1 removed [ 1262.548484] team0 (unregistering): Port device team_slave_0 removed [ 1262.559324] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1262.605000] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1262.672362] bond0 (unregistering): Released all slaves [ 1262.719412] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1262.729531] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1262.739806] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1262.746435] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1262.757061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1262.764974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1262.773377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1262.781166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1262.794211] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1262.803009] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1262.809464] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1262.816670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1262.828611] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1262.959303] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1262.973862] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1262.988906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1262.998450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1263.046964] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1263.055004] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1263.062107] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1263.072736] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1263.079734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1263.087758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1263.097517] device veth0_vlan entered promiscuous mode [ 1263.108931] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1263.117935] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1263.132669] device veth1_vlan entered promiscuous mode [ 1263.138753] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1263.153702] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1263.173445] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1263.187994] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1263.195226] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1263.206597] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1263.214713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1263.226216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1263.236801] device veth0_macvtap entered promiscuous mode [ 1263.248029] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1263.258040] device veth1_macvtap entered promiscuous mode [ 1263.268302] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1263.287068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1263.297471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1263.312179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1263.326403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.336153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1263.349870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.359335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1263.373072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.383092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1263.415156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.445239] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1263.456649] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1263.467111] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1263.478790] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1263.486937] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1263.501413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1263.511312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1263.521602] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.531224] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1263.541702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.551022] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1263.561021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.572101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1263.581946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1263.592807] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1263.599716] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1263.607533] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1263.617563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1264.660348] IPVS: ftp: loaded support on port[0] = 21 [ 1264.697880] bridge0: port 2(bridge_slave_1) entered disabled state [ 1264.704929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.758742] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1264.773113] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:43:58 executing program 5: 12:43:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x40, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40050) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2a00, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000001c0)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, r6}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r6, 0x2, 0x8, 0x9}, &(0x7f0000000080)=0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:system_cron_spool_t:s0\x00', 0x29, 0x3) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:43:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:43:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:43:58 executing program 5: [ 1265.370342] audit: type=1400 audit(1579437838.246:19648): avc: denied { relabelto } for pid=1644 comm="syz-executor.1" name="NETLINK" dev="sockfs" ino=137945 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:system_cron_spool_t:s0 tclass=netlink_route_socket permissive=1 [ 1265.380903] Process accounting resumed 12:43:58 executing program 0: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1265.405825] audit: type=1804 audit(1579437838.246:19649): pid=1643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/152/file0" dev="sda1" ino=17132 res=1 [ 1265.437810] Process accounting resumed [ 1265.447749] audit: type=1804 audit(1579437838.246:19650): pid=1643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/152/file0" dev="sda1" ino=17132 res=1 [ 1265.471051] Process accounting resumed [ 1265.494033] Process accounting resumed [ 1265.543514] audit: type=1804 audit(1579437838.316:19651): pid=1652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/153/file0" dev="sda1" ino=17125 res=1 [ 1265.574259] audit: type=1804 audit(1579437838.316:19652): pid=1652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/153/file0" dev="sda1" ino=17125 res=1 [ 1265.610959] chnl_net:caif_netlink_parms(): no params data found [ 1265.653246] bridge0: port 1(bridge_slave_0) entered blocking state [ 1265.659872] bridge0: port 1(bridge_slave_0) entered disabled state [ 1265.667123] device bridge_slave_0 entered promiscuous mode [ 1265.674541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1265.681021] bridge0: port 2(bridge_slave_1) entered disabled state [ 1265.687874] device bridge_slave_1 entered promiscuous mode [ 1265.707820] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1265.716935] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1265.734172] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1265.741349] team0: Port device team_slave_0 added [ 1265.748352] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1265.755577] team0: Port device team_slave_1 added [ 1265.771560] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1265.777811] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1265.803762] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1265.816335] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1265.822727] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1265.848126] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1265.858649] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1265.866238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1265.932690] device hsr_slave_0 entered promiscuous mode [ 1265.980472] device hsr_slave_1 entered promiscuous mode [ 1266.025151] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1266.032371] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1266.088803] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1266.119562] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1266.127692] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1266.137010] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1266.143521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1266.151803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1266.163155] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1266.169246] 8021q: adding VLAN 0 to HW filter on device team0 [ 1266.177593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1266.184848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1266.193220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1266.200867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.207189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1266.214428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1266.224643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1266.231862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1266.239742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1266.247819] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.254333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1266.264919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1266.272100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1266.283670] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1266.291043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1266.301884] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1266.308905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1266.316838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1266.324756] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1266.334239] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1266.342500] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1266.349965] device bridge_slave_1 left promiscuous mode [ 1266.355756] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.381223] device bridge_slave_0 left promiscuous mode [ 1266.386752] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.483683] device hsr_slave_1 left promiscuous mode [ 1266.524139] device hsr_slave_0 left promiscuous mode [ 1266.577700] team0 (unregistering): Port device team_slave_1 removed [ 1266.587146] team0 (unregistering): Port device team_slave_0 removed [ 1266.597418] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1266.634094] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1266.710425] bond0 (unregistering): Released all slaves [ 1266.754178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1266.762651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1266.770589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1266.781361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1266.788172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1266.795875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1266.806153] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1266.815081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1266.822868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1266.832686] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1266.839405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1266.853697] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1266.861486] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1266.867749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1266.875062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1266.887703] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1267.012387] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1267.028283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1267.091691] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1267.098884] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1267.106036] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1267.117845] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1267.125041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1267.137094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1267.147082] device veth0_vlan entered promiscuous mode [ 1267.154805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1267.162494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1267.172918] device veth1_vlan entered promiscuous mode [ 1267.178675] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1267.189724] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1267.209756] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1267.225182] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1267.234691] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1267.244835] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1267.254791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1267.264617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1267.277201] device veth0_macvtap entered promiscuous mode [ 1267.284383] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1267.295260] device veth1_macvtap entered promiscuous mode [ 1267.301988] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1267.312205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1267.323740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1267.333271] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.344867] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.356516] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.368610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.381875] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.393090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.405436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.416647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.429519] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1267.445817] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1267.456158] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1267.468215] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1267.475605] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1267.487389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1267.497229] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.511804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.523582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.535069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.546513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.558158] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.573292] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.583061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.597493] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1267.604604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1267.616819] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1267.626710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:44:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYBLOB="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"], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:02 executing program 5: 12:44:02 executing program 0: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = accept4$x25(r0, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x80800) listen(r1, 0x9) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000200)="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") ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 12:44:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:02 executing program 5: 12:44:02 executing program 5: 12:44:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x4, 0x4) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1269.649051] audit: type=1804 audit(1579437842.516:19653): pid=1687 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/154/file0" dev="sda1" ino=16767 res=1 [ 1269.679028] Process accounting resumed 12:44:02 executing program 0: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1269.718767] Process accounting resumed 12:44:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYBLOB="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"], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1269.742446] audit: type=1804 audit(1579437842.546:19654): pid=1687 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/154/file0" dev="sda1" ino=16767 res=1 12:44:02 executing program 5: [ 1269.814456] Process accounting resumed [ 1269.827434] audit: type=1804 audit(1579437842.686:19655): pid=1703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/155/file0" dev="sda1" ino=16804 res=1 12:44:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000040)={0x8000, 0x3, 0x4, 0x80000000, 0xa1, {r3, r4/1000+30000}, {0x5, 0x0, 0x3, 0xb6, 0x4, 0xcf, "d77dfdd0"}, 0x35, 0x1, @userptr=0x3f, 0xffffffff, 0x0, 0xffffffffffffffff}) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, &(0x7f0000000100)={0x3, 0x1}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x3, 0xff) r7 = gettid() fcntl$setown(r6, 0x8, r7) 12:44:02 executing program 5: [ 1269.888628] Process accounting resumed [ 1269.950150] audit: type=1804 audit(1579437842.686:19656): pid=1703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/155/file0" dev="sda1" ino=16804 res=1 [ 1270.564491] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1270.574917] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1270.591022] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1270.607049] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1270.640509] device bridge_slave_1 left promiscuous mode [ 1270.646219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.701778] device bridge_slave_0 left promiscuous mode [ 1270.707252] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.763059] device veth1_macvtap left promiscuous mode [ 1270.768469] device veth0_macvtap left promiscuous mode [ 1270.773881] device veth1_vlan left promiscuous mode [ 1270.778928] device veth0_vlan left promiscuous mode [ 1270.893262] device hsr_slave_1 left promiscuous mode [ 1270.934026] device hsr_slave_0 left promiscuous mode [ 1270.978837] team0 (unregistering): Port device team_slave_1 removed [ 1270.988433] team0 (unregistering): Port device team_slave_0 removed [ 1270.997620] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1271.035267] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1271.089012] bond0 (unregistering): Released all slaves [ 1272.941444] IPVS: ftp: loaded support on port[0] = 21 [ 1273.711548] IPVS: ftp: loaded support on port[0] = 21 [ 1273.778038] chnl_net:caif_netlink_parms(): no params data found [ 1273.835681] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.842173] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.849112] device bridge_slave_0 entered promiscuous mode [ 1273.877461] bridge0: port 2(bridge_slave_1) entered blocking state [ 1273.884373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.891450] device bridge_slave_1 entered promiscuous mode [ 1273.923949] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1273.933463] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1273.946558] chnl_net:caif_netlink_parms(): no params data found [ 1273.964510] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1273.972102] team0: Port device team_slave_0 added [ 1273.981915] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1273.989093] team0: Port device team_slave_1 added [ 1274.014373] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1274.020755] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1274.046274] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1274.057553] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1274.064302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1274.089647] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1274.100597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1274.114018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1274.133648] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.140225] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.147143] device bridge_slave_0 entered promiscuous mode [ 1274.154575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.161012] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.167907] device bridge_slave_1 entered promiscuous mode [ 1274.232088] device hsr_slave_0 entered promiscuous mode [ 1274.270365] device hsr_slave_1 entered promiscuous mode [ 1274.315419] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1274.322831] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1274.330860] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1274.346128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1274.373526] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1274.381206] team0: Port device team_slave_0 added [ 1274.389265] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1274.396818] team0: Port device team_slave_1 added [ 1274.422077] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1274.428478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1274.454624] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1274.467931] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1274.474516] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1274.500095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1274.513538] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1274.525337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1274.592213] device hsr_slave_0 entered promiscuous mode [ 1274.630517] device hsr_slave_1 entered promiscuous mode [ 1274.670916] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1274.678251] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1274.699647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.706139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.712857] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.719322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.791472] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.797843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.804732] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.811211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.824296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.831326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.838369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.845488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.865382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1274.874678] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1274.884605] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1274.893427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1274.900865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1274.910948] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1274.917226] 8021q: adding VLAN 0 to HW filter on device team0 [ 1274.926281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1274.933767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1274.941952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1274.949520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.955917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.968401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1274.979217] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1274.987223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1274.995565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1275.003780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1275.011955] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.018316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.027708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1275.038396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1275.046520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1275.054972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1275.064072] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1275.074152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1275.081448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1275.089997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1275.099069] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1275.105619] 8021q: adding VLAN 0 to HW filter on device team0 [ 1275.112544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1275.122727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1275.130647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1275.139812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1275.148149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1275.155957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1275.165120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1275.173100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1275.181925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1275.189629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.196038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.204904] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1275.216087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1275.224372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1275.231826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1275.239343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1275.246962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1275.254509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1275.262967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1275.271048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1275.278598] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.284980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.294401] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1275.302503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1275.314449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1275.323033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1275.335941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1275.343887] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1275.351103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1275.364032] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1275.371260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1275.378309] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1275.385483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1275.392247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1275.399796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1275.407850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1275.417240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1275.424771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1275.432895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1275.443397] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1275.450654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1275.458315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1275.468911] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1275.477344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1275.485249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1275.493579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1275.506157] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1275.513001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1275.528567] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1275.537061] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1275.544192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1275.551172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1275.563460] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1275.618363] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1275.629122] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1275.636639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1275.644851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1275.681998] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1275.693001] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1275.700466] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1275.707994] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1275.718244] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1275.725909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1275.734654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1275.743077] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1275.749937] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1275.760441] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1275.767451] device veth0_vlan entered promiscuous mode [ 1275.777660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1275.785901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1275.799296] device veth1_vlan entered promiscuous mode [ 1275.805423] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1275.816678] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1275.830864] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1275.838000] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1275.845721] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1275.855782] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1275.863257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1275.871298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1275.881528] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1275.888554] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1275.896282] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1275.905235] device veth0_macvtap entered promiscuous mode [ 1275.914146] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1275.923029] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1275.932976] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1275.940999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1275.948394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1275.956660] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1275.964172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1275.972281] device veth1_macvtap entered promiscuous mode [ 1275.978402] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1275.985909] device veth0_vlan entered promiscuous mode [ 1275.995045] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1276.005984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1276.018070] device veth1_vlan entered promiscuous mode [ 1276.026696] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1276.033578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.043780] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.053403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.063218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.073948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.083692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.092969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.102771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.112860] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1276.119925] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1276.131707] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1276.138811] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1276.146030] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1276.153987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1276.166868] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1276.174138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.183973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.193430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.203331] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.212554] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.222329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.231936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.241958] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.251972] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1276.258878] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1276.267923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1276.276509] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1276.284520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1276.296433] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1276.307530] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1276.314706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1276.322894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1276.336071] device veth0_macvtap entered promiscuous mode [ 1276.342778] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1276.352460] device veth1_macvtap entered promiscuous mode [ 1276.358772] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1276.368271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1276.377889] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1276.386957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.396857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.406310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.416095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.425266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.435073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.444228] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.454018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.463183] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1276.473005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.483508] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1276.491001] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1276.501655] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1276.508857] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1276.528547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1276.536576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1276.547078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.557643] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.567084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.577408] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.586686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.596631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.606011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.616134] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.625418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1276.636011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1276.652036] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1276.659498] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1276.675183] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1276.687760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1276.723894] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.730556] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.784164] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1276.807814] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:44:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x0, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:10 executing program 5: 12:44:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x6, 0x53, 0x8, 0x2, 0x4, 0x2, 0x5, 0x40, 0x8}, 0x0) 12:44:10 executing program 5: [ 1277.367753] audit: type=1804 audit(1579437850.236:19657): pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/156/file0" dev="sda1" ino=16691 res=1 [ 1277.399100] Process accounting resumed [ 1277.417287] Process accounting resumed [ 1277.427677] audit: type=1804 audit(1579437850.266:19658): pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/156/file0" dev="sda1" ino=16691 res=1 12:44:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYBLOB="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"], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:10 executing program 5: 12:44:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x0, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1277.743283] audit: type=1804 audit(1579437850.616:19659): pid=1803 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/157/file0" dev="sda1" ino=16673 res=1 [ 1277.744356] Process accounting resumed 12:44:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x0, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='pipefs\x00', 0x0, 0x0) [ 1277.791438] Process accounting resumed 12:44:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:10 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1277.837407] audit: type=1804 audit(1579437850.616:19660): pid=1803 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/157/file0" dev="sda1" ino=16673 res=1 [ 1277.940294] audit: type=1804 audit(1579437850.806:19661): pid=1809 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/158/file0" dev="sda1" ino=16657 res=1 [ 1277.972397] Process accounting resumed 12:44:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1278.006307] Process accounting resumed [ 1278.043723] audit: type=1804 audit(1579437850.846:19662): pid=1809 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/158/file0" dev="sda1" ino=16657 res=1 [ 1278.135472] audit: type=1804 audit(1579437851.006:19663): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/159/file0" dev="sda1" ino=16753 res=1 [ 1278.136067] Process accounting resumed [ 1278.206815] audit: type=1804 audit(1579437851.006:19664): pid=1817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/159/file0" dev="sda1" ino=16753 res=1 [ 1278.209210] Process accounting resumed [ 1278.313125] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1278.327866] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1278.346670] device bridge_slave_1 left promiscuous mode [ 1278.359389] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.434844] device bridge_slave_0 left promiscuous mode [ 1278.454340] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.555638] device hsr_slave_1 left promiscuous mode [ 1278.623197] device hsr_slave_0 left promiscuous mode [ 1278.688653] team0 (unregistering): Port device team_slave_1 removed [ 1278.699932] team0 (unregistering): Port device team_slave_0 removed [ 1278.709275] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1278.744764] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1278.822813] bond0 (unregistering): Released all slaves 12:44:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40040, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000002080)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x1200000000000000) 12:44:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1280.444903] audit: type=1804 audit(1579437853.316:19665): pid=1831 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/160/file0" dev="sda1" ino=16815 res=1 [ 1280.446042] Process accounting resumed [ 1280.505150] audit: type=1804 audit(1579437853.316:19666): pid=1831 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/160/file0" dev="sda1" ino=16815 res=1 [ 1280.524841] Process accounting resumed [ 1280.621363] IPVS: ftp: loaded support on port[0] = 21 [ 1281.429727] chnl_net:caif_netlink_parms(): no params data found [ 1281.476408] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.483400] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.490982] device bridge_slave_0 entered promiscuous mode [ 1281.497802] bridge0: port 2(bridge_slave_1) entered blocking state [ 1281.504281] bridge0: port 2(bridge_slave_1) entered disabled state [ 1281.513030] device bridge_slave_1 entered promiscuous mode [ 1281.536431] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1281.546000] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1281.567516] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1281.574767] team0: Port device team_slave_0 added [ 1281.580853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1281.588213] team0: Port device team_slave_1 added [ 1281.608597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1281.615086] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1281.640572] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1281.651819] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1281.658144] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1281.683929] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1281.697782] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1281.705759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1281.752828] device hsr_slave_0 entered promiscuous mode [ 1281.820483] device hsr_slave_1 entered promiscuous mode [ 1281.860834] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1281.871221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1281.938407] bridge0: port 2(bridge_slave_1) entered blocking state [ 1281.944866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1281.951638] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.958004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1282.004520] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1282.011086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1282.020374] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1282.029431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1282.037490] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.044305] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.057837] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1282.064162] 8021q: adding VLAN 0 to HW filter on device team0 [ 1282.073997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1282.082989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1282.089344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1282.111166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1282.118779] bridge0: port 2(bridge_slave_1) entered blocking state [ 1282.125397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1282.133535] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1282.143324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1282.152393] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1282.161970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1282.172337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1282.183589] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1282.189716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1282.198890] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1282.205819] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1282.214863] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1282.221786] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1282.229297] device bridge_slave_1 left promiscuous mode [ 1282.235290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.290752] device bridge_slave_0 left promiscuous mode [ 1282.296624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.362182] device veth1_macvtap left promiscuous mode [ 1282.367553] device veth0_macvtap left promiscuous mode [ 1282.373325] device veth1_vlan left promiscuous mode [ 1282.378373] device veth0_vlan left promiscuous mode [ 1282.482669] device hsr_slave_1 left promiscuous mode [ 1282.522855] device hsr_slave_0 left promiscuous mode [ 1282.567606] team0 (unregistering): Port device team_slave_1 removed [ 1282.578865] team0 (unregistering): Port device team_slave_0 removed [ 1282.587919] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1282.623198] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1282.680759] bond0 (unregistering): Released all slaves [ 1282.753873] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1282.767606] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1282.775822] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1282.784658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1282.792066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1282.804098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1282.873230] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1282.927116] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1282.935870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1282.946849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1283.009039] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1283.019348] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1283.028499] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1283.049279] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1283.057601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1283.068262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1283.079782] device veth0_vlan entered promiscuous mode [ 1283.087196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1283.094909] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1283.105739] device veth1_vlan entered promiscuous mode [ 1283.112527] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1283.123642] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1283.138418] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1283.149976] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1283.158383] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1283.166468] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1283.177339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1283.187111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1283.199656] device veth0_macvtap entered promiscuous mode [ 1283.208347] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1283.224599] device veth1_macvtap entered promiscuous mode [ 1283.233554] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1283.246048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1283.259431] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1283.273445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1283.285216] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.296957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1283.308816] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.322379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1283.333658] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.345306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1283.357371] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.369947] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1283.378742] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1283.392184] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1283.402462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1283.409726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1283.419156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1283.431888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1283.446465] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.456020] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1283.469621] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.479059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1283.493922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.503546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1283.518647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1283.529237] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1283.540636] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1283.547992] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1283.561935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1284.640870] IPVS: ftp: loaded support on port[0] = 21 [ 1284.845366] bridge0: port 2(bridge_slave_1) entered disabled state [ 1284.852091] bridge0: port 1(bridge_slave_0) entered disabled state [ 1284.976536] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1284.997621] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:44:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf8000000}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4002}, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f00000006c0), 0x4) socket$packet(0x11, 0x0, 0x300) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000700)={{{@in=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x3608841, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRESDEC=r5, @ANYBLOB="2c736563563ec04f6162656c2c726f6f74636f6e74657874b4a3024e64bedf"]) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) open(0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000ffff10005fb200020000460002", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b00000000006f92d9a72d01dcb8c0bfe629f176d7501f912f3e4ca90100000017a903d82c7d2485e412f52092ea46f4c02231043a366c02fd0623ca2c8095d57380966886a187c8f384285557bcf7de3a918952a592707830a344e251f58feaadc506bfca62b319a0eac8b2532edd37c37ba397b36a1fe1f2c529f014c44fc20c1d266c03604f784e4c59064b8a0e"], 0x3}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000001940)='lo\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x209) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1285.486752] audit: type=1804 audit(1579437858.356:19667): pid=1883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/161/file0" dev="sda1" ino=17073 res=1 [ 1285.517967] audit: type=1804 audit(1579437858.396:19668): pid=1883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/161/file0" dev="sda1" ino=17073 res=1 [ 1285.518006] Process accounting resumed [ 1285.558937] Process accounting resumed 12:44:18 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1285.745054] audit: type=1804 audit(1579437858.616:19669): pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/162/file0" dev="sda1" ino=17089 res=1 [ 1285.751141] Process accounting resumed 12:44:18 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1285.777378] audit: type=1804 audit(1579437858.626:19670): pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/162/file0" dev="sda1" ino=17089 res=1 [ 1285.789106] Process accounting resumed [ 1285.823991] audit: type=1804 audit(1579437858.696:19671): pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/163/file0" dev="sda1" ino=17073 res=1 [ 1285.830907] Process accounting resumed [ 1285.852289] audit: type=1804 audit(1579437858.696:19672): pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/163/file0" dev="sda1" ino=17073 res=1 [ 1285.872779] Process accounting resumed [ 1285.976745] chnl_net:caif_netlink_parms(): no params data found [ 1286.019263] bridge0: port 1(bridge_slave_0) entered blocking state [ 1286.025958] bridge0: port 1(bridge_slave_0) entered disabled state [ 1286.033221] device bridge_slave_0 entered promiscuous mode [ 1286.040826] bridge0: port 2(bridge_slave_1) entered blocking state [ 1286.047609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.055136] device bridge_slave_1 entered promiscuous mode [ 1286.073183] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1286.082388] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1286.099933] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1286.107301] team0: Port device team_slave_0 added [ 1286.113015] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1286.120568] team0: Port device team_slave_1 added [ 1286.135866] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1286.142306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1286.168473] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1286.180256] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1286.186838] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1286.212650] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1286.223650] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1286.231599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1286.308026] device hsr_slave_0 entered promiscuous mode [ 1286.350403] device hsr_slave_1 entered promiscuous mode [ 1286.390994] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1286.401011] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1286.460372] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1286.493252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1286.502281] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1286.510649] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1286.517488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1286.525211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1286.537870] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1286.544481] 8021q: adding VLAN 0 to HW filter on device team0 [ 1286.552950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1286.559959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1286.567934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1286.576427] bridge0: port 1(bridge_slave_0) entered blocking state [ 1286.582915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1286.591635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1286.606565] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1286.613996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1286.623395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1286.631331] bridge0: port 2(bridge_slave_1) entered blocking state [ 1286.637730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1286.646591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1286.653952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1286.664141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1286.671952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1286.682695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1286.689781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1286.698081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1286.706148] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1286.714630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1286.721973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1286.729692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1286.744400] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1286.754679] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1286.765543] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1286.772280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1286.781125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1286.789546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1286.804170] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1286.811632] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1286.818144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1286.824943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1286.835851] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1286.901529] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1286.912622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1286.946723] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1286.954733] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1286.961549] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1286.970989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1286.979466] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1286.986560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1286.996109] device veth0_vlan entered promiscuous mode [ 1287.005929] device veth1_vlan entered promiscuous mode [ 1287.012095] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1287.021191] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1287.033682] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1287.043750] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1287.051085] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1287.058465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1287.068450] device veth0_macvtap entered promiscuous mode [ 1287.075199] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1287.084112] device veth1_macvtap entered promiscuous mode [ 1287.093646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1287.103231] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1287.112533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1287.122460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.131971] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1287.141858] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.151665] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1287.161449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.170584] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1287.180521] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.191078] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1287.198177] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1287.207356] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1287.217641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1287.225816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1287.238981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1287.249233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.259195] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1287.269240] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.278513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1287.288888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.298321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1287.308379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1287.318582] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1287.325691] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1287.333077] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1287.343274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:44:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:21 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x2, 0x4, 0x1, 0xd858, r2}) ptrace$cont(0x18, r0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'netpci0\x00', 0x1000}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getrusage(0xffffffffffffffff, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x1, 0x0) 12:44:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000000)=0x5) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1289.178693] audit: type=1804 audit(1579437862.046:19673): pid=1952 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/164/file0" dev="sda1" ino=16826 res=1 [ 1289.209075] Process accounting resumed 12:44:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1289.252026] audit: type=1804 audit(1579437862.086:19674): pid=1952 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/164/file0" dev="sda1" ino=16826 res=1 [ 1289.257840] Process accounting resumed 12:44:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1289.506847] audit: type=1804 audit(1579437862.376:19675): pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/165/file0" dev="sda1" ino=17140 res=1 [ 1289.508256] Process accounting resumed [ 1289.549709] Process accounting resumed 12:44:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1289.554068] audit: type=1804 audit(1579437862.376:19676): pid=1961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/165/file0" dev="sda1" ino=17140 res=1 [ 1289.589144] Process accounting resumed 12:44:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1289.603840] Process accounting resumed [ 1289.648612] Process accounting resumed [ 1289.656982] Process accounting resumed 12:44:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1289.988208] Process accounting resumed [ 1290.025022] Process accounting resumed [ 1290.042351] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1290.051496] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1290.068830] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1290.087134] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1290.198220] device bridge_slave_1 left promiscuous mode [ 1290.241914] bridge0: port 2(bridge_slave_1) entered disabled state [ 1290.301281] device bridge_slave_0 left promiscuous mode [ 1290.308266] bridge0: port 1(bridge_slave_0) entered disabled state [ 1290.363377] device veth1_macvtap left promiscuous mode [ 1290.372041] device veth0_macvtap left promiscuous mode [ 1290.383159] device veth1_vlan left promiscuous mode [ 1290.388701] device veth0_vlan left promiscuous mode [ 1290.602989] device hsr_slave_1 left promiscuous mode [ 1290.643057] device hsr_slave_0 left promiscuous mode [ 1290.698283] team0 (unregistering): Port device team_slave_1 removed [ 1290.707593] team0 (unregistering): Port device team_slave_0 removed [ 1290.717514] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1290.784098] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1290.871967] bond0 (unregistering): Released all slaves [ 1292.501363] IPVS: ftp: loaded support on port[0] = 21 [ 1293.241823] IPVS: ftp: loaded support on port[0] = 21 [ 1293.317227] chnl_net:caif_netlink_parms(): no params data found [ 1293.375529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.382016] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.389040] device bridge_slave_0 entered promiscuous mode [ 1293.417463] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.423978] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.432051] device bridge_slave_1 entered promiscuous mode [ 1293.467315] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1293.477006] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1293.489993] chnl_net:caif_netlink_parms(): no params data found [ 1293.508060] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1293.515428] team0: Port device team_slave_0 added [ 1293.521392] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1293.528742] team0: Port device team_slave_1 added [ 1293.556859] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1293.563976] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1293.589476] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1293.601140] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1293.607691] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1293.633243] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1293.644162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1293.657030] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1293.675790] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.682392] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.689324] device bridge_slave_0 entered promiscuous mode [ 1293.697626] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.704117] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.711524] device bridge_slave_1 entered promiscuous mode [ 1293.775004] device hsr_slave_0 entered promiscuous mode [ 1293.820453] device hsr_slave_1 entered promiscuous mode [ 1293.875565] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1293.883251] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1293.891515] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1293.907016] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1293.933756] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1293.941415] team0: Port device team_slave_0 added [ 1293.949554] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1293.957353] team0: Port device team_slave_1 added [ 1293.981401] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1293.987902] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1294.016600] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1294.033084] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1294.039473] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1294.065541] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1294.078694] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1294.087485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1294.163676] device hsr_slave_0 entered promiscuous mode [ 1294.200552] device hsr_slave_1 entered promiscuous mode [ 1294.243948] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1294.251553] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1294.276666] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.283483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1294.290185] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.296552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1294.313446] bridge0: port 1(bridge_slave_0) entered disabled state [ 1294.320455] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.380769] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1294.414810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1294.424742] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1294.435289] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1294.445657] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1294.451862] 8021q: adding VLAN 0 to HW filter on device team0 [ 1294.459249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1294.466521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1294.476264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1294.485041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1294.493251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1294.501508] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.508041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1294.518148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1294.531087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1294.537173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1294.546323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1294.554293] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.560807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1294.570195] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1294.579011] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1294.589344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1294.595798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1294.603847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1294.616349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1294.626440] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1294.632908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1294.641510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1294.649063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1294.656158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1294.663375] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1294.674964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1294.683191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1294.691969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1294.700939] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1294.707636] 8021q: adding VLAN 0 to HW filter on device team0 [ 1294.719704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1294.727995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1294.735150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1294.743241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1294.751201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1294.759318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1294.772048] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.778412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1294.785895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1294.795959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1294.805443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1294.817055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1294.825055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1294.832760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1294.840908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1294.848544] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.854972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1294.865114] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1294.871674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1294.885358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1294.892936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1294.904557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1294.914692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1294.922593] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1294.929294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1294.937383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1294.945071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1294.952961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1294.961969] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1294.969033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1294.976297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1294.986301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1294.994910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1295.003006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1295.013107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1295.024479] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1295.032637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1295.040514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1295.048098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1295.055908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1295.065313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1295.079779] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1295.086722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1295.103852] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1295.114547] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1295.121557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1295.128276] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1295.149218] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1295.184863] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1295.195853] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1295.203563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1295.212470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1295.264447] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1295.272280] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1295.278956] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1295.289351] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1295.301324] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1295.309434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1295.318460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1295.326793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1295.334907] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1295.344425] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1295.353038] device veth0_vlan entered promiscuous mode [ 1295.359071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1295.368190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1295.381763] device veth1_vlan entered promiscuous mode [ 1295.406105] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1295.416093] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1295.426224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1295.434763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1295.443388] device veth0_macvtap entered promiscuous mode [ 1295.449846] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1295.459561] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1295.467266] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1295.474412] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1295.486324] device veth1_macvtap entered promiscuous mode [ 1295.493271] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1295.503247] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1295.514613] device veth0_vlan entered promiscuous mode [ 1295.522288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1295.530393] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1295.537758] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1295.545374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1295.553125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1295.561705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1295.568766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1295.579296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1295.590707] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.601013] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.610717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.620682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.629801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.639630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.649399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.659380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.669475] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1295.676777] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1295.686759] device veth1_vlan entered promiscuous mode [ 1295.693353] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1295.699930] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1295.709427] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1295.717943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1295.727764] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.737985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.747376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.757737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.768135] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.778005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.787294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1295.797209] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.807273] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1295.814297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1295.823393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1295.832229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1295.842403] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1295.858260] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1295.868636] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1295.876087] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1295.884243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1295.892650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1295.902866] device veth0_macvtap entered promiscuous mode [ 1295.909117] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1295.921447] device veth1_macvtap entered promiscuous mode [ 1295.927534] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1295.937597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1295.947422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1295.957105] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.967255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.976633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1295.986486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1295.995863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1296.005651] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.014929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1296.024782] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.034131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1296.044103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.054540] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1296.061697] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1296.074145] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1296.081792] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1296.089915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1296.103623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1296.114487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1296.124966] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.134465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1296.144667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.154317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1296.164086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.173209] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1296.182957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.192308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1296.202696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1296.217569] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1296.225030] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1296.237130] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1296.246931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:44:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:29 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x7, r0, 0x100000, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x400) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fcntl$getown(r3, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$cont(0x18, r4, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006cffff000000bb01c5e000000000002e75"], 0x15) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) read(r7, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 1296.976507] kauditd_printk_skb: 6 callbacks suppressed [ 1296.976515] audit: type=1804 audit(1579437869.846:19683): pid=2040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/169/file0" dev="sda1" ino=17158 res=1 [ 1296.977718] Process accounting resumed 12:44:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1296.982179] audit: type=1804 audit(1579437869.846:19684): pid=2040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/169/file0" dev="sda1" ino=17158 res=1 [ 1297.044676] Process accounting resumed [ 1297.072471] audit: type=1804 audit(1579437869.946:19685): pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/170/file0" dev="sda1" ino=17160 res=1 [ 1297.073401] Process accounting resumed [ 1297.143554] Process accounting resumed [ 1297.178699] audit: type=1804 audit(1579437869.946:19686): pid=2052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/170/file0" dev="sda1" ino=17160 res=1 [ 1298.082117] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1298.089168] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1298.096889] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1298.103700] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1298.111485] device bridge_slave_1 left promiscuous mode [ 1298.117110] bridge0: port 2(bridge_slave_1) entered disabled state 12:44:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:31 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000001dc0)=""/4096) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x1c, &(0x7f0000000000)={0x4, 0x1ff, 0x5}) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r7 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r6, r7, 0x0) ioctl$VT_WAITACTIVE(r7, 0x5607) getsockname$l2tp(r5, &(0x7f0000001d40)={0x2, 0x0, @loopback}, &(0x7f0000001d80)=0x10) sendmmsg$nfc_llcp(r4, &(0x7f0000001c80)=[{&(0x7f0000000100)={0x27, 0x0, 0x1, 0x4, 0xff, 0x5, "05e19ec6217c874cf657205f01c855ad7ce2ef80ad08412b9d59aa39a039223950df53e561a6e7d153beac58defcf18cfd1cba3fad3c4b56189d43c155793b", 0x9}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000200)="8ff6936b6459fd8390124e0d6b4200ca3a8da402fb1cead49ebed5592ebdbd8f39e5d7a10afa919f0427d3d179a3a392dfbd40ada6b3f72dd0ed0f549b22e7d23fe6e93d021ac957bba6aaf0e72481926f93e021e5a69d8b8906e76a2f204d1ca78b46f7d7bc27f098b8ffd8a1c6c861f75064f7afbb8f2a62cf79f39f5cc450f7398d3233504250adea44e6bc7e39bb856d30242a51513e108e0538c1725316f712fe0e", 0xa4}], 0x1, &(0x7f0000000300)={0xa0, 0x107, 0x4, "dac96caf5cf60fffd5aefa2c5c6d8807dd75b1822537db09cb4c9b811b5641483f613c1ae8a854f26e4680a5a948c18cc2de97be8b0f18df3fe674c356ea1c96562ae01afcb8c85282991f4a9b450a2184cbbb42acbdef0ee193596ea24c78e035633498812c1851fa70062edaa0875ecf3fccb272d9bdd62efddef90ba5689b2dcc8ef838bff47bf60f01259f"}, 0xa0, 0x10}, {&(0x7f00000003c0)={0x27, 0x0, 0x0, 0x7, 0x2, 0x80, "5de6c294e3fabb5371518a809fda6c8d8fb989935809bf75e4520a6a080c7b4ad5b5b836ac50f2f5044e667018d4c3000e408b6365f8828c344ccce9778ad9", 0x34}, 0x60, &(0x7f0000001800)=[{&(0x7f0000000440)="4522718ec01268f09830f56969819e069731c4260739f046076b07a43001bad860b75b7417d5de13c4c4ecafa52f374e5898b8517bb4f99e58c468087d", 0x3d}, {&(0x7f0000000480)="7de70d34d3c729eeedcb85318db19ddc476ac22738eb569d78bcbbbd384497a03694bb0c6b46b19f8dd4020fe0ba98a49840362b8946fd0f08d1a878475a78fa31976f78eeebc2b910bb8fa3c5cb5f6414f40bc87f8436dbafbaa34c4c7cb7ced3175ccad4b08cac997c7f75c49436fc75c0ecad72e16ed0aa240567ac57a82e4feec711f77ad09633a1d015812e0e19b985b10d97894a289880dd90ef88f59d4ac64d29f189ace507995f4691273538b0ffbe0002280ae31e0ca37274", 0xbd}, {&(0x7f0000000540)="590b6bfa3c02f71f0300c593358164bce4d16968657c395888502fcd0a2f4a00fde795bcd5c2c91ba9d7e4fb448cc50bcf99448da867182fc0ae08d36c2368f2d4c6c9dc7bcd0538afe6caa1c9efb185b58fe61cffecf42c731048c7b96a", 0x5e}, {&(0x7f00000005c0)="10d671842ffa567326b6e819a5cc9e7dac463d32a221ba6ada70842a37fbe1e4f97c5014329af07e4e524d22901b04bc102f2d04fe03a2f8f63052fab0e7f5ba3ed426c5384d885d48daeee79287d9539fd39f76929f9b8e2cd5ed17100c1632d9f5852e9ff9bfcb1a2a33424ddf06fd8fbb7983d037a6c4307fc9212696aa468613a946577ec61fa781032f20174ca49a5f14132bb780ec5b0590bbe90c0091f10d467150421c99784db81ad86e2f816807c8e0ff97", 0xb6}, {&(0x7f0000000680)="5336e4bf020496505ef922ef10926247c61320159a530c79316b718df9756b9bcce949aafddee0939953ce34cb7d27433a3c1f380de07dad1d25360f46fe16d8ec2bb86a2df7a8261da62f67dc8c5d697ab1495770b05c7b37deab757501c17acbe7e9d47e2c56d8215d1311b6e67e568a16b36286547a9c4af8050dd1f3b5e656cfab914e98ecca4402f52decf16d7e28be04978c2e5f7c660d111bd5c545190612327e32bd6d0eac3ee627312d70903bb6a8b0b5a55668057fcb2cae01", 0xbe}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="fc83428972d00b7158008f7c890facae3a92dd63bfe683774bd8e2f7683fbefa41908395cf079a020c0246cf297652916a3e905b6cc2682a2dd3086fbcce15b8a59d1bf35f1ebc577018af88fdf21a82ef73ee1ab2cf31ac193ad78356d59d94a8d924f714529a6147b852ee32ddc80e1dc0d01da0d22a2c38c0f3ebf17ab4d4edee", 0x82}], 0x7, &(0x7f0000001880)={0x80, 0x88, 0x8000, "662483cf0e8ff40b9f81ae37d6d2b40455bd4302368cc4e7c2db44b7f6354cf2ac42d4be25914d8c0582cfe063cf36eb501f4ffdb9d42cc03b8601d4a0026a1ad48f89948fd0ab5a2cb7d486391e356699141ba7af066f97f9a9b0eeb865dcfc0c95edcfc8470c2b8773aa8e807e65"}, 0x80}, {&(0x7f0000001900)={0x27, 0x1, 0x1, 0x2, 0x3f, 0x1, "96dd132b1fd35875f84478ca28d7ef2d05520b2751e4ca2cde0a85049952b68674f7effca29e409210dbce918ae802f1f5d9e8d50419c3ce3c96e03ce8f7c7", 0x37}, 0x60, &(0x7f0000001c00)=[{&(0x7f0000001980)="99e833969ef7877686291d71027ffd7d105c0ca00d07cb98d5aec2f6e7226cbf5da118c3e803d0cedc8605fe4aee5f7deaf7dd35d2f9f98056746ea91ab1bfa07caabb92d7cae89d7b18114eb1d46926b3f2d2f7a56f6b5761faaae244b9ff1ec1a87f57e4d68ea688a03019498f048b2c16f7796655d8b9eff0db5f51947e90977d0b16ed8bae4c82dfbb488dd48cb8b33c20c603006f6cee5c3670a3a44d3c0aa36d32f428ed8f4d8ff2659e4b6207b84af73d0f0ab22015cdcc88580cb069997a05975fb1699269ff93b0d9979e5024114eaf296382eef897947d967ff691e2ea0a6f34624287ef", 0xe9}, {&(0x7f0000001a80)="ac31", 0x2}, {&(0x7f0000001ac0)="6b447a67a9f4465d19534bc6a58deb238aa447a7b2bc30775f6a0a850c4afb2a2a6cc865a5918a838870ec9a79d28ee84fed680dd070f5c6a8b631b2b5372565fabc0c2306c0273ef5358efc3c08e26d5ee5f7e7a12ba599904cf200ef4e544855ceb2a72a654ae5346a00818f9c784474c2f0987799989022ee95d4bf6ed30baf8d275227244b", 0x87}, {&(0x7f0000001b80)="734459a373f25199c787f64ae358719e1236234882e654c10d4c794f950e5e24723ec2207f65f510deec944dfb71712c16d372db388d2af26bebc954adcbd490c605a1b67cdb47d38ccde0b60d4ccca253c276421603ae96ad466621018c12b081683f749b5db9", 0x67}], 0x4, &(0x7f0000001c40)={0x28, 0x1, 0x8, "e43d2ef97dcf9e2ba12d23de68a43147b911cccd"}, 0x28, 0x4001}], 0x3, 0x20000090) dup3(r3, r4, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r4, 0x5387, &(0x7f0000000080)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1298.186118] device bridge_slave_0 left promiscuous mode [ 1298.191867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1298.265594] audit: type=1804 audit(1579437871.136:19687): pid=2071 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/171/file0" dev="sda1" ino=17148 res=1 [ 1298.266500] Process accounting resumed [ 1298.302749] device veth1_macvtap left promiscuous mode [ 1298.308172] device veth0_macvtap left promiscuous mode [ 1298.334887] device veth1_vlan left promiscuous mode [ 1298.339982] device veth0_vlan left promiscuous mode [ 1298.348482] audit: type=1804 audit(1579437871.136:19688): pid=2071 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/171/file0" dev="sda1" ino=17148 res=1 12:44:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) wait4(r1, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:31 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 12:44:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0xfffffffffffffffa) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) r3 = socket$vsock_stream(0x28, 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) wait4(0xffffffffffffffff, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x10000, 0x0) [ 1298.763818] device hsr_slave_1 left promiscuous mode [ 1298.825472] device hsr_slave_0 left promiscuous mode [ 1298.899652] team0 (unregistering): Port device team_slave_1 removed [ 1298.929703] team0 (unregistering): Port device team_slave_0 removed [ 1298.965977] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1299.025127] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1299.095167] bond0 (unregistering): Released all slaves [ 1299.144305] Process accounting resumed 12:44:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28}, 0x10) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000140)=0xad7, &(0x7f0000000100)=0x4) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba0000", @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1300.019753] audit: type=1804 audit(1579437872.886:19689): pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/172/file0" dev="sda1" ino=17142 res=1 [ 1300.054279] Process accounting resumed 12:44:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1300.068338] Process accounting resumed [ 1300.157433] audit: type=1804 audit(1579437872.926:19690): pid=2099 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/172/file0" dev="sda1" ino=17142 res=1 [ 1300.291860] Process accounting resumed [ 1300.339578] Process accounting resumed [ 1300.347487] audit: type=1804 audit(1579437873.136:19691): pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/173/file0" dev="sda1" ino=17166 res=1 [ 1300.417368] audit: type=1804 audit(1579437873.156:19692): pid=2107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/173/file0" dev="sda1" ino=17166 res=1 [ 1301.200840] IPVS: ftp: loaded support on port[0] = 21 [ 1302.069043] chnl_net:caif_netlink_parms(): no params data found [ 1302.117230] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.124084] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.131949] device bridge_slave_0 entered promiscuous mode [ 1302.139208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.146216] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.154094] device bridge_slave_1 entered promiscuous mode [ 1302.180205] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1302.189493] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1302.210916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1302.218526] team0: Port device team_slave_0 added [ 1302.225004] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1302.232632] team0: Port device team_slave_1 added [ 1302.253374] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1302.259912] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1302.286768] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1302.298473] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1302.305212] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1302.335731] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1302.350210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1302.362671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1302.422443] device hsr_slave_0 entered promiscuous mode [ 1302.470455] device hsr_slave_1 entered promiscuous mode [ 1302.525146] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1302.533559] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1302.608541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.615695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1302.623265] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.629873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1302.669848] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1302.676244] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1302.685734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1302.696259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1302.704967] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.712565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.728835] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1302.736358] 8021q: adding VLAN 0 to HW filter on device team0 [ 1302.747235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1302.755689] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.762820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1302.776316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1302.785536] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.792635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1302.810899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1302.819537] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1302.829257] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1302.836816] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1302.845143] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1302.852122] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1302.862770] device bridge_slave_1 left promiscuous mode [ 1302.868524] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.920985] device bridge_slave_0 left promiscuous mode [ 1302.927392] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.987721] device veth1_macvtap left promiscuous mode [ 1302.994181] device veth0_macvtap left promiscuous mode [ 1303.002047] device veth1_vlan left promiscuous mode [ 1303.009633] device veth0_vlan left promiscuous mode [ 1303.142517] device hsr_slave_1 left promiscuous mode [ 1303.182942] device hsr_slave_0 left promiscuous mode [ 1303.227792] team0 (unregistering): Port device team_slave_1 removed [ 1303.238312] team0 (unregistering): Port device team_slave_0 removed [ 1303.247994] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1303.285319] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1303.360708] bond0 (unregistering): Released all slaves [ 1303.404537] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1303.416965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1303.424770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1303.433236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1303.445140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1303.452739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1303.460877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1303.471995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1303.479384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1303.487641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1303.497230] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1303.503843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1303.519363] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1303.528646] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1303.535353] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1303.543217] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1303.595574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1303.702476] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1303.718540] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1303.726978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1303.741420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1303.804572] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1303.817368] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1303.826382] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1303.842716] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1303.849822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1303.863291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1303.875649] device veth0_vlan entered promiscuous mode [ 1303.885020] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1303.895478] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1303.917489] device veth1_vlan entered promiscuous mode [ 1303.927214] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1303.943963] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1303.965015] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1303.978741] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1303.989035] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1303.999829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1304.015065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1304.023888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1304.039148] device veth0_macvtap entered promiscuous mode [ 1304.046948] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1304.063521] device veth1_macvtap entered promiscuous mode [ 1304.075549] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1304.087669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1304.103848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1304.118359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1304.130350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.145630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1304.158603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.173525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1304.184619] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.201047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1304.215235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.228075] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1304.241572] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1304.255887] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1304.266063] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1304.277834] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1304.287996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1304.303755] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1304.315595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.326856] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1304.337390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.348066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1304.358794] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.368257] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1304.378280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1304.389129] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1304.398294] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1304.406410] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1304.414878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1305.181527] IPVS: ftp: loaded support on port[0] = 21 [ 1305.623440] audit: type=1804 audit(1579437878.496:19693): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/0/file0" dev="sda1" ino=17172 res=1 [ 1305.636073] Process accounting resumed 12:44:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(0x0, 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) exit(0x81) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1305.651328] audit: type=1804 audit(1579437878.496:19694): pid=2138 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/0/file0" dev="sda1" ino=17172 res=1 [ 1305.698507] Process accounting resumed 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(0x0, 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x8392) [ 1305.765446] audit: type=1804 audit(1579437878.636:19695): pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/1/file0" dev="sda1" ino=17171 res=1 [ 1305.765775] Process accounting resumed 12:44:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1305.806986] audit: type=1804 audit(1579437878.636:19696): pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/1/file0" dev="sda1" ino=17171 res=1 [ 1305.833090] Process accounting resumed 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(0x0, 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') [ 1306.039820] audit: type=1804 audit(1579437878.906:19697): pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/2/file0" dev="sda1" ino=17188 res=1 [ 1306.043722] Process accounting resumed [ 1306.078265] audit: type=1804 audit(1579437878.906:19698): pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/2/file0" dev="sda1" ino=17188 res=1 [ 1306.141728] Process accounting resumed [ 1306.197909] chnl_net:caif_netlink_parms(): no params data found [ 1306.244653] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.251578] bridge0: port 1(bridge_slave_0) entered disabled state [ 1306.258976] device bridge_slave_0 entered promiscuous mode [ 1306.266596] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.273460] bridge0: port 2(bridge_slave_1) entered disabled state [ 1306.281549] device bridge_slave_1 entered promiscuous mode [ 1306.301264] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1306.311545] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1306.330811] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1306.338481] team0: Port device team_slave_0 added [ 1306.344422] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1306.352016] team0: Port device team_slave_1 added [ 1306.369839] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1306.376618] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1306.404609] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1306.416032] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1306.423068] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1306.449587] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1306.460740] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1306.469010] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1306.524376] device hsr_slave_0 entered promiscuous mode [ 1306.570870] device hsr_slave_1 entered promiscuous mode [ 1306.611262] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1306.618783] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1306.686568] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.693168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1306.699935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.707176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1306.743277] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1306.750392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1306.759135] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1306.769366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1306.777260] bridge0: port 1(bridge_slave_0) entered disabled state [ 1306.784603] bridge0: port 2(bridge_slave_1) entered disabled state [ 1306.795990] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1306.802822] 8021q: adding VLAN 0 to HW filter on device team0 [ 1306.812237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1306.819916] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.827414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1306.837406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1306.845867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.852639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1306.871804] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1306.881086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1306.889172] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1306.900606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1306.913253] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1306.924971] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1306.931674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1306.938673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1306.954421] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1306.963235] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1306.970513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1306.982417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1307.057662] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1307.069485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1307.106491] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1307.114835] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1307.122750] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1307.134448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1307.142336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1307.149402] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1307.159374] device veth0_vlan entered promiscuous mode [ 1307.172455] device veth1_vlan entered promiscuous mode [ 1307.178553] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1307.186633] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1307.194403] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1307.211254] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1307.221291] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1307.228834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1307.237079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1307.248569] device veth0_macvtap entered promiscuous mode [ 1307.255126] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1307.264941] device veth1_macvtap entered promiscuous mode [ 1307.271653] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1307.281923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1307.292097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1307.302381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1307.313142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.322796] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1307.333783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.343316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1307.353768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.363373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1307.374116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.383766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1307.393852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.404708] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1307.412777] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1307.423074] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1307.431404] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1307.438964] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1307.447188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1307.456832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1307.467554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.477532] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1307.488567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.498246] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1307.508152] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.517759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1307.527829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.537847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1307.548452] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1307.559214] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1307.567480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1307.575502] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1307.583536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:44:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba0000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x400) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fcntl$getown(r3, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$cont(0x18, r4, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006cffff000000bb01c5e000000000002e75"], 0x15) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) read(r7, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 12:44:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000100)=0x3, &(0x7f0000000180)=0x2) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) acct(&(0x7f0000000100)='./file0\x00') [ 1309.749998] audit: type=1804 audit(1579437882.616:19699): pid=2222 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/180/file0" dev="sda1" ino=16849 res=1 [ 1309.765298] Process accounting resumed 12:44:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x400) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fcntl$getown(r3, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$cont(0x18, r4, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006cffff000000bb01c5e000000000002e75"], 0x15) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) read(r7, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 12:44:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) acct(&(0x7f0000000100)='./file0\x00') 12:44:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba0000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1309.975945] audit: type=1804 audit(1579437882.846:19700): pid=2228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/181/file0" dev="sda1" ino=16882 res=1 12:44:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) acct(&(0x7f0000000100)='./file0\x00') [ 1310.025239] Process accounting resumed 12:44:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1310.047605] audit: type=1804 audit(1579437882.916:19701): pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/182/file0" dev="sda1" ino=16849 res=1 12:44:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) acct(&(0x7f0000000100)='./file0\x00') 12:44:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(0x0) [ 1310.117624] Process accounting resumed [ 1310.173093] audit: type=1804 audit(1579437883.046:19702): pid=2236 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/183/file0" dev="sda1" ino=16642 res=1 [ 1310.203381] Process accounting resumed [ 1310.229253] Process accounting resumed [ 1310.712372] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1310.720234] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1310.728990] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1310.737229] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1310.746387] device bridge_slave_1 left promiscuous mode [ 1310.753906] bridge0: port 2(bridge_slave_1) entered disabled state [ 1310.811094] device bridge_slave_0 left promiscuous mode [ 1310.816743] bridge0: port 1(bridge_slave_0) entered disabled state [ 1310.873305] device veth1_macvtap left promiscuous mode [ 1310.879066] device veth0_macvtap left promiscuous mode [ 1310.884656] device veth1_vlan left promiscuous mode [ 1310.890573] device veth0_vlan left promiscuous mode [ 1311.033442] device hsr_slave_1 left promiscuous mode [ 1311.084491] device hsr_slave_0 left promiscuous mode [ 1311.131022] team0 (unregistering): Port device team_slave_1 removed [ 1311.142206] team0 (unregistering): Port device team_slave_0 removed [ 1311.152178] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1311.186058] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1311.256014] bond0 (unregistering): Released all slaves 12:44:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(0x0) 12:44:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) acct(&(0x7f0000000100)='./file0\x00') 12:44:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101842, 0x0) ioctl$TIOCCONS(r1, 0x541d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1312.704153] kauditd_printk_skb: 1 callbacks suppressed [ 1312.704162] audit: type=1804 audit(1579437885.576:19704): pid=2245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/184/file0" dev="sda1" ino=16785 res=1 [ 1312.748418] Process accounting resumed 12:44:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(0x0) 12:44:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xe071, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1312.752774] QAT: Invalid ioctl [ 1312.798661] audit: type=1804 audit(1579437885.666:19705): pid=2253 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/6/file0" dev="sda1" ino=16657 res=1 [ 1312.835255] Process accounting resumed 12:44:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) acct(&(0x7f0000000100)='./file0\x00') [ 1312.847494] Process accounting resumed [ 1312.899943] audit: type=1804 audit(1579437885.716:19706): pid=2259 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/185/file0" dev="sda1" ino=16794 res=1 12:44:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) acct(&(0x7f0000000100)='./file0\x00') [ 1312.946619] Process accounting resumed [ 1313.001760] audit: type=1804 audit(1579437885.816:19707): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir683942848/syzkaller.2pbrq4/7/file0" dev="sda1" ino=16794 res=1 [ 1313.043854] Process accounting resumed [ 1313.078294] audit: type=1804 audit(1579437885.846:19708): pid=2268 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/186/file0" dev="sda1" ino=16961 res=1 [ 1313.265486] IPVS: ftp: loaded support on port[0] = 21 [ 1314.115712] chnl_net:caif_netlink_parms(): no params data found [ 1314.162241] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.168690] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.177151] device bridge_slave_0 entered promiscuous mode [ 1314.184547] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.191215] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.198309] device bridge_slave_1 entered promiscuous mode [ 1314.220323] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1314.229519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1314.248536] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1314.255798] team0: Port device team_slave_0 added [ 1314.263183] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1314.270713] team0: Port device team_slave_1 added [ 1314.286155] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1314.292513] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1314.318209] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1314.331787] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1314.338195] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1314.363658] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1314.374897] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1314.383113] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1314.444122] device hsr_slave_0 entered promiscuous mode [ 1314.470498] device hsr_slave_1 entered promiscuous mode [ 1314.515182] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1314.522555] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1314.585506] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.592119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1314.598916] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.605365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1314.642380] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1314.648524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1314.657428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1314.666600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1314.674501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.681760] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.695847] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1314.702135] 8021q: adding VLAN 0 to HW filter on device team0 [ 1314.711322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1314.719382] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.726735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1314.736993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1314.745936] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.752624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1314.781213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1314.789128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1314.797061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1314.804881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1314.813860] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1314.824319] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1314.830574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1314.846092] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1314.853898] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1314.860698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1314.876691] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1314.884698] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1314.893625] device bridge_slave_1 left promiscuous mode [ 1314.899365] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.921276] device bridge_slave_0 left promiscuous mode [ 1314.926969] bridge0: port 1(bridge_slave_0) entered disabled state [ 1315.044179] device hsr_slave_1 left promiscuous mode [ 1315.083078] device hsr_slave_0 left promiscuous mode [ 1315.129170] team0 (unregistering): Port device team_slave_1 removed [ 1315.140946] team0 (unregistering): Port device team_slave_0 removed [ 1315.151041] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1315.183431] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1315.261763] bond0 (unregistering): Released all slaves [ 1315.317531] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1315.324261] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1315.399552] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1315.410633] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1315.417701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1315.425806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1315.488560] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1315.496393] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1315.503565] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1315.519417] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1315.526657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1315.539679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1315.549660] device veth0_vlan entered promiscuous mode [ 1315.556543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1315.564654] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1315.576721] device veth1_vlan entered promiscuous mode [ 1315.584928] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1315.596126] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1315.615043] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1315.626930] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1315.634190] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1315.644079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1315.651588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1315.659988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1315.669784] device veth0_macvtap entered promiscuous mode [ 1315.676652] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1315.686598] device veth1_macvtap entered promiscuous mode [ 1315.692969] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1315.720815] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1315.731322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1315.741231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.752296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.761602] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.771365] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.781062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.791103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.800524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.810718] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.819865] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1315.830406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.841647] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1315.848667] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1315.858544] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1315.866480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1315.873968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1315.882027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1315.892107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.902645] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.916736] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.929027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.942708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.953993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.967697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1315.983523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1315.994816] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1316.009245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1316.025072] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1316.033555] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1316.045535] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1316.056411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1317.120978] IPVS: ftp: loaded support on port[0] = 21 12:44:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:44:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x8392) 12:44:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() fallocate(0xffffffffffffffff, 0x20, 0x6, 0x7) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0x2, r0, 0x0, &(0x7f0000000100)="37080500632ce3d7f3bd1cd773eb686cb63789a9a9c9a3606da6e60252373c91ce14b8b07868770685a4cc57da4bdc4578023482fb00553f7ed3d988b6e24fb779baba47") ptrace$cont(0x20, r0, 0x0, 0x0) [ 1317.928845] chnl_net:caif_netlink_parms(): no params data found 12:44:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(0x0) [ 1318.033607] bridge0: port 1(bridge_slave_0) entered blocking state [ 1318.044137] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.055436] device bridge_slave_0 entered promiscuous mode [ 1318.072673] bridge0: port 2(bridge_slave_1) entered blocking state 12:44:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(0x0) [ 1318.079487] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.088384] device bridge_slave_1 entered promiscuous mode [ 1318.127852] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1318.168995] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1318.195545] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1318.203714] team0: Port device team_slave_0 added [ 1318.209381] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1318.217515] team0: Port device team_slave_1 added [ 1318.237863] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1318.244650] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1318.270940] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1318.282798] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1318.289206] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1318.315558] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1318.326636] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1318.337424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1318.414166] device hsr_slave_0 entered promiscuous mode [ 1318.450570] device hsr_slave_1 entered promiscuous mode [ 1318.500843] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1318.514124] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1318.579849] bridge0: port 2(bridge_slave_1) entered blocking state [ 1318.586503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1318.593171] bridge0: port 1(bridge_slave_0) entered blocking state [ 1318.599553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1318.637818] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1318.645111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1318.658578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1318.668094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1318.675627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.682528] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.693453] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1318.699983] 8021q: adding VLAN 0 to HW filter on device team0 [ 1318.714381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1318.722175] bridge0: port 1(bridge_slave_0) entered blocking state [ 1318.728515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1318.738441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1318.746529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1318.753086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1318.779326] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1318.789300] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1318.800197] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1318.807558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1318.816871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1318.825021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1318.832865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1318.840752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1318.847825] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1318.857529] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1318.864635] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1318.874107] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1318.881091] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1318.888736] device bridge_slave_1 left promiscuous mode [ 1318.894572] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.950982] device bridge_slave_0 left promiscuous mode [ 1318.956781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1319.002106] device veth1_macvtap left promiscuous mode [ 1319.007570] device veth0_macvtap left promiscuous mode [ 1319.013080] device veth1_vlan left promiscuous mode [ 1319.018136] device veth0_vlan left promiscuous mode [ 1319.132098] device hsr_slave_1 left promiscuous mode [ 1319.175566] device hsr_slave_0 left promiscuous mode [ 1319.220883] team0 (unregistering): Port device team_slave_1 removed [ 1319.230516] team0 (unregistering): Port device team_slave_0 removed [ 1319.239746] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1319.277227] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1319.355022] bond0 (unregistering): Released all slaves [ 1319.400453] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1319.409216] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1319.417444] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1319.428471] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1319.435484] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1319.448134] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1319.521823] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1319.532122] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1319.539208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1319.547572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1319.645648] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1319.658936] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1319.666417] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1319.682717] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1319.689600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1319.703191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1319.716295] device veth0_vlan entered promiscuous mode [ 1319.724845] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1319.735541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1319.749100] device veth1_vlan entered promiscuous mode [ 1319.762022] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1319.776273] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1319.797389] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1319.810986] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1319.818049] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1319.832285] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1319.839953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1319.852596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1319.865580] device veth0_macvtap entered promiscuous mode [ 1319.875170] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1319.888702] device veth1_macvtap entered promiscuous mode [ 1319.898623] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1319.915514] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1319.929453] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1319.944601] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.957327] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1319.969035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1319.981981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1319.995525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1320.007932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.022695] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1320.035057] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.046693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1320.059075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.074319] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1320.086313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1320.097101] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1320.109923] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1320.118196] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1320.131678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1320.146096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.159443] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.174260] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.184232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.198180] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.208146] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.223083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.235948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.248336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1320.260718] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1320.275492] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1320.284244] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1320.295799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1320.307148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1321.672165] bridge0: port 2(bridge_slave_1) entered disabled state [ 1321.678774] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.804615] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1321.813951] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:44:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) acct(0x0) 12:44:55 executing program 0: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') 12:44:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:44:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000280)={0x0, 0x44, &(0x7f0000000640)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="17b80000000000000000010000000000000001410000001ce71700000000000000006574683a7465616d5f736c612a655f300000000083c6b10f5b9c12849e2e1498e6e5cc62eb8f315e053d71b09d5292dfecd82772ac89956724dbf4090c4d58402b27235d49856078d517bc427b"], 0x38}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x28, r4, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x2000c801) r5 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r6, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x7, 0x101, 0x0, 0x0, {0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r8 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r7, r8, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r8, 0xc038563c, &(0x7f0000000040)={0x0, 0x0, {0x10001, 0x3, 0x4646, 0x2923}}) ptrace$cont(0x20, r5, 0x0, 0x0) [ 1322.192664] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1322.199565] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1322.209547] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1322.216938] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1322.224710] device bridge_slave_1 left promiscuous mode [ 1322.230493] bridge0: port 2(bridge_slave_1) entered disabled state [ 1322.280892] device bridge_slave_0 left promiscuous mode [ 1322.288582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1322.319159] audit: type=1804 audit(1579437895.186:19709): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/188/file0" dev="sda1" ino=17200 res=1 [ 1322.352269] Process accounting resumed [ 1322.362440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pig=2372 comm=syz-executor.1 12:44:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1322.377525] device veth1_macvtap left promiscuous mode [ 1322.379003] Process accounting resumed [ 1322.385201] device veth0_macvtap left promiscuous mode [ 1322.400176] device veth1_vlan left promiscuous mode [ 1322.412193] device veth0_vlan left promiscuous mode [ 1322.420654] audit: type=1804 audit(1579437895.226:19710): pid=2368 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir227511657/syzkaller.RKIERm/188/file0" dev="sda1" ino=17200 res=1 [ 1322.842454] device hsr_slave_1 left promiscuous mode [ 1322.884833] device hsr_slave_0 left promiscuous mode [ 1322.958415] team0 (unregistering): Port device team_slave_1 removed [ 1322.983271] team0 (unregistering): Port device team_slave_0 removed [ 1323.005432] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1323.045268] bond0 (unregistering): Releasing backup interface bond_slave_0 12:44:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1323.103235] bond0 (unregistering): Released all slaves [ 1323.158225] bridge0: port 2(bridge_slave_1) entered disabled state [ 1323.165080] bridge0: port 1(bridge_slave_0) entered disabled state [ 1323.197043] batman_adv: batadv0: Interface deactivated: batadv_slave_0 12:44:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1323.208787] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:44:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:44:56 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:44:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, 0x0, 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:44:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1325.041361] IPVS: ftp: loaded support on port[0] = 21 [ 1325.866142] chnl_net:caif_netlink_parms(): no params data found [ 1325.908366] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.918540] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.925768] device bridge_slave_0 entered promiscuous mode [ 1325.936102] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.942681] bridge0: port 2(bridge_slave_1) entered disabled state [ 1325.949981] device bridge_slave_1 entered promiscuous mode [ 1325.966497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1325.975524] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1325.993817] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1326.000936] team0: Port device team_slave_0 added [ 1326.006369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1326.015957] team0: Port device team_slave_1 added [ 1326.032722] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1326.038995] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1326.065041] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1326.075960] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1326.082232] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1326.107473] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1326.120732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1326.128340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1326.192113] device hsr_slave_0 entered promiscuous mode [ 1326.240461] device hsr_slave_1 entered promiscuous mode [ 1326.312932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1326.320717] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1326.373079] bridge0: port 2(bridge_slave_1) entered blocking state [ 1326.379523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1326.386339] bridge0: port 1(bridge_slave_0) entered blocking state [ 1326.392817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1326.424373] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1326.431130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1326.439215] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1326.448161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1326.457054] bridge0: port 1(bridge_slave_0) entered disabled state [ 1326.463927] bridge0: port 2(bridge_slave_1) entered disabled state [ 1326.475987] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1326.482513] 8021q: adding VLAN 0 to HW filter on device team0 [ 1326.490977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1326.498551] bridge0: port 1(bridge_slave_0) entered blocking state [ 1326.504939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1326.520499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1326.528047] bridge0: port 2(bridge_slave_1) entered blocking state [ 1326.534442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1326.543167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1326.560790] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1326.568064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1326.575827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1326.583793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1326.594483] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1326.600747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1326.614507] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1326.622829] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1326.629579] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1326.640717] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1326.707848] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1326.717758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1326.754454] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1326.762621] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1326.769336] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1326.781061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1326.788492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1326.796135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1326.805805] device veth0_vlan entered promiscuous mode [ 1326.817220] device veth1_vlan entered promiscuous mode [ 1326.823872] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1326.833436] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1326.846112] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1326.857959] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1326.865430] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1326.873479] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1326.881312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1326.891622] device veth0_macvtap entered promiscuous mode [ 1326.899904] device veth1_macvtap entered promiscuous mode [ 1326.914488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1326.924533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1326.933634] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.943999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.953372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.963296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.972545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.982601] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.993136] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1327.000445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1327.009128] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1327.017317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1327.028373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1327.038818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1327.048316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1327.058722] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1327.068084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1327.077907] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1327.087883] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1327.095212] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1327.102768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1327.111002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1327.291683] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1327.299180] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1327.308255] device bridge_slave_1 left promiscuous mode [ 1327.314442] bridge0: port 2(bridge_slave_1) entered disabled state [ 1327.360997] device bridge_slave_0 left promiscuous mode [ 1327.366549] bridge0: port 1(bridge_slave_0) entered disabled state [ 1327.402236] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1327.409776] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1327.418422] device bridge_slave_1 left promiscuous mode [ 1327.423958] bridge0: port 2(bridge_slave_1) entered disabled state [ 1327.465056] device bridge_slave_0 left promiscuous mode [ 1327.472196] bridge0: port 1(bridge_slave_0) entered disabled state [ 1327.623513] device hsr_slave_1 left promiscuous mode [ 1327.662875] device hsr_slave_0 left promiscuous mode [ 1327.708067] team0 (unregistering): Port device team_slave_1 removed [ 1327.719131] team0 (unregistering): Port device team_slave_0 removed [ 1327.728475] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1327.765711] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1327.840785] bond0 (unregistering): Released all slaves [ 1327.925209] device hsr_slave_1 left promiscuous mode [ 1327.994207] device hsr_slave_0 left promiscuous mode [ 1328.039113] team0 (unregistering): Port device team_slave_1 removed [ 1328.048482] team0 (unregistering): Port device team_slave_0 removed [ 1328.057909] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1328.094499] bond0 (unregistering): Releasing backup interface bond_slave_0 12:45:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, 0x0, 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/18, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1328.152611] bond0 (unregistering): Released all slaves 12:45:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:01 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xc}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x800, @loopback, 0x10000}, r2}}, 0x38) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 12:45:01 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/18, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x2) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socket$inet(0x2, 0x80a, 0x8) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/18, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1328.456995] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 1331.161386] IPVS: ftp: loaded support on port[0] = 21 [ 1331.942994] IPVS: ftp: loaded support on port[0] = 21 [ 1332.014543] chnl_net:caif_netlink_parms(): no params data found [ 1332.066825] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.075553] IPVS: ftp: loaded support on port[0] = 21 [ 1332.076707] bridge0: port 1(bridge_slave_0) entered disabled state [ 1332.088773] device bridge_slave_0 entered promiscuous mode [ 1332.105517] bridge0: port 2(bridge_slave_1) entered blocking state [ 1332.114710] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.122431] device bridge_slave_1 entered promiscuous mode [ 1332.176542] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1332.191181] chnl_net:caif_netlink_parms(): no params data found [ 1332.205757] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1332.237899] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1332.245527] team0: Port device team_slave_0 added [ 1332.253761] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1332.261298] team0: Port device team_slave_1 added [ 1332.286386] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1332.293482] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1332.321595] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1332.334977] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1332.341612] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1332.368704] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1332.379947] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1332.389043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1332.463242] device hsr_slave_0 entered promiscuous mode [ 1332.500491] device hsr_slave_1 entered promiscuous mode [ 1332.584463] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1332.594457] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.601880] bridge0: port 1(bridge_slave_0) entered disabled state [ 1332.609219] device bridge_slave_0 entered promiscuous mode [ 1332.629114] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1332.642734] bridge0: port 2(bridge_slave_1) entered blocking state [ 1332.649764] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.658025] device bridge_slave_1 entered promiscuous mode [ 1332.682148] chnl_net:caif_netlink_parms(): no params data found [ 1332.693418] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1332.719181] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1332.780895] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1332.793595] team0: Port device team_slave_0 added [ 1332.806083] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1332.815014] team0: Port device team_slave_1 added [ 1332.828612] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.836043] bridge0: port 1(bridge_slave_0) entered disabled state [ 1332.845915] device bridge_slave_0 entered promiscuous mode [ 1332.866030] bridge0: port 2(bridge_slave_1) entered blocking state [ 1332.874379] bridge0: port 2(bridge_slave_1) entered disabled state [ 1332.883609] device bridge_slave_1 entered promiscuous mode [ 1332.914230] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1332.924732] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1332.953808] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1332.966925] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1332.983494] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1332.993010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1333.025514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1333.037992] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1333.057871] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1333.075832] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1333.084482] team0: Port device team_slave_0 added [ 1333.091397] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1333.099452] team0: Port device team_slave_1 added [ 1333.105396] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1333.192965] device hsr_slave_0 entered promiscuous mode [ 1333.230477] device hsr_slave_1 entered promiscuous mode [ 1333.281181] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1333.289427] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1333.318066] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1333.330187] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1333.340120] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1333.347907] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1333.354461] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1333.381741] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1333.394617] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1333.409264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1333.420266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1333.493938] device hsr_slave_0 entered promiscuous mode [ 1333.550538] device hsr_slave_1 entered promiscuous mode [ 1333.603632] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1333.611545] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1333.619835] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1333.627516] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1333.636474] device bridge_slave_1 left promiscuous mode [ 1333.642606] bridge0: port 2(bridge_slave_1) entered disabled state [ 1333.680911] device bridge_slave_0 left promiscuous mode [ 1333.688175] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.742998] device veth1_macvtap left promiscuous mode [ 1333.749271] device veth0_macvtap left promiscuous mode [ 1333.755310] device veth1_vlan left promiscuous mode [ 1333.760971] device veth0_vlan left promiscuous mode [ 1333.883558] device hsr_slave_1 left promiscuous mode [ 1333.933372] device hsr_slave_0 left promiscuous mode [ 1333.979100] team0 (unregistering): Port device team_slave_1 removed [ 1333.990513] team0 (unregistering): Port device team_slave_0 removed [ 1334.000353] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1334.033436] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1334.099338] bond0 (unregistering): Released all slaves [ 1334.137573] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1334.147701] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1334.250852] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1334.272625] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1334.301833] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1334.328844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1334.339366] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1334.361512] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1334.369286] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1334.378233] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1334.412677] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1334.420800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1334.428442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1334.438955] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1334.451396] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1334.458139] 8021q: adding VLAN 0 to HW filter on device team0 [ 1334.466803] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1334.473375] 8021q: adding VLAN 0 to HW filter on device team0 [ 1334.481029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1334.488185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1334.502513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1334.518364] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1334.525512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1334.539041] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1334.547880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1334.555185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1334.569982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1334.579965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1334.596480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1334.608347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1334.620956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1334.629150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1334.644197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1334.655424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1334.662184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1334.675044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1334.684592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1334.697947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1334.705052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1334.719769] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1334.735668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1334.746058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1334.761799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1334.769997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1334.783958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1334.796576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1334.809194] bridge0: port 2(bridge_slave_1) entered blocking state [ 1334.816435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1334.829383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1334.841026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1334.858456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1334.869767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1334.883355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1334.894688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1334.906386] bridge0: port 1(bridge_slave_0) entered blocking state [ 1334.913492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1334.928005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1334.937849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1334.954305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1334.968936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1334.980481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1334.995892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1335.005095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1335.019121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1335.029399] bridge0: port 2(bridge_slave_1) entered blocking state [ 1335.036682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1335.050975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1335.064847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1335.075131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1335.090722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1335.101290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1335.120646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1335.132428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1335.147878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1335.158275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1335.173530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1335.184626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1335.195600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1335.207976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1335.216602] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1335.228093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1335.237722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1335.249192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1335.256952] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1335.265638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1335.274697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1335.283889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1335.292587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1335.301469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1335.309585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1335.318219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1335.326694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1335.335139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1335.346310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1335.361742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1335.372191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1335.381558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1335.391045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1335.399332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1335.407902] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1335.417555] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1335.424692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1335.436629] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1335.443898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1335.454731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1335.468914] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1335.478477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1335.487945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1335.497296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1335.506774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1335.526956] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1335.536739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1335.554600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1335.571089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1335.580792] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1335.589918] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1335.597673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1335.607588] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1335.616013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1335.629358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1335.641620] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1335.650984] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1335.657876] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1335.666086] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1335.676196] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1335.686160] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1335.695733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1335.703949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1335.717674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1335.734345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1335.821499] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1335.848188] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1335.865566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1335.880936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1335.921806] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1335.938093] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1335.946748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1335.956554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1335.969783] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1335.982951] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1335.993532] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1336.002382] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1336.014418] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1336.025008] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1336.038377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1336.050209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1336.059046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1336.068212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1336.080472] device veth0_vlan entered promiscuous mode [ 1336.090640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1336.098387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1336.117334] device veth1_vlan entered promiscuous mode [ 1336.131848] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1336.141965] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1336.149485] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1336.161385] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1336.192184] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1336.206235] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1336.215716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1336.232587] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1336.241205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1336.249090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1336.258426] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1336.265871] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1336.277274] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1336.286851] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1336.294588] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1336.301699] device veth0_vlan entered promiscuous mode [ 1336.317723] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1336.327159] device veth1_vlan entered promiscuous mode [ 1336.334808] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1336.345507] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1336.357351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1336.365717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1336.374271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1336.383184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1336.393730] device veth0_macvtap entered promiscuous mode [ 1336.402517] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1336.412275] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1336.419695] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1336.427987] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1336.439964] device veth0_vlan entered promiscuous mode [ 1336.448481] device veth1_macvtap entered promiscuous mode [ 1336.456898] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1336.468995] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1336.482535] device veth1_vlan entered promiscuous mode [ 1336.491448] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1336.506724] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1336.519358] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1336.534034] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1336.543935] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1336.552598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1336.561158] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1336.568531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1336.577904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1336.589079] device veth0_macvtap entered promiscuous mode [ 1336.596653] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1336.607948] device veth1_macvtap entered promiscuous mode [ 1336.615122] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1336.625357] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1336.634877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1336.646655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1336.658732] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1336.671003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1336.679333] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1336.687743] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1336.695250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1336.703328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1336.714139] device veth0_macvtap entered promiscuous mode [ 1336.721327] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1336.730506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.741761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.752299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.763128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.773798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.784077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.794722] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1336.802548] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1336.812287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.824708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.835105] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.847051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.856660] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.866959] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.876701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.886957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.898028] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1336.905655] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1336.916808] device veth1_macvtap entered promiscuous mode [ 1336.924484] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1336.932152] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1336.939566] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1336.947877] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1336.956410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1336.964609] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1336.972965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1336.982931] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1336.993845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.003802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.013982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.023484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.035482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.046562] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1337.054782] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1337.065507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1337.078656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.090684] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.101408] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.112716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.122773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.134603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.144520] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.155085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.166286] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1337.173683] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1337.181466] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1337.189637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1337.198751] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1337.207510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1337.218518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1337.230852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1337.240996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.250485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1337.261286] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.271231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1337.281529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.290775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1337.300924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.310779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1337.321563] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.332254] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1337.340006] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1337.350465] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1337.359251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1337.381711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.392098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.402298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.413099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.422633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.433495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.443034] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.453435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.462625] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.472714] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.483639] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1337.491074] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1337.499751] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1337.509360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1337.790524] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.797343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.923802] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1337.942689] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1338.274326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1338.280891] bridge0: port 1(bridge_slave_0) entered disabled state 12:45:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) ptrace$pokeuser(0x6, r1, 0x6de2, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) sched_getaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000200)) io_setup(0x4, &(0x7f0000000240)=0x0) io_destroy(r2) r3 = socket(0x28, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000040)=0x800, &(0x7f0000000080)=0x2) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r7 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r6, r7, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x1ff, 0x5, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) [ 1338.326882] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1338.336436] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:45:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, 0x0, 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:11 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/19, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/19, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:11 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{}, {0xfffffffc}]}, 0x14, 0x0) setuid(0xee01) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x77) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r5}}]}) r6 = getgid() r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r7, 0x0, 0x0) r8 = getpgid(r7) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x77) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r10}}]}) getresgid(&(0x7f0000002f80), &(0x7f0000002fc0)=0x0, &(0x7f0000003000)) r12 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r12, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r13 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r13, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040)={0x0, 0x0}, &(0x7f0000003080)=0xc) statx(0xffffffffffffff9c, &(0x7f00000030c0)='./file0\x00', 0x0, 0x7ff, &(0x7f0000003100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x77) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r18}}]}) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r20, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r20, @ANYBLOB="100006000000000020000000"], 0x5, 0x0) r21 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x77) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r22}}]}) stat(&(0x7f00000046c0)='./bus\x00', &(0x7f0000004700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004780)=0x0) r25 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r26 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r25, r26, 0x0) ioctl$NS_GET_OWNER_UID(r26, 0xb704, &(0x7f00000047c0)=0x0) stat(&(0x7f0000004800)='./bus\x00', &(0x7f0000004840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000048c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000049c0)=0xe8) statx(r2, &(0x7f0000004a00)='./bus\x00', 0x3500, 0x100, &(0x7f0000004a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r31 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r31, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r32 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r32, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r33 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r33, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r34 = syz_open_dev$sndtimer(&(0x7f0000004b40)='/dev/snd/timer\x00', 0x0, 0x800) r35 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r35, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r36 = gettid() ptrace$setopts(0x4206, r36, 0x0, 0x0) tkill(r36, 0x3c) ptrace$setregs(0xd, r36, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r36, 0x0, 0x0) r37 = getgid() r38 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r38, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r39 = ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r40 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r40, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r41 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r41, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r42 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r42, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r43 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r43, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r44 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r44, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r45 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r45, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) statx(r2, &(0x7f0000004b80)='./bus\x00', 0x0, 0x8, &(0x7f0000004bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000004cc0)='./bus\x00', &(0x7f0000004d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r48 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r48, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r49 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r49, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r50 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r50, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r51 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000006340)='/dev/video0\x00', 0x2, 0x0) r52 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r52, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x77) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r53}}]}) getegid() r54 = getegid() r55 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r55, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x77) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r56}}]}) r57 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r57, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r58, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r58, @ANYBLOB="100006000000000020000000"], 0x5, 0x0) r59 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r59, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r60 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r60, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r61 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r61, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r62 = socket$key(0xf, 0x3, 0x2) r63 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r63, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r64 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000006bc0)='/dev/loop-control\x00', 0x101000, 0x0) r65 = socket(0xa, 0x80000, 0x20) r66 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r66, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r67 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r67, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fstat(r3, &(0x7f0000006c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r69 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r69, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$sock_cred(r69, 0x1, 0x11, &(0x7f0000006c80)={0x0, 0x0, 0x0}, &(0x7f0000006cc0)=0xc) r71 = gettid() ptrace$setopts(0x4206, r71, 0x0, 0x0) tkill(r71, 0x3c) ptrace$setregs(0xd, r71, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r71, 0x0, 0x0) stat(&(0x7f0000006d00)='./bus\x00', &(0x7f0000006d40)={0x0, 0x0, 0x0, 0x0, 0x0}) r73 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r73, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r74, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r74, @ANYBLOB="100006000000000020000000"], 0x5, 0x0) r75 = openat$full(0xffffffffffffff9c, &(0x7f0000006dc0)='/dev/full\x00', 0x202000, 0x0) r76 = syz_open_procfs$namespace(0x0, &(0x7f0000007600)='ns/pid_for_children\x00') r77 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r77, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r78 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r78, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r79 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000007640)='/dev/vhost-vsock\x00', 0x2, 0x0) r80 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r80, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003380)=0x0) r82 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r82, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x77) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, r83}}]}) r84 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r84, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r85, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r85, @ANYBLOB="100006000000000020000000"], 0x5, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000076c0)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000600)="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", 0x1000}], 0x1, 0x0, 0x0, 0x4}, {&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000340)="50a663537e9cf74ecc4a82d7a6533466b98bab2df0a4daabeb28c2257d133b8b36fa54f2990ec8f061d375f04835240dc247b715a0d219628265b8b5063644a231563be140b5ebe726e9ea32c5981599a949b2f9d1115f82801e3e8c50979540c1c3ec411689fa4c3b745a743977319d9fca6a736207aff1f16dbcd3d42b78bd15f48f9671d39d2b716e463ccd8cd64aac72a715896f1cec6b8762a0bb87f310eb87d032b3393f78373fd2ff1dd405d0ca50130164f604a2ecbfb9aad837b85e", 0xc0}, {&(0x7f0000000400)="c8ed0802e5597f342e25923d45dcdebbe5b39140676aac129aec8647a3ec5a5068a4b018e199772f9910058ff9549d6a41ab2fd12cc3f3ee1fb5609a1b5880da1d29b80db63e5f11af2d42837fbaa9ae6bc7932d29998212876ee9a66715ebeb8668c3bfe858aa15a4a997c0df36fd5cc3e7d29e", 0x74}, {&(0x7f0000000480)="bc69c6165fc1cda058f8613fe17818b2dd0f3e3cd7b09f7141d2c670c31ce225abfbec24698be69ab5b7feacdfa5e2ee9c7ca84fbeef3f5553f8d037b137c3d70b2823f6a5b93934e0d8d41112f1b9b2cb11ebe58f85f9aacb03b109", 0x5c}, {&(0x7f0000001600)="9c4b9414ba0fc8dd9d2524699d9e542404bc46f1353698b6c93486c55053d2d55e6287835b3591f4684cd2b7f6f8f9618a5bdd3d39d24c3d897286eb3cb6c6b5e8539c55abb9808621e5853eb2827058d0e9171975808a0d57215a8b3663e1ea6bc0f63c74a7917571f67bf825f665f786f4dd60650e78ed87c3489e48aa7ac66e17cc1b6812f13b20ec2887a19626302c3b1c2f99b5cbc97ce184cf61c4f292a8a7e32db7163dc36c4c88ec17607893f7f645c883a5969305b36b17c0f268002558d72cc4fc285603c4c06fbdbf906664fc514f218b231692c8a55cd957cbcda5131a90e3daf5ea9447ed069927", 0xee}, {&(0x7f0000007440)="c7535e48046801f14981abee7395567167d1482f88c0dc358c0cb9618b719df0292fd9cf00119096f736c91f1f73629101000000f85ca200000000bfe7185fb968d15bb630e88066531973f4b3a78ee88527baf9fd7eef171f91fbb32867fe5565bb79ae03fa1acee595c6ac47185c477674a3975c1defd643b6cc8ef5c5d4f9f589cbbb7aefa10b331408e4e7711969c55ffeb9d03a33a5c987c951551f1f4685e88e11ccd69c010b161b3e2740f3a697988c90a0e45075b1240d0a528b7052192129e10b2e24729706fa5227569a55a20557f5", 0xd4}], 0x5, &(0x7f0000001700)=[@cred={{0x1c, 0x1, 0x2, {0x0, r5, r6}}}], 0x20, 0x4000001}, {&(0x7f0000001740)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002ec0)=[{&(0x7f00000017c0)="3e74055fe34b028fa423b0e34553b9af13a00650e53fb76e3559701081efdb7cd04873068f686178c14bdd0f30e74c3f9e617b81c72d80eee90c1c0d30999795057d8ccd9ef2902042830d14e71dec14c67d36fc0ce5f1c1976a0216e9e1d39b3dbb43b8196b396efc52a215768a627f145297e2caa5ffbfb037f348fd9aea5c2503062f6ea4c9e73af7951d960a1bb8715d0c4411bf9e", 0x97}, {&(0x7f0000001880)="133773cf072a4d75b2c7cb73bc5daa127905809721ef3171b752890a09157c2cb56887a487199c03e4735918d0ed9e0b2fb9c52df4863a62429e0856f2fdf57ccc68d1b3c40562c5b2341734484a940e9ad8dff8ca8c6730ec15402e8771dcdfc7529cfe8885918818db9762af537910b4cb5a6e72e5ea79f18fb5717439495f97981b2e78d1db7e3f58623fc464376ff0aa26f1e56937be1ca9099335b0f5edca6bd2f8c250eecb7405f6cbd3959e91cc905088a74775c1a63d00d4f658a718a51ab5ac9e4096ac40f86c669d886108524d6ccc61c1e121bf587f86faa344562517b923a6", 0xe5}, {&(0x7f0000001980)="a2dbb3e121cb822db9147bf44a5dd4e3eb7fdaac2419890c3a21e4edf11d4b3ce617bd706e9fc444ed2ba2ce20a11b17b70e39d123677b0e03b120258649d72fc27e51ee877eb6c8b13072c32158374db9732fae3898edb7c18b28ed60fc0eb415c4a036ea515a7fb1", 0x69}, {&(0x7f0000007880)="ed0941281476c2ac8bd15ecb40904111990f897844075c67892cae0a46dfd593f80ad4554824481503265a2f558861fe14c4064d334affd79653bacfb601501dd689822a19cd348c9f1422d7af207444df85d7e3a8cda1ec5cc5edfb11617f89ba0fe8aa3e7e402a8f6a4dc8297288461fe6bc7a21898803639a7b57fcea6d6e5bb1e19cfc253724d4d3e2d219d43d4748310a55284ec1e0ffbcef216656fe0663445a8feb6a0834cf0bd79f3beaad12894fdb32a018f596dda23f50a48e020b32924f61b18a726acc679d9721223ed101b79b8239f2fdaf31050ac75bd7", 0xce}, {&(0x7f0000001b00)="5d5c5fd0d079723f1fba1e24793c83a49a9b6e128d2351ae38b6a910afca5d20475c3e7d2717f896738f82d5579643a5d1591bf827833e7118366db72490bcf93a7ef4efe0e97e0a35e4d7d0c0276200cb8140cacd12657d06586473cd845dad940db9c8a23c1802a1", 0x69}, {&(0x7f0000001b80)="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", 0x1000}, {&(0x7f0000002b80)="6c1700079ede228766bb2a71cf2eec6daf0d4942bab252d6b220d7c8be7fb8720807c453b6487a5149c79adda64c7ba56c54e24ff49a70e0fc4f7be43e381f4a70b3f4f3970a7c1e7c04e5ed11bd6b2d2e419fd0c0eb7a2324e3b0391f57c78e70dead320821c46da4c1d63202270e3c6b728f6251824fd2fc4faf68c2bd0e525875ed268b310b", 0x87}, {&(0x7f0000002c40)="e9fa93fb7811ebe99dad26096f35cd3dd9f18a5dc2a057056e069fde36f2aead3acefa4fac3674e7d20db3a43ce3a487ca49bb38b6823eb8df6b951ae00fd56ac26d21ac9503da6893694e025dc0dad944139261fd667658a61076f5b3d8f5ede7d5e4a3f4f9a931a4dd24f614c708c9b4e13df3800403569deb677278994d77de2c70463108ac3776764ceeba183f5c001230caa53a8830064b841b0c14fbd5b391bead3c366c0aae0d8a1f354a1e85a6ff1e3ec5b469fe2061e3a9d1cc7f80a8501a887db8708018a78b13e98109ef0291759133bfea43cc9027d5ec43019a5f1dceb8477cff30818e01d56bd2826d292f6483", 0xf4}, {&(0x7f0000002d40)="4a2c932b5d522916b36b996e8ea20612e2c1c7fb56e6ddccfa0287a07e54684f99032412ffef5b99bec2f0429a4f2b938b01abec45406099676b9732b136cde1773333b4a90d00748d6772de196851070ae382848b3f9908f28274693935f617", 0x60}, {&(0x7f0000002dc0)="811e2e5fc0ef3798ab88c6ebefa54a7c9263d2ed5da8ac62c0f41b57a663e0459b6fbe89b0b2e9f1f43a0384113697db9ffb4eb99a656323a09823ce78583a774ab26caaf9831e7ea816ac11e46e732508743b54c7bde88959c221ddf8ffa7401a9c5a6862b9cd8f28b2e776197b8b2b45e6ae200dae4c22fb480fe9d07088b686ae9a503d3461d2bf61fee3cc348686437aac9e63d8621e9d872a5083c48338d67b27b49a1d4bcf7bdf2923eb4399212d9b3d4e799197aad18dd912b907d558d2787463e2b1e7", 0xc7}], 0xa, &(0x7f0000007ac0)=[@cred={{0x1c, 0x1, 0x2, {r8, r10, r11}}}, @rights={{0x18, 0x1, 0x1, [r12, 0xffffffffffffffff]}}, @cred={{0x0, 0x1, 0x2, {r81, r83, r85}}}, @rights={{0x18, 0x1, 0x1, [r13, r2]}}, @cred={{0x1c, 0x1, 0x2, {r0, r14, r15}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xee00, r16}}}, @cred={{0x1c, 0x1, 0x2, {r0, r18, r20}}}], 0xc8, 0x4004001}, {&(0x7f0000003300)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000004640)=[{&(0x7f0000003380)}, {&(0x7f00000033c0)="79d727dca8ff4187a0041f3086478c144264878e3905feac2c9acf3529c859aff8d0aa6b0c3768a133e217d26022c03ae5d071db0c2d711d013f2b1ee00b39eabec819d0e3d372bfb40e2599b26da3a1a488793e5dc38724da74c582acb4ba67ca1e7380ee79a7a66cf7e8baf6fa1724bc1dfe55e729f42fc14dbe27c65f32d7efe5ef2cdef2f2ead63abe810530c41a5019e88712a5d8e05a8117e5764e6b53421223", 0xa3}, {&(0x7f0000003480)="23aa65b1a4a3b0d6871705e03036c114a0958db5082fe2efeaa515aecf576777203117c6ec4b004ef0b9", 0x2a}, {&(0x7f0000006380)="77e1448818e916d7585124e1c1169d10f5e3fea5acc7f7b7c7bf9de602d7edab6af3ae465e4af5033586ca4c707efb25170c913fa4d06944743218b0840d8c9609e9edbd8b99c0fcb3b3eb61e37208c71d24cca336f321ad17a7db170534", 0x4f}, {&(0x7f0000003540)="367c469afde3913a191b55cc322692e3bf0f48b279c46483eb9d9beddfc249b511d4826ad943e90803af5f1fcf6db65f22e60d505b1a57e101bf87915104416a08719a85d6185fa6602e90e4b6854fe8d2a16709105db8a95ffe8a645e9457d0205aa030bc197632e4039139eeddd450317dc40fd3e698d8664768c1cd306e1336f0deb2918563b9dc521a75b1aa9bb1d0b4b0a109984d0511a5905121d15c1a655e941a354c10f281298afd7b897887faefebf7d13716ffe38d935ccb7bfc2eff6fa8e67d0b1f8d73f7c89e85905973cae90c758c70f401bf20c3b441399dc80a7ead291ae7acd6df83a5031145b082900944b01dee109712036049c6b994b949fcc543a297f97c66a57e4f1640bfed4f7fb693d899c00b400c2fb5a9edb6cca1edb3700e52cbaf5f3c89872dee001f00a3a7cddd98034377a7293746ac16b6a1aa8612708ba19f6d1501ec19df3d4769b49e34540c4228001027618f2191875174d44a21e3beda6a9ae45ad53aa084413d5ce05bdbf9816bcec15a52bfc0a7c2f031d3356c99067c07ebf13b0b8d319b5bca537714311773431c39e8319915597620a789c38f481c3661ad5076b9850e941fe1d85c136f2458196feca8686a79e4c626b5523c47c3feddad45528ea106dfca29fe63826df9c639dac1be808497744ebd1a3021cb89d726a3e578fab1689f0c63324aca9cc1849853d369ad28a3c1210a9c69ee5e87ccbdbf99d7af78b7eea88c3a5a5fb8194ca7553cc2abb29b96dd0189dccf46d58d7dadb0ce04c35ee19183d952c7fec80fc09714c4f7ea0cbd2f408dda4cb72fd88b9b400ec93a8245e179331da3487a841b3674b61b74c3af4e9b17e5465b4355dd59872105509699264e0e8566aa780587c31d1eefb158c4a8352445e3fc31cbed91c7091fe38dd0408ced8c4d9ac503993df57c7695a335e0a16cd7bb92460427d2be371a6cb6c0803105426def46a79ac041a747d9e0afc4dcfa4e8ff773b691084cc0f899e73ef4990c4e2ba28e2cbfabddb466c492e5925cae621d5ebf133bea855d6f50384716585668353370192947754192600ffcb942b0423c4bc54b8213dd4bf0a7178eb9f241b369d2eb1b29883a9606aee760d4269759e8d3afe2ea2ce69535759ca70c6a727dde8e679841bee74d960e420c0aac6a8629a6816d13d2ddc44688f4516e4d2f9e715fbb8f225155d4c71237478883112c9909eef9d4317633a36bf37a432735d7f18768720b86463eeea73e4a0934a1da35c5e6028db5b21d3eef55009285cd27885aa45b02343ddebfc08e14e2b0188e2bbbb0c7f0b21c33c4df4a416934adaeffbba26d65b6f450bf6be08b0ba214c41cd7892b016ffae12c89163c8f20b7f3d0fac53511e4c70d67bb8919112905a554a7a97a1dfbb76be6021f5c380a70e07991a2db4c241c1f72c8c758ef9f1ce6b05169d2c779be2ec7a1f52fde929ec3b261a3dfbb6ebb45b56a8cddb46f447dfa2cd0c9c86edbc9380c8eb28ad38a19c7e199e9bdaceb6619cdeaeb64269a934868658d3c2637e1ffffae4f6f3cf63422eb2b19c1e63c8aece94a155b0bb71efcf92b784fbc28044c7f01e0d3c3de70e5b356964e10f422e63e01d17bcd03041ec614e520bb544b024c88cfcde38768d8fed5a79aa179a9074bad844120601adfb8322ff74242071842056f8d16cdbbd7a63fcbfd646838a7878f98dd811af40942117fc7edd8faa1560406d919277a6e95dd11ee1e8ee993854dbe71b3659af002c6b3c6d9eee6f1f58bcaa6ffb653401aab43b713782d01893700fea4e12b72c096caae0b5c368b28894789f5e189d5f7f8039208210507a751ba0cd8e12dba261834e8082fb4de9da98177c1bd6f2088599074a523428dcaf2210e3835a87886f5d5d342095ab751140043bb8fcfc6b9818ed5b268ca420ffb68911f7f327fe837ad2d9f312d32047803089dbe20f0e81454018a522eb334e0d6066b1cc643959541c335a6299782e60d3bed4ae293865f55a40709eb594458927c3869b00e596ce97a7766c032fb9c1bd170bed1799a4855804c170a1a50898df29e4366c5c59f14fd74980ba49b02d3c012580b7b72b51c060e2cc6a2dfa00e3b7af45d4055976ac7a13cccd9e885e0443fdbeef4955ec8e704b7aea67f096d7abf8ee20ef1e19bf5d4463c0d4bcaa134ab53e1e7152efc81a35b1ba26bb494ea9dbafe615f22fa738de94e8e1ee3e1dbc3ccb228805b2919af16976f68b7bbab7c671217ca02768b2b110944ad262a2b7e19af391a6242faf0627b237eaa04a05fa13f21308b480893e02f6c383fdafa2fe3329423c8f21ce9e4e797bfe22d734d1bb84cc0b2ddc3dd538a3b42e76aa99185e4a8dd7e52edae9bc0f7816d4b34d681934af8139c7cdbe909ea0793c8cf726d8b9b3a732dcfb60252a97c11f827888fbacba4129711a951648a1b305d50d10f281a1b5bee24f1967e4aa56c7da0c41677d18f57d6d85a592e132aaf6ef1c2e2cd5b16fc310c404b4417866dc600a559baa627c4550b2a0cd0f0acee9784487b66884ebddfff5d0deec49de4a7224f9f5d24f995f5ea599efc72a7728dae111828933f71111901777dd3dcdd5594415dbcb5ee3422020796078cfb325eba61cfa72cc20dba89045912937cad24cf0daa8c6fd0e5114d5627eda4adc633fa81e976371a331d512a99e8d7bdf24bb2dc5d9d58ac58b0fa4b9dc385404059ee30bd3b41a5512683e71fe1542d63f5a3de39fd6a9db35295f60952120c81b106c3a5484ccb87e94ee4a62c18e66f24e84fa5ed73d2e8a0cd01e4345722801a95e6a980a3e0f9142163d804986af137c86d9853bdaf5c1e23cb1b2d0031b3a86beba6aafd31e5fbdee245b3726cbd2ba75a72f127c7ff77a872017d40b3a23f37be77d354ee7c45a2223526207a39e135c7af402b2762ba539769b189c670a4ba7b5a1bcfda169b04162040db13b5ad08a36f597d2ba938b256cd506658bc2295702f525113b71b26b9b63c869669ad1d4944de980e5e028ed041665e5d1de2d022ee91a29ecc66b4a872c9585842b0d1b4804ad65a15a6ab3b782707bb9ecd0e7e8f861eb4d5715f10e20c2c3cfbebd65542d405441cdd5294f0648e7b588f74bc8e7318cddfad42f7722cd1bc102110a703c778d714907d2f14126457c06a54cb8139103cc50489b1e87bf3394ff368b09ff54155bdbdf274ed144780d49bc84e5140303b0249cdbe8b12af6e7ce77eed7ef0a211ce61d7c7eb2fbb06348c9e14e60e2c9af5cf2dabc5aafa52accac8c779427767868eeff387bf4250d78ab245efc95b871587ace916b456f6441069d1f32caa26b0eef65d45336a8b81a770ea70cb6f7a5cb579fd9ae5d7d31fbcc7ef2bd67a1669c2463289a6e9742dedf698afcc2c55ed5d609bbe050442054032707f138a3794b7bf52a5e470cbe6f1c2e9dc1489476b2ea722b84b04e510330e6c3b447453d6d879f5186f085f9bb64ca6fd6f9713fea5e1aca783e03ca0289c1f48fd43fdde2c0369e416da98f00aa3fa1e3ae1abf566ba1618ebcf57a37347b169dae568ecbf4f27756dbc33933d2426ece09b927c40a412554241ab767779024bbcdde48d9740d6119e1e312083aa2435cabc2afa1c457df403162a2a1cdc43015ae1143bc2d011df1ccd7b6c41b071471d23717ba7f1c7f8202a3488a0f84a98ad79b8a53852c81717e5099fb0fb0f7bf05e8f228ed03b11b8a028b62802e2dc97936ff105277a7bda987913577b3fc27fc5f75c0ce57b59aa20225663b4a6d9dbf48e1040f5ca4c48cc74e7bfbb8c8b4eeda0d398cee09381f72678ee9432425a3f33801e8475731ea3c008a6a43ebe8d582c6ffd912f329e05710cb8009184957df5168c76221305e1fd1f704a8bb0ea9c106392d575333d6f1c48c1be2444f595f652a0a1323e1fa66d24b1f2d637888ebbd94bd03234a2aab81f699367fbf224b86fcfd59476e4bd9a3aeb3408756489bd91d08fb203e25a2f52302baeebada2d1bb774c5a8f585bd6957ee75d7d1196a618c574b88dd3551c6fd5f24f678872e02e6e1cdfdb40a0fecf51ee4a8bc9e87b0273f7dedbc68562f11d9d7aff1d022cf1f956bb6bccbed4b5553de8f10832883e1fb0ec25762c4544dc1ef5813ae74b854b006c3b9cfbf8ad08a8a37034620a15bd2a0b7ea33f11855090afb936759e8fc9f61314fd0c78cde8d905fdb2d49ce9f91c1e5a4af2c37dd095cf1538a4c2eeb5301bd61b13335e0351b05db0eb6a53762834281748e73e51e1ca9e3b2230c723e57b59a309550d0baa9b38ce3c0025fac3597e4205b7a1331d2d1bacdb64935341e8a13c01466f6c0f90d69205235e517b7c1856215dc2d70a7d05b96167ea953974c9dd7b4b3af62b49e9cc599837758e64455eb0fe49dc3050376279826668ecea264a07e95993fbdf30031aef21d28071211deb167649533a0768ad76134249097cfaf7a6e69b41d345bb48fc4937774abf82f7e9f191983e43d21d6e4b0e319009f2f19986f44d6512a4ab63f37613f98c65d08398a6534150e9ed08436885412364addec181600b9f17c6972c600407ccb425c3a1cfcbb59d9021c6a1117397f9f3c4051af80f584fdb2f00ced43189c6f63e699712a92a8b523ffcab4941757df48b30a6fade6c198cdbf5c8950378fc51ca8144a23dedf57802bd1fa970367722020d5d4572dcbb73d84a6125827487a7ad0efe6ffd942654881cafd4738f82fa5441ce0d62ba68a2c9c4fac00b6cb139fac30cf81b6f3f7ec3ac38d8a8cc84ecccd4b03bb368d8c51e53ce369a218cd1022652edfbf6d155bb89bef667f656dfb82601aa51c99e90263f46a2f54cecd7294ad7114a2d81e88d0374959106a31a588c68d8ee1550d9793534bfc7bf645f0e606e7944b5ed8585dad10f56ee392d64a0d487f0de0a3965ef7b3a466108a9c79efb5ffb5f29a143b791831b70d38b88db18deb8bdbecf1960e552fd990d253808e138ed91923627b54bce416c26c1eeec7240b6195fee5c55b9d555c019bc06118137a998a38f2a6bbfbfa8187609ca976a1da73b9fca14ebb63bc8ca806ae57fddf31488155f35c7ff914158909ada0c114f205a4511bfdc93d8099ca6cbe19393afd801f58ad290e8e03b6510bb8f08cfb794543e7c7ee8a6fc32260e89a36e08ce69ce14b42ab2a6101f3b5d8d177192627dd289d77819da3a72804d783c7bfd0b275783fff810d48016be2a67226441025b33fada80c47902fad6655319a26999292678c95cdf9d21aaee096b4868f4695875b80874a6ac5181780c2543dae928c1f747b8af7831c543c25b004fad3a3d32411b729e8dee09cedbf2cb74796cb11dfb90db3e646f17e2078bffbebffd2f9dff353e991a2c5ec7ced2f6458792c68107034cf79fbd3f177825c69ac792e14348af692757cbc4c675cc9ccd6b6636d344ccc191b6fc2ad3c1be456fff78ec4b64634560039b311b074fce04711fbb7aacad840d6a25d44e869132fb888d721cf28dd1809a26ec5937b6da3dd3aa0da48acc40399e921632aa48119601b37baa2541edfe8bd72885a6e20b9b16e190f6a32611f328ed4ecaf57aa2b90b895fc68ff94cc4f3d0dfedc8f8242b2f5c5c719ab1bd86b99c21ce7ec33228c9de1c0102ec961d2b15374236c00c929a55ef6029ca7392339c1348d857c54b44853bf260886df7f61a2611309a854a26bf846ab329a8761222801071f64b57dd525bc66dd50911722436d646669a602d", 0x1000}, {&(0x7f0000004540)="8b84bb186b2a824d01fb3696190f83a48c41683b73da03a01f21ec6596268e416deaf321b8dae7349a005577e54a1ff49114e5217708fac3e1e7f74d5137657dde9a8afaabd2dd9d42c93ebb77b2d5d4d99b09d9c7407b94674297437dc0360abf81b83c3f5ace04cf418072a7f152494455e12cefda5ae1b3142d9173f5c803c08577b4fe1d19811541bd17ad6602eb3bb4e6ed8600f6eb70c05c354dba6161bc1acbddadd30b44fe83872dfae6f1b0b01630a62db5cf48dd0767a1319748ea16b61649c33c35739fc4d77e25fdd3c1e901438c6d6e0f93955094404850ad927560817d", 0xe4}], 0x6, &(0x7f0000004d80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r22, r23}}}, @cred={{0x1c, 0x1, 0x2, {r24, r27, r28}}}, @cred={{0x1c, 0x1, 0x2, {r0, r29, r30}}}, @rights={{0x28, 0x1, 0x1, [r31, r3, r32, r33, r34, r35]}}, @cred={{0x1c, 0x1, 0x2, {r36, 0x0, r37}}}, @rights={{0x2c, 0x1, 0x1, [r38, r3, r39, r40, r3, r41, r42]}}, @rights={{0x1c, 0x1, 0x1, [r43, r44, r45]}}, @cred={{0x1c, 0x1, 0x2, {r0, r46, r47}}}], 0x118, 0x84}, {&(0x7f0000004ec0)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000062c0)=[{&(0x7f0000004f40)="89d4fb857fe52a95cf785550ce17f8333bae660d3a1e242e448c1c0f8289dd4aa10322fc99c28eeb687ac8160bd45677a41f7502c96e76dc086c9129ad8659692f988006f0026d28f7761e478ea4438036ccfbefaa1b38a65e60b14620cafde2cac208d297554aea8f3795df7edbd5", 0x6f}, {&(0x7f0000004fc0)="c21e92f92ef88630c3fc8579b8654bbdee8a3c094197578cab4b597af4dc1b20db0252d963073b374908b7fa0bf4bdb9a9453bf0f6d07e1a658a3f1bbdb790379d69533e18669db2b9591cdac56fe0ffed52b232b7e656fe066bcf09f65315faf146fb", 0x63}, {&(0x7f0000005040)="a3366ce351b7a26cb919894303e13c73052c452908628fbd9917398ce4bcaa98f9e589c5746d1e23e2cad737b28b3d535c6245b816746e3adbc96a7e789216f0aab4ec7d2cdd427745d37f1506c3581b7473656942a30167f218751dee294a3da37a061cd4ddaa85994f836e68aaa8627f31a04c983a4b0502e5aaf704e685e299e73312435acbff599e971772f995c503f2241174955fde6bfa2df1b41a8f2afadbcc29505ff0bfd3d58c16c1842e62e1c75a1dfd789a1450d0cceb97bd7a054961dc688dcb0999954fc2c39bab9d64db1176aac53eee6decd8dcc1e7229981d3baf2b4824188f6c8e1cff0cca9", 0xee}, {&(0x7f0000005140)="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", 0x1000}, {&(0x7f0000006140)="a2b1400b206256877704f03a3e41fd9bedb75a9518ce16c48ee891080185a6b49b9a56b1113220c8d2490016c438ff14a018f42874f5c18dafda7a485c59cdedeca9aed670dd042dec57dd49d98f", 0x4e}, {&(0x7f00000061c0)="7c4ace4919d6a498a402512940d1ee48e6b74904c32c2e7123980d01b1ed7874efbce2c8ce586c7474dba3c3571eef769878b4205e2726866f02df88967f89a8475c550ecebd06aa8f9a87e8d7cc5fccd190a05d952b1c2e213168154d866d9f93a8673495a1bfabe86dcc1cede4139459f31f8dc06cbc509f938c36dcf948bb41965499bca6ef390ef24a044c3a4fe29665d55c453c6d000712517a844c7343f4065e1691c24729262ff2208f63cb65cd32250280314161337738674f35e48e2c4d195d4daa114a420dbdc1c209ac", 0xcf}], 0x6, &(0x7f00000073c0)=ANY=[@ANYBLOB="40000000000000000000000000f8a24186d8366c9a7d8d047d5109ddfd1326a7c30090b9cd", @ANYRES32=r48, @ANYRES32=r49, @ANYRES32=r50, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r51, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r0, @ANYRES32=r53, @ANYRES32=r60, @ANYBLOB='\x00\x00\x00\x00'], 0x5d, 0x4040020}, {&(0x7f0000006400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000006740)=[{&(0x7f0000006480)="67efffc7d25f45f072e76d8726d8375156018e66e30232de7e4c68101c8170a1422e9ce4ebde45848b3c3cd6f452867cac45db1a835dd0c9d19a7d9ef88700289102e6588968754e810892581ffff13090a87de61165d942cbd06e87fd8185105ae00dd644639b97cc2281a9d3271a2df90e988c6006155309911e40b2859c0e3e8eb0f4e5dc45eb44acb9b4bc1a879d1640c38628d9", 0x96}, {&(0x7f0000006540)="d985551d", 0x4}, {&(0x7f0000006580)="31f6347c1a7f66cd32b608d019d544f06218a30bd22ba74d6b26aca056dc7c036012c6f5dab60ab5a514784dfeb763d244a81a152a0e7e39c223ea35d6c63ddb0c09702e6be569a05cea568b0e5c69a44f159d2bb7d10d50ea900cefbedefb970735c1967db2c69b506a579f59becef26face06e5cba7fb1cb6073ef6583fc9767711ed7182f71f61ffaffd0", 0x8c}, {&(0x7f0000006640)="2dd6ef28dfe90fdf8d983a6286a6f21e9bed82ea36a88c08a18adf2fd1cb25ca75f481ef437d253056842ebe22062fd64534b70d7622f3922db30ef3ef4e116efdee06474777da6ab0ecc4136886cc077e8053e3b925caddee49963c5f23a492f0e34aae872448cf9990b334afa348a336a50f6ae27cd7bbe27db2b24fed42cd079fcd23516f40c44dc6cc6380bdf52dbd6bbad08eb82d8385be57c62d6404dac5cf1c2b04626eadf179dda56e64cb7f9480737c9a0875f17874269e1f322e3318bd698aa93a8cc5ab6c25ba1b00", 0xce}], 0x4, 0x0, 0x0, 0x4000}, {&(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000006b80)=[{&(0x7f0000006800)="b1654be1b87998e166ae5dda8ceb70cf6758e06b9f3761ceace8c18ab8c4460eab9281d995403bbb2a48f9d15145a2b9c5c95de6afa6edbc127103bb4caf68e429dd3961fd651bf9bcc27822bc3165f448c2a2c216a23df1b5e5fb3d802c46c31df17854d211791c1f0f71bfb2b12b8bea3326bd5ef5ec299b08ba0c48b4c45b6d6617f693af88c73435e724cd24f2caa338ef9a9651a1220b54ae947834de22f57c48561986b2eb39afd0725328e8aca467b40bd79070477536a8d7", 0xbc}, {&(0x7f00000068c0)="03473194ce808c16dd9879b2011318547f1111e1a759f29d33926288ec6895d444f9a5739ddcf551fa7bbc2d30ba650ff1e5a428a159f86174f6d4f04478ef62d806963356f88a220c317182d9953a46fab18b1c56965e8d102e6566c0add0938ae592665ea5615b4b0382aeff65c4cdb73c1777eb7af22a924738a56376a05b3fe47c9a6a379936f9acd14ffe5254e42a7ba78ffffd4dcf7299158146152bde4562a57c2273e103b1e11b69f7d5e89d649a3620e94bf10b79ecb17e40ec88a1546ad443054af6304eaf41", 0xcb}, {&(0x7f00000069c0)="3637ae9116f31f971d8eb799005bb19ac1a5e20d205e20f11b7f6044128384d9adebec981770db83cd95a6db88c03f70412f2ff41c421fbcc45584affc03b055a37aaebd6cfb71bcca22533cbc1e45f1f6620307355ab140eaa6d2e235aa2c220da53f26767c2e8059a8034a68fffb385933324355e4edef1fc4c5f4b3ca1d02e3a93366bec3b6dcb6e2e93996755c9f645772ff14fac9470f3b327e9330e5552e441024ed0858d6", 0xa8}, {&(0x7f0000007980)="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", 0xfa}], 0x4, &(0x7f0000006e00)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r54}}}, @cred={{0x1c, 0x1, 0x2, {r0, r56, r58}}}, @rights={{0x30, 0x1, 0x1, [r3, r2, r59, r60, r61, r1, r80, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r62, 0xffffffffffffffff, r63]}}, @rights={{0x24, 0x1, 0x1, [r3, r64, r65, r66, r67]}}, @cred={{0x1c, 0x1, 0x2, {r0, r68, r70}}}, @cred={{0x1c, 0x1, 0x2, {r71, r72, r74}}}, @rights={{0x14, 0x1, 0x1, [r75]}}], 0x110, 0x800}, {&(0x7f0000006f40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000007340)=[{&(0x7f0000006fc0)="319f160578a46f9f7788db59b7ebaf0cf5439e3ff512725855037c95d1e3d8cbef2a04db3a98217b4d00a0620e182613271566275964e6540c35cc4d2818aee03b675e22499933c8449fdfdd15056183b193822b58f8c3313c862b24e61fd6a04c2c2316a18907b91e28761f49b55a894ec5eedb2d5f38131325", 0x7a}, {&(0x7f0000007040)="c252023a22b99644472e6ef170dd7e78214ff8117116869db7628f5871643c8bb2ee57ec9e57f98795f152a0ad3364b641c5dd21882200f08014c457b3bb5059922916aca800881164a91ec70b2745a6cc02631913a21302e246daa58d1aa574b1bc454f85c425c707cc90e6d22ee26026ba2e325992b5b15e88e0742f219630272c11374188a5a31d4222a4167af8ad98011c1324ec4243884ade9653517d3743d459ba71611a7ae1838218d04afd743ac49c12f2d4d14e889e334bdd05", 0xbe}, {&(0x7f0000007100)="1a32c943b43e489191bfb9b54326f0f47a60369b6d8002694bf86fb0e6e1df6db38099c5e0e65c26dc9f55882a879aa89fad01ffdda9e9c6f74b8a3d434c9b6827a45c80097aa69b77c00b8244a3d4d11b63f04a3834b95d7656974339c731e0a2f242cc0a9c43cdea737f46c14425f35cdf49ed45e4a254349361a16061c8eeae", 0x81}, {&(0x7f00000071c0)="bb6460c8e0856a11f675ca7b11c098130d2dc7bb83f859af48fa83c0441bc60162dfd5d57565faef935439a4ed0295f3958a70ded49036f6699f7c365d1175ae6405f231a96ed85fb956b8552aab24e0613abe65d441b851a560a8b5ab3c04abee352bf2ba628db69707d84edc58f2dbbe", 0x71}, {&(0x7f0000007240)="7ceccc1dbc2f3334db0f096a49ed18d9ac2862815a3eb5c4ae2dda962a2d70e4785ece0ee00520306eabff4ca0e5247208c3804b0a9ecc8e79a8c33804d6f9ce7e31a2d21dfc6b72738ed806da18410b42454b2b9f5265c27c4fbac2a863de8df083f5d7cf6cbb83b257ca4e6d82ceed26bbf677204fcc93645386c5f7639406ff26faab6ba864fb94a90b6c03e76ea90e52bcd7c0aa162277fd93834ce9c398dcf3aacb2ab5371d7d4be351aa5275f62a7568372dc11cd2b9568ddd88ff973865cdd65f2b1f0727fbd9a0eded1d206231743d695b1fe041", 0xd8}], 0x5, &(0x7f0000007680)=[@rights={{0xffffffffffffffea, 0x1, 0x1, [r76, r77]}}, @rights={{0x20, 0x1, 0x1, [r78, r79, 0xffffffffffffffff, r2]}}], 0x38, 0x4050}], 0x8, 0xd4) execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) ptrace$setregs(0xd, r86, 0x0, &(0x7f0000000040)="70041228bc5731433c1a42f12ad08f006be97c691406c7d3411b32452e45ff54d23cd70b6e7b442d77713e7a2a5c52c7a99139b03d1c9fca433142402eb07434f1d2f80772d7674e7781a1686c90d93e7556d741702aa961f309cbfe6bae72a0c9f107deed9a2f7911854647e7a4") ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:11 executing program 5: r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/19, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x0, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x0, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1339.191942] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1339.211892] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1339.230267] device bridge_slave_1 left promiscuous mode [ 1339.235830] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.290818] device bridge_slave_0 left promiscuous mode [ 1339.296495] bridge0: port 1(bridge_slave_0) entered disabled state [ 1339.443818] device hsr_slave_1 left promiscuous mode [ 1339.504145] device hsr_slave_0 left promiscuous mode [ 1339.568742] team0 (unregistering): Port device team_slave_1 removed [ 1339.605250] team0 (unregistering): Port device team_slave_0 removed [ 1339.627604] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1339.674486] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1339.788126] bond0 (unregistering): Released all slaves [ 1341.610957] IPVS: ftp: loaded support on port[0] = 21 [ 1342.413401] IPVS: ftp: loaded support on port[0] = 21 [ 1342.455198] chnl_net:caif_netlink_parms(): no params data found [ 1342.494874] bridge0: port 1(bridge_slave_0) entered blocking state [ 1342.501405] bridge0: port 1(bridge_slave_0) entered disabled state [ 1342.508304] device bridge_slave_0 entered promiscuous mode [ 1342.515438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1342.522479] bridge0: port 2(bridge_slave_1) entered disabled state [ 1342.529472] device bridge_slave_1 entered promiscuous mode [ 1342.556379] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1342.570710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1342.592997] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1342.600286] team0: Port device team_slave_0 added [ 1342.608201] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1342.615971] team0: Port device team_slave_1 added [ 1342.638124] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1342.644456] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1342.669883] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1342.681650] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1342.687926] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1342.713657] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1342.725185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1342.735157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1342.803649] device hsr_slave_0 entered promiscuous mode [ 1342.841079] device hsr_slave_1 entered promiscuous mode [ 1342.900336] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1342.907655] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1342.989796] chnl_net:caif_netlink_parms(): no params data found [ 1343.054559] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.060974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1343.067547] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.074022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1343.105486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.112206] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.119338] device bridge_slave_0 entered promiscuous mode [ 1343.126527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.132958] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.140498] device bridge_slave_1 entered promiscuous mode [ 1343.161406] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1343.171484] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1343.195812] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1343.203348] team0: Port device team_slave_0 added [ 1343.209107] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1343.217250] team0: Port device team_slave_1 added [ 1343.238552] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1343.244938] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1343.270388] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1343.282316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1343.288696] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1343.314751] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1343.325608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1343.335584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1343.403610] device hsr_slave_0 entered promiscuous mode [ 1343.450364] device hsr_slave_1 entered promiscuous mode [ 1343.500981] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1343.517857] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1343.524922] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.532094] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.558198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1343.581513] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1343.597280] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1343.606494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1343.613590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1343.623249] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1343.629347] 8021q: adding VLAN 0 to HW filter on device team0 [ 1343.657826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1343.667991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1343.677263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1343.685286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1343.693388] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.699738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1343.707122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1343.715263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1343.723265] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.729628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1343.738643] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1343.749404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1343.762398] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1343.771815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1343.780947] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1343.791871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1343.801345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1343.808708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1343.816635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1343.824226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1343.832460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1343.842883] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1343.854496] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1343.861485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1343.868914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1343.879279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1343.888396] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1343.898826] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1343.904996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1343.913348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1343.921337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1343.939508] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1343.949144] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1343.956194] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1343.963591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1343.975600] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1344.024427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1344.041999] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1344.057230] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1344.063980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1344.071604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1344.083956] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1344.092915] 8021q: adding VLAN 0 to HW filter on device team0 [ 1344.102035] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1344.110490] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1344.117895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1344.125869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1344.133748] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.140131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1344.147374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1344.162292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1344.170388] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1344.177804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1344.186413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1344.194575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.200969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1344.207893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1344.216322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1344.226589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1344.237089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1344.246882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1344.258542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1344.275830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1344.282956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1344.291333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1344.302155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1344.310794] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1344.317860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1344.326145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1344.336750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1344.345058] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1344.352630] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1344.359335] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1344.366017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1344.374127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1344.384636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1344.395390] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1344.402441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1344.410384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1344.417905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1344.425476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1344.435077] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1344.442965] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1344.451093] device bridge_slave_1 left promiscuous mode [ 1344.456558] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.500719] device bridge_slave_0 left promiscuous mode [ 1344.506241] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.562453] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1344.569363] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1344.578741] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1344.585566] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1344.593264] device bridge_slave_1 left promiscuous mode [ 1344.598774] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.650833] device bridge_slave_0 left promiscuous mode [ 1344.656321] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.712924] device veth1_macvtap left promiscuous mode [ 1344.718261] device veth0_macvtap left promiscuous mode [ 1344.723696] device veth1_vlan left promiscuous mode [ 1344.728870] device veth0_vlan left promiscuous mode [ 1344.854077] device hsr_slave_1 left promiscuous mode [ 1344.914219] device hsr_slave_0 left promiscuous mode [ 1344.957553] team0 (unregistering): Port device team_slave_1 removed [ 1344.968935] team0 (unregistering): Port device team_slave_0 removed [ 1344.979230] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1345.013108] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1345.080372] bond0 (unregistering): Released all slaves [ 1345.184909] device hsr_slave_1 left promiscuous mode [ 1345.252923] device hsr_slave_0 left promiscuous mode [ 1345.309167] team0 (unregistering): Port device team_slave_1 removed [ 1345.318772] team0 (unregistering): Port device team_slave_0 removed [ 1345.329470] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1345.365303] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1345.431125] bond0 (unregistering): Released all slaves [ 1345.486300] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1345.492745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1345.500498] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1345.507488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1345.528680] device veth0_vlan entered promiscuous mode [ 1345.545898] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1345.553888] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1345.564450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1345.571677] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1345.585236] device veth1_vlan entered promiscuous mode [ 1345.593553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1345.617691] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1345.633861] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1345.641434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1345.649267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1345.666813] device veth0_macvtap entered promiscuous mode [ 1345.674085] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1345.683187] device veth1_macvtap entered promiscuous mode [ 1345.689557] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1345.699600] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1345.709688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1345.719849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.729796] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.739393] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.749235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.758592] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1345.768467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.778695] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1345.786121] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1345.795282] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1345.803112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1345.810548] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1345.818248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1345.827837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.837765] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.847218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.857620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.866836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1345.876650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1345.886973] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1345.894054] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1345.902731] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1345.909902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1345.917859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1346.012371] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1346.019895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1346.032926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1346.206537] bridge0: port 2(bridge_slave_1) entered disabled state [ 1346.213284] bridge0: port 1(bridge_slave_0) entered disabled state [ 1346.346558] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1346.356809] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1346.499118] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1346.506476] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1346.513845] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1346.524271] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1346.531174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1346.539070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1346.549297] device veth0_vlan entered promiscuous mode [ 1346.558129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1346.567636] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1346.585369] device veth1_vlan entered promiscuous mode [ 1346.594465] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1346.608800] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1346.627530] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1346.645536] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1346.655783] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1346.666222] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1346.675973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1346.685929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1346.698691] device veth0_macvtap entered promiscuous mode [ 1346.705906] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1346.716918] device veth1_macvtap entered promiscuous mode [ 1346.723723] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1346.733670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1346.745889] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1346.755547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1346.765602] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1346.788794] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 12:45:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5"], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="ff0f26bd7000fcdadf250a00000008000300", @ANYRES32, @ANYBLOB="2b003900090000000a000900ffffffffffff0000050033000200000008000300", @ANYRES32, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x24000001}, 0x4048000) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) capset(&(0x7f0000000000)={0x19980330, r3}, &(0x7f0000000040)={0x3, 0xffffeffc, 0x3ff, 0x3fd, 0x82, 0x800001}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0x8, &(0x7f0000000200)=""/198, &(0x7f0000000100)=0xc6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x101001, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r5, r6, 0x0) ioctl$KDMKTONE(r6, 0x4b30, 0x9) ioprio_set$pid(0x0, r3, 0xcc) 12:45:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x0, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1346.798935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1346.809253] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 12:45:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000000200)={0x0, ""/219}, 0xe3, 0x1, 0x2000) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1346.842658] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1346.878996] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready 12:45:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1346.903088] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1346.941416] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1346.955464] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1346.984361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1347.002592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 12:45:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1347.037772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1347.055038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1347.079783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1347.109005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1347.131643] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 12:45:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1347.163764] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1347.197102] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1347.223909] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1347.237770] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1347.252138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1349.151403] IPVS: ftp: loaded support on port[0] = 21 12:45:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000340)='./file0\x00') 12:45:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:22 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:22 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1349.927749] chnl_net:caif_netlink_parms(): no params data found [ 1349.969667] bridge0: port 1(bridge_slave_0) entered blocking state [ 1349.976146] bridge0: port 1(bridge_slave_0) entered disabled state [ 1349.983308] device bridge_slave_0 entered promiscuous mode [ 1349.990312] bridge0: port 2(bridge_slave_1) entered blocking state [ 1349.996696] bridge0: port 2(bridge_slave_1) entered disabled state [ 1350.004885] device bridge_slave_1 entered promiscuous mode [ 1350.021531] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1350.030803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1350.050851] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1350.058178] team0: Port device team_slave_0 added [ 1350.064183] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1350.071567] team0: Port device team_slave_1 added [ 1350.088047] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1350.094449] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1350.119836] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1350.135601] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1350.141929] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1350.167968] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1350.178408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1350.187745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1350.252975] device hsr_slave_0 entered promiscuous mode [ 1350.290399] device hsr_slave_1 entered promiscuous mode [ 1350.361038] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1350.371462] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1350.430998] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1350.462139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1350.470786] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1350.479147] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1350.487051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1350.494374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1350.506294] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1350.512450] 8021q: adding VLAN 0 to HW filter on device team0 [ 1350.522196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1350.529305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1350.537414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1350.545058] bridge0: port 1(bridge_slave_0) entered blocking state [ 1350.551567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1350.563147] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1350.570488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1350.577557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1350.586247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1350.593847] bridge0: port 2(bridge_slave_1) entered blocking state [ 1350.600254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1350.611706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1350.620851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1350.629523] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1350.637416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1350.648090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1350.655084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1350.663260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1350.671312] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1350.682658] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1350.690462] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1350.697940] device bridge_slave_1 left promiscuous mode [ 1350.704020] bridge0: port 2(bridge_slave_1) entered disabled state [ 1350.760989] device bridge_slave_0 left promiscuous mode [ 1350.766562] bridge0: port 1(bridge_slave_0) entered disabled state [ 1350.883978] device hsr_slave_1 left promiscuous mode [ 1350.922868] device hsr_slave_0 left promiscuous mode [ 1350.967731] team0 (unregistering): Port device team_slave_1 removed [ 1350.977131] team0 (unregistering): Port device team_slave_0 removed [ 1350.986498] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1351.023677] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1351.089832] bond0 (unregistering): Released all slaves [ 1351.128658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1351.137457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1351.145371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1351.156207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1351.163214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1351.171346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1351.181911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1351.189893] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1351.200531] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1351.206595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1351.214144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1351.222313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1351.238459] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1351.245814] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1351.252662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1351.259381] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1351.270867] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1351.395918] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1351.411722] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1351.418803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1351.433160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1351.495930] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1351.507191] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1351.515652] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1351.531247] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1351.538032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1351.551287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1351.561962] device veth0_vlan entered promiscuous mode [ 1351.571134] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1351.578305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1351.588701] device veth1_vlan entered promiscuous mode [ 1351.600783] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1351.614919] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1351.629232] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1351.644862] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1351.654987] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1351.663961] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1351.676052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1351.684617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1351.698125] device veth0_macvtap entered promiscuous mode [ 1351.705972] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1351.719748] device veth1_macvtap entered promiscuous mode [ 1351.727082] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1351.742707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1351.757140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1351.767567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1351.782023] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1351.792998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1351.805239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1351.815989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1351.828254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1351.843110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1351.853694] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1351.867326] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1351.875369] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1351.888517] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1351.896948] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1351.907782] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1351.916472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1351.929680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1351.941445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1351.954200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1351.965133] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1351.977489] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1351.988387] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1352.004220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1352.014048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1352.024944] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1352.032134] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1352.039791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1352.048105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1352.861166] IPVS: ftp: loaded support on port[0] = 21 [ 1353.645010] chnl_net:caif_netlink_parms(): no params data found [ 1353.690334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1353.696794] bridge0: port 1(bridge_slave_0) entered disabled state [ 1353.704349] device bridge_slave_0 entered promiscuous mode [ 1353.713448] bridge0: port 2(bridge_slave_1) entered blocking state [ 1353.719880] bridge0: port 2(bridge_slave_1) entered disabled state [ 1353.727017] device bridge_slave_1 entered promiscuous mode [ 1353.753161] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1353.762523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1353.781946] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1353.789120] team0: Port device team_slave_0 added [ 1353.794948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1353.802373] team0: Port device team_slave_1 added [ 1353.821764] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1353.828027] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1353.853621] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1353.865072] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1353.871482] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1353.896919] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1353.907580] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1353.919349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 12:45:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:26 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x2, 0x80002, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000340)='./file0\x00') 12:45:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 12:45:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x60000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1b, 0x4) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 12:45:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1354.027271] device hsr_slave_0 entered promiscuous mode 12:45:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1354.080543] device hsr_slave_1 entered promiscuous mode 12:45:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x2, 0x80002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1354.121290] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1354.138474] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 12:45:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1354.386441] bridge0: port 2(bridge_slave_1) entered blocking state [ 1354.392876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1354.399544] bridge0: port 1(bridge_slave_0) entered blocking state [ 1354.405961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1354.465149] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1354.472856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1354.481054] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1354.487928] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1354.501032] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1354.507914] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1354.521064] device bridge_slave_1 left promiscuous mode [ 1354.526621] bridge0: port 2(bridge_slave_1) entered disabled state [ 1354.580789] device bridge_slave_0 left promiscuous mode [ 1354.586543] bridge0: port 1(bridge_slave_0) entered disabled state [ 1354.643178] device veth1_macvtap left promiscuous mode [ 1354.648670] device veth0_macvtap left promiscuous mode [ 1354.658785] device veth1_vlan left promiscuous mode [ 1354.664151] device veth0_vlan left promiscuous mode [ 1354.963081] device hsr_slave_1 left promiscuous mode [ 1355.004173] device hsr_slave_0 left promiscuous mode [ 1355.064489] team0 (unregistering): Port device team_slave_1 removed [ 1355.089048] team0 (unregistering): Port device team_slave_0 removed [ 1355.118154] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1355.156943] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1355.212582] bond0 (unregistering): Released all slaves [ 1355.255552] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1355.262962] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.272578] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.279579] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1355.291804] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1355.298150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1355.305646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1355.314892] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1355.321429] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.332011] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1355.339088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1355.346977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1355.354795] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.361182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1355.370989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1355.381132] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1355.388041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1355.396574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1355.404404] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.411324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1355.418166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1355.428465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1355.436086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1355.482862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1355.492692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1355.501907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1355.512640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1355.524607] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1355.532617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1355.544474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1355.554523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1355.566070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1355.574463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1355.588564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1355.596252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1355.608259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1355.617979] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1355.628586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1355.650122] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1355.658152] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1355.669874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1355.677462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1355.694163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1355.884334] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1355.900155] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1355.907281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1355.920825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1355.985370] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1355.999790] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1356.006946] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1356.022267] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1356.028998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1356.041922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1356.051735] device veth0_vlan entered promiscuous mode [ 1356.064905] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1356.074029] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1356.087166] device veth1_vlan entered promiscuous mode [ 1356.093889] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1356.108939] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1356.124168] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1356.139436] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1356.146769] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1356.162459] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1356.172715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1356.182202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1356.195484] device veth0_macvtap entered promiscuous mode [ 1356.203990] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1356.217044] device veth1_macvtap entered promiscuous mode [ 1356.224936] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1356.239702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1356.255976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1356.267680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.279845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.294330] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.304170] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.315006] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.324976] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.334139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1356.343879] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.353975] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1356.361003] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1356.370204] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1356.377415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1356.385096] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1356.393647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1356.407017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1356.416960] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.427314] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1356.437197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.446370] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1356.456225] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.465404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1356.475323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1356.486124] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1356.493689] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1356.501566] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1356.509394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1357.331309] IPVS: ftp: loaded support on port[0] = 21 [ 1357.748913] bridge0: port 2(bridge_slave_1) entered disabled state [ 1357.755652] bridge0: port 1(bridge_slave_0) entered disabled state [ 1357.884971] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1357.894424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1358.081392] IPVS: ftp: loaded support on port[0] = 21 [ 1358.098192] chnl_net:caif_netlink_parms(): no params data found [ 1358.157399] bridge0: port 1(bridge_slave_0) entered blocking state [ 1358.164093] bridge0: port 1(bridge_slave_0) entered disabled state [ 1358.171309] device bridge_slave_0 entered promiscuous mode [ 1358.178436] bridge0: port 2(bridge_slave_1) entered blocking state [ 1358.185153] bridge0: port 2(bridge_slave_1) entered disabled state [ 1358.192251] device bridge_slave_1 entered promiscuous mode [ 1358.268398] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1358.277892] bond0: Enslaving bond_slave_1 as an active interface with an up link 12:45:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 12:45:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fstat(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) fchown(0xffffffffffffffff, r2, r3) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x1, 0x1}, 0x2}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="104e591037770a858155f240eb5382036512b8d469855a0bde6201ab", 0x1c}, {&(0x7f0000000080)="2bfebf6d4df5a60e470999b50d2b8de48dc640966186095727038389", 0x1c}, {&(0x7f0000000100)="fb576da5db039564dcafd494bac4232d31d2a1751c0ed6eae52f35b4daae4e5b6830b5ee5d9d63af2db105b1a54e3388ded14b627f2dae8fb16e62d7b779c09af2bd0a712e3e5efb48d9370ae518ba78d2229139c1cdcfe897f48485424cc99a32be391c1b6559258d359001d34d9ee233291da2f68b6780a91adaf9b4b98d450e9a2a4ab19b0a978b0aa7cff10f3e79b250c31eba0a86fe1f0573124015855f", 0xa0}, {&(0x7f0000000200)="033e6fdc449ea6e85f2191f7795478c044e1bf27dcf1f051062b079a3cc90c4d208b290c7b7cb2765bb9747c054ab85570615d22796058ede7122e24cc2552f011a6d689e9ce4a241afad84c1ec716c9cef105fc83199e6bc5721ba9b36b48828ca59f6aa1a8340cf0f3449541fa7015f0dfd535d20724953e08613b39382e113898df2f8c97c3f4d966b503e48ed2c3ddeb166e92b005a841fe6133feaf98271500069edbc59bd893221047de93cef0124177e0bba6bbfc6ed3", 0xba}], 0x4, &(0x7f0000000300)="bf382d7fa5957348a475a8295775306f4394e3ee4df144442d97c2322ff7ec203c2d010e2919be85dd9930fb0f886626c48528bac680e8d01bc0caf3f28ab9ce77e5c593752e34431577fbca733e4cadb99b55a7ce9508a1c54fec692c2ce67d3cca7becedc14cdd3a", 0x69, 0x40041}, 0x4004) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x400) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r6 = fcntl$dupfd(r4, 0x406, r5) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80d0}, 0x4004) ptrace$cont(0x18, r0, 0x3, 0x0) r7 = getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000003c0)=r7) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SIOCRSSCAUSE(r8, 0x89e1, &(0x7f0000000440)=0x9) [ 1358.308649] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1358.316322] team0: Port device team_slave_0 added [ 1358.323177] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1358.333443] team0: Port device team_slave_1 added [ 1358.344019] chnl_net:caif_netlink_parms(): no params data found 12:45:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1358.373841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2795 comm=syz-executor.1 [ 1358.415129] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1358.422706] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1358.448679] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1358.470962] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1358.478043] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1358.504176] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1358.536728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1358.556076] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1358.564559] bridge0: port 1(bridge_slave_0) entered blocking state [ 1358.571366] bridge0: port 1(bridge_slave_0) entered disabled state [ 1358.578858] device bridge_slave_0 entered promiscuous mode [ 1358.652469] device hsr_slave_0 entered promiscuous mode [ 1358.690324] device hsr_slave_1 entered promiscuous mode [ 1358.733631] bridge0: port 2(bridge_slave_1) entered blocking state [ 1358.740405] bridge0: port 2(bridge_slave_1) entered disabled state [ 1358.747600] device bridge_slave_1 entered promiscuous mode [ 1358.754424] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1358.768341] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1358.789533] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1358.806308] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1358.831111] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1358.838360] team0: Port device team_slave_0 added [ 1358.847067] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1358.854896] team0: Port device team_slave_1 added [ 1358.882022] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1358.888325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1358.914056] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1358.931594] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1358.937987] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1358.963485] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1358.977604] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1358.988062] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1359.063339] device hsr_slave_0 entered promiscuous mode [ 1359.100528] device hsr_slave_1 entered promiscuous mode [ 1359.158281] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1359.167659] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1359.175250] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1359.183159] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1359.189874] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1359.197905] device bridge_slave_1 left promiscuous mode [ 1359.203834] bridge0: port 2(bridge_slave_1) entered disabled state [ 1359.250996] device bridge_slave_0 left promiscuous mode [ 1359.256727] bridge0: port 1(bridge_slave_0) entered disabled state [ 1359.313040] device veth1_macvtap left promiscuous mode [ 1359.318414] device veth0_macvtap left promiscuous mode [ 1359.324105] device veth1_vlan left promiscuous mode [ 1359.329175] device veth0_vlan left promiscuous mode [ 1359.455038] device hsr_slave_1 left promiscuous mode [ 1359.504243] device hsr_slave_0 left promiscuous mode [ 1359.549534] team0 (unregistering): Port device team_slave_1 removed [ 1359.559079] team0 (unregistering): Port device team_slave_0 removed [ 1359.568273] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1359.605112] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1359.683445] bond0 (unregistering): Released all slaves [ 1359.726766] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1359.748188] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1359.818816] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1359.838530] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1359.847749] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1359.858745] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1359.865644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1359.872948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1359.929361] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1359.935628] 8021q: adding VLAN 0 to HW filter on device team0 [ 1359.958108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1359.979139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1359.993509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1360.005602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1360.014312] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.020732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1360.035114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1360.048147] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1360.055682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1360.063319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1360.071846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1360.079598] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.086172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1360.096395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1360.106108] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1360.114778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1360.123181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1360.130666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1360.139875] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1360.150295] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1360.156909] 8021q: adding VLAN 0 to HW filter on device team0 [ 1360.164206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1360.175265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1360.190871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1360.206323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1360.213530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1360.226950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1360.234984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1360.247652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1360.255545] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.262075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1360.274383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1360.282637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1360.295447] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.301874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1360.309711] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1360.323285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1360.335018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1360.348907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1360.358360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1360.371944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1360.379694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1360.396079] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1360.408527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1360.418998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1360.429410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1360.439570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1360.455886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1360.467635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1360.478440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1360.489999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1360.502966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1360.513876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1360.526665] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1360.536637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1360.548533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1360.559618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1360.572962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1360.583214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1360.603536] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1360.615056] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1360.625272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1360.636092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1360.649251] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1360.661646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1360.675763] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1360.686555] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1360.697548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1360.704778] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1360.712331] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1360.719397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1360.727405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1360.739265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1360.754956] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1360.768179] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1360.774846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1360.782327] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1360.796658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1360.876982] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1360.888399] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1360.895777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1360.904141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1360.948870] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1360.957435] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1360.968758] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1360.985640] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1360.997094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1361.005485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1361.013373] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1361.022661] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1361.033234] device veth0_vlan entered promiscuous mode [ 1361.040348] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1361.052731] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1361.060318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1361.068523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1361.078549] device veth1_vlan entered promiscuous mode [ 1361.091032] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1361.113866] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1361.135314] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1361.152253] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1361.159624] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1361.168437] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1361.176067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1361.185106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1361.195526] device veth0_macvtap entered promiscuous mode [ 1361.203540] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1361.212585] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1361.219803] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1361.226939] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1361.233846] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1361.245188] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1361.256588] device veth1_macvtap entered promiscuous mode [ 1361.263545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1361.271446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1361.279160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1361.287439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1361.295477] device veth0_vlan entered promiscuous mode [ 1361.308137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1361.319856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1361.336052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.347114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.389607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.399442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.410178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.420135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.431019] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1361.438000] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1361.448604] device veth1_vlan entered promiscuous mode [ 1361.454956] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1361.462678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1361.469966] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1361.477882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1361.488341] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.498422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.508260] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.519044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.529116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.539072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.549169] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1361.556353] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1361.564784] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1361.574891] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1361.585164] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1361.593457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1361.607861] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1361.619763] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1361.627027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1361.635611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1361.647363] device veth0_macvtap entered promiscuous mode [ 1361.654569] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1361.663739] device veth1_macvtap entered promiscuous mode [ 1361.671898] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1361.682333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1361.693152] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1361.703071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.713208] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.723096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.732891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.742161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.752434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.761666] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1361.771939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.783123] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1361.790661] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1361.801235] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1361.808444] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1361.823467] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1361.831687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1361.843038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.853207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.862540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.872524] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.882398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.892728] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.902148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1361.912235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1361.922488] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1361.929409] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1361.982203] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1361.996382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1362.111115] bridge0: port 2(bridge_slave_1) entered disabled state [ 1362.118092] bridge0: port 1(bridge_slave_0) entered disabled state [ 1362.234821] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1362.243632] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:45:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x0, 0x8) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r5, 0x2288, &(0x7f0000000080)) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) modify_ldt$read(0x0, &(0x7f0000000200)=""/202, 0xca) 12:45:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 12:45:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000340)='./file0\x00') 12:45:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1362.762514] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1362.791619] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1362.818675] device bridge_slave_1 left promiscuous mode [ 1362.833032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1362.895851] device bridge_slave_0 left promiscuous mode [ 1362.907871] bridge0: port 1(bridge_slave_0) entered disabled state [ 1363.133174] device hsr_slave_1 left promiscuous mode [ 1363.194437] device hsr_slave_0 left promiscuous mode [ 1363.263694] team0 (unregistering): Port device team_slave_1 removed [ 1363.275465] team0 (unregistering): Port device team_slave_0 removed [ 1363.287636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1363.355359] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1363.460702] bond0 (unregistering): Released all slaves 12:45:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semget(0x2, 0x4, 0x90) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) r1 = getpid() r2 = gettid() ptrace$setopts(0x4206, r2, 0x40000007cb, 0x1) tkill(r2, 0x3c) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) getpgrp(r3) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000100)) ptrace$cont(0x9, r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ptrace$setopts(0x4206, r4, 0x400000000401, 0x1) tkill(r0, 0x28) ptrace$cont(0x18, r0, 0x0, 0x0) r5 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2a100, 0x0) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000040)) shmctl$SHM_LOCK(r5, 0xb) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x4000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) 12:45:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000340)='./file0\x00') 12:45:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', 0x0) 12:45:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000000)=r0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000040)=0x0) ptrace$poke(0x5, r4, &(0x7f0000000080), 0x48) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(0x0) [ 1365.251469] IPVS: ftp: loaded support on port[0] = 21 [ 1365.492117] bridge0: port 2(bridge_slave_1) entered disabled state [ 1365.499030] bridge0: port 1(bridge_slave_0) entered disabled state [ 1365.540298] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1365.550702] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1366.248071] chnl_net:caif_netlink_parms(): no params data found [ 1366.285671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.292819] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.300400] device bridge_slave_0 entered promiscuous mode [ 1366.307139] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.313934] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.321054] device bridge_slave_1 entered promiscuous mode [ 1366.338600] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1366.348565] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1366.366638] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1366.374125] team0: Port device team_slave_0 added [ 1366.380384] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1366.387535] team0: Port device team_slave_1 added [ 1366.403690] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1366.410453] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1366.436046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1366.446886] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1366.453396] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1366.479374] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1366.490303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1366.497943] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1366.553517] device hsr_slave_0 entered promiscuous mode [ 1366.590370] device hsr_slave_1 entered promiscuous mode [ 1366.661034] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1366.668279] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1366.726453] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1366.756434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1366.764513] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1366.774221] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1366.781500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1366.788419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1366.797436] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1366.803782] 8021q: adding VLAN 0 to HW filter on device team0 [ 1366.812938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1366.820384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1366.828156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1366.836194] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.842601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1366.849965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1366.859444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1366.866750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1366.874754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1366.882457] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.889066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1366.897732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1366.904851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1366.916106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1366.923075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1366.935767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1366.942889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1366.950916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1366.959105] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1366.970829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1366.977782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1366.985674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1366.994944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1367.002095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1367.009583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1367.019464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1367.027303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1367.035122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1367.045307] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1367.051631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1367.065422] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1367.073958] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1367.080470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1367.087175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1367.098134] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1367.164816] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1367.174944] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1367.182152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1367.190649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1367.224677] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1367.232829] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1367.239394] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1367.249125] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1367.256033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1367.263505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1367.271744] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1367.278646] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1367.288646] device veth0_vlan entered promiscuous mode [ 1367.299763] device veth1_vlan entered promiscuous mode [ 1367.305660] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1367.314636] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1367.328441] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1367.338015] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1367.345354] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1367.353186] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1367.360973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1367.368557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1367.377904] device veth0_macvtap entered promiscuous mode [ 1367.384498] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1367.392972] device veth1_macvtap entered promiscuous mode [ 1367.399118] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1367.408930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1367.418390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1367.426993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1367.437001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1367.446389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1367.456147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1367.465356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1367.475268] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1367.485878] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1367.493207] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1367.502939] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1367.510840] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1367.518201] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1367.527119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1367.536825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1367.546927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1367.556278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1367.566117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1367.575417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1367.585455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1367.595651] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1367.602765] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1367.610137] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1367.617940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:45:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(0x0, 0x8040, 0x0) acct(0x0) 12:45:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 12:45:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', 0x0) 12:45:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(0x0, 0x8040, 0x0) acct(0x0) 12:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(0x0, 0x8040, 0x0) acct(0x0) 12:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) acct(0x0) 12:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) acct(0x0) [ 1369.672368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.679008] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.718246] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1369.728756] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:45:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x2, 0x80002, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) acct(0x0) 12:45:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, r1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000140)=""/237, &(0x7f0000000000)=0xed) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r3 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x1, 0x88000) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f00000002c0)=0x3f5) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000580)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000003c0)='_', 0x1}], 0x2, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) bind$tipc(r6, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x3}}, 0x10) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) splice(r4, 0x0, r5, 0x0, 0x8000000253c, 0x0) [ 1370.495690] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1370.753500] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1370.770816] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1370.794943] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1370.820587] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1370.829574] device bridge_slave_1 left promiscuous mode [ 1370.836270] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.931612] device bridge_slave_0 left promiscuous mode [ 1370.937292] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.994583] device veth1_macvtap left promiscuous mode [ 1371.000052] device veth0_macvtap left promiscuous mode [ 1371.005785] device veth1_vlan left promiscuous mode [ 1371.012017] device veth0_vlan left promiscuous mode [ 1371.122820] device hsr_slave_1 left promiscuous mode [ 1371.163033] device hsr_slave_0 left promiscuous mode [ 1371.228169] team0 (unregistering): Port device team_slave_1 removed [ 1371.238810] team0 (unregistering): Port device team_slave_0 removed [ 1371.250537] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1371.294853] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1371.351763] bond0 (unregistering): Released all slaves 12:45:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 12:45:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', 0x0) 12:45:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc337600", 0xc}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', 0x0) [ 1373.406287] IPVS: ftp: loaded support on port[0] = 21 12:45:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1374.303741] chnl_net:caif_netlink_parms(): no params data found [ 1374.527465] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.533980] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.542196] device bridge_slave_0 entered promiscuous mode [ 1374.552502] bridge0: port 2(bridge_slave_1) entered blocking state [ 1374.558878] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.565990] device bridge_slave_1 entered promiscuous mode [ 1374.584877] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1374.596768] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1374.614574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1374.622012] team0: Port device team_slave_0 added [ 1374.627592] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1374.635034] team0: Port device team_slave_1 added [ 1374.653507] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1374.659768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1374.685003] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1374.695986] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1374.702396] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1374.728388] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1374.738890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1374.748118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1374.784704] device hsr_slave_0 entered promiscuous mode [ 1374.830331] device hsr_slave_1 entered promiscuous mode [ 1374.874171] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1374.881770] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1374.943500] bridge0: port 2(bridge_slave_1) entered blocking state [ 1374.949989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1374.956645] bridge0: port 1(bridge_slave_0) entered blocking state [ 1374.963034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1375.004936] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1375.011561] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1375.021095] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1375.034842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1375.042952] bridge0: port 1(bridge_slave_0) entered disabled state 12:45:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1375.049623] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.072647] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1375.079159] 8021q: adding VLAN 0 to HW filter on device team0 [ 1375.101155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1375.108700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1375.115211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1375.122530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1375.131084] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.137569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1375.144693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 12:45:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1375.152584] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1375.166120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1375.173151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1375.184743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1375.205174] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1375.216250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1375.227138] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1375.238918] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1375.248149] device bridge_slave_1 left promiscuous mode [ 1375.254126] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.310903] device bridge_slave_0 left promiscuous mode [ 1375.316444] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.437293] device hsr_slave_1 left promiscuous mode [ 1375.492699] device hsr_slave_0 left promiscuous mode [ 1375.537719] team0 (unregistering): Port device team_slave_1 removed [ 1375.547404] team0 (unregistering): Port device team_slave_0 removed [ 1375.556625] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1375.593154] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1375.670272] bond0 (unregistering): Released all slaves [ 1375.724912] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1375.738027] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1375.745755] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1375.752429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1375.759116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1375.770457] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1375.837456] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1375.882359] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1375.889532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1375.897856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1375.960454] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1375.967876] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1375.974730] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1375.985154] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1375.992123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1375.999528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1376.007655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1376.014562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1376.036011] device veth0_vlan entered promiscuous mode [ 1376.047956] device veth1_vlan entered promiscuous mode [ 1376.058112] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1376.067975] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1376.087936] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1376.103746] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1376.113848] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1376.123206] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1376.133809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1376.142489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1376.155697] device veth0_macvtap entered promiscuous mode [ 1376.163106] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1376.175719] device veth1_macvtap entered promiscuous mode [ 1376.183156] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1376.196937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1376.208075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1376.221622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1376.234931] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.245906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1376.259889] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.274885] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1376.282828] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1376.297057] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1376.305507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1376.317272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1376.326073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1376.339500] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1376.354478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.364192] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1376.377996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1376.388813] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1376.401477] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1376.408958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1376.423057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1377.601562] IPVS: ftp: loaded support on port[0] = 21 [ 1378.222735] chnl_net:caif_netlink_parms(): no params data found [ 1378.269717] bridge0: port 1(bridge_slave_0) entered blocking state [ 1378.276348] bridge0: port 1(bridge_slave_0) entered disabled state [ 1378.283643] device bridge_slave_0 entered promiscuous mode [ 1378.296346] bridge0: port 2(bridge_slave_1) entered blocking state [ 1378.303225] bridge0: port 2(bridge_slave_1) entered disabled state [ 1378.310750] device bridge_slave_1 entered promiscuous mode [ 1378.327313] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1378.338125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1378.356887] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1378.364248] team0: Port device team_slave_0 added [ 1378.369793] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1378.377326] team0: Port device team_slave_1 added [ 1378.396578] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1378.403057] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1378.428959] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1378.443807] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1378.450383] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 12:45:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc337600", 0xc}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 12:45:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1378.481690] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1378.503330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1378.522162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1378.598366] device hsr_slave_0 entered promiscuous mode [ 1378.650431] device hsr_slave_1 entered promiscuous mode [ 1378.698193] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1378.708098] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1378.889933] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1378.906849] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1378.927992] device bridge_slave_1 left promiscuous mode [ 1378.945171] bridge0: port 2(bridge_slave_1) entered disabled state [ 1379.000954] device bridge_slave_0 left promiscuous mode [ 1379.007768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1379.132651] device hsr_slave_1 left promiscuous mode [ 1379.174214] device hsr_slave_0 left promiscuous mode [ 1379.229447] team0 (unregistering): Port device team_slave_1 removed [ 1379.239496] team0 (unregistering): Port device team_slave_0 removed [ 1379.248814] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1379.295184] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1379.362970] bond0 (unregistering): Released all slaves [ 1379.427507] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1379.460674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1379.468941] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1379.478905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1379.485415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1379.492838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1379.502125] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1379.508211] 8021q: adding VLAN 0 to HW filter on device team0 [ 1379.517684] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1379.525330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1379.533433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1379.541288] bridge0: port 1(bridge_slave_0) entered blocking state [ 1379.547896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1379.555141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1379.565215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1379.573823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1379.581919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1379.589595] bridge0: port 2(bridge_slave_1) entered blocking state [ 1379.596292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1379.606481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1379.613893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1379.661542] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1379.668831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1379.680835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1379.688059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1379.696882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1379.706988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1379.715251] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1379.722835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1379.731069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1379.741450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1379.752694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1379.759587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1379.768033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1379.775676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1379.784794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1379.794634] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1379.801427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1379.822026] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1379.831324] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1379.837645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1379.850790] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1379.862913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1379.985533] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1379.996870] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1380.005084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1380.013676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1380.109957] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1380.126745] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1380.146089] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1380.168624] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1380.175337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1380.187368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1380.197239] device veth0_vlan entered promiscuous mode [ 1380.207051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1380.215061] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1380.224237] device veth1_vlan entered promiscuous mode [ 1380.230350] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1380.240742] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1380.254620] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1380.266231] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1380.273301] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1380.281808] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1380.289205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1380.297338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1380.307097] device veth0_macvtap entered promiscuous mode [ 1380.314312] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1380.324137] device veth1_macvtap entered promiscuous mode [ 1380.334460] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1380.344218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1380.359663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1380.370834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1380.380869] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1380.390786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1380.405212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1380.414794] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1380.428982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1380.444265] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1380.451463] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1380.465557] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1380.474596] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1380.485938] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1380.494125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1380.508656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1380.519081] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1380.528693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1380.538951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1380.548326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1380.558438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1380.568837] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1380.575812] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1380.583090] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1380.591295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1381.541313] IPVS: ftp: loaded support on port[0] = 21 12:45:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:45:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc337600", 0xc}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:45:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1382.037382] bridge0: port 2(bridge_slave_1) entered disabled state [ 1382.044007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1382.171055] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1382.184642] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1382.539333] chnl_net:caif_netlink_parms(): no params data found [ 1382.603441] bridge0: port 1(bridge_slave_0) entered blocking state [ 1382.610411] bridge0: port 1(bridge_slave_0) entered disabled state [ 1382.617698] device bridge_slave_0 entered promiscuous mode [ 1382.628295] bridge0: port 2(bridge_slave_1) entered blocking state [ 1382.634851] bridge0: port 2(bridge_slave_1) entered disabled state [ 1382.642446] device bridge_slave_1 entered promiscuous mode 12:45:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1382.663674] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1382.673013] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1382.793513] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1382.802875] team0: Port device team_slave_0 added [ 1382.808488] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1382.816116] team0: Port device team_slave_1 added [ 1382.835494] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1382.841929] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1382.867696] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1382.878930] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1382.885272] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1382.910670] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1382.927602] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1382.935159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1382.974170] device hsr_slave_0 entered promiscuous mode 12:45:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1383.030665] device hsr_slave_1 entered promiscuous mode [ 1383.075374] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1383.083657] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 12:45:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 1383.221983] bridge0: port 2(bridge_slave_1) entered blocking state [ 1383.228418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1383.235101] bridge0: port 1(bridge_slave_0) entered blocking state [ 1383.241520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1383.322074] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1383.328833] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1383.348227] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1383.355849] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1383.364501] device bridge_slave_1 left promiscuous mode [ 1383.370258] bridge0: port 2(bridge_slave_1) entered disabled state [ 1383.411632] device bridge_slave_0 left promiscuous mode [ 1383.418364] bridge0: port 1(bridge_slave_0) entered disabled state [ 1383.473106] device veth1_macvtap left promiscuous mode [ 1383.480846] device veth0_macvtap left promiscuous mode [ 1383.496596] device veth1_vlan left promiscuous mode [ 1383.507266] device veth0_vlan left promiscuous mode [ 1383.762368] device hsr_slave_1 left promiscuous mode [ 1383.814041] device hsr_slave_0 left promiscuous mode [ 1383.857826] team0 (unregistering): Port device team_slave_1 removed [ 1383.869006] team0 (unregistering): Port device team_slave_0 removed [ 1383.878519] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1383.925139] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1384.001943] bond0 (unregistering): Released all slaves [ 1384.071482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1384.077891] bridge0: port 1(bridge_slave_0) entered disabled state [ 1384.085124] bridge0: port 2(bridge_slave_1) entered disabled state [ 1384.098361] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1384.107810] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1384.114144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1384.121177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1384.131249] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1384.137754] 8021q: adding VLAN 0 to HW filter on device team0 [ 1384.146818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1384.154173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1384.162786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1384.170786] bridge0: port 1(bridge_slave_0) entered blocking state [ 1384.177269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1384.186692] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1384.194398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1384.202280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1384.209878] bridge0: port 2(bridge_slave_1) entered blocking state [ 1384.216322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1384.226198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1384.233689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1384.297472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1384.304706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1384.323859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1384.331192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1384.339501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1384.350510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1384.362053] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1384.369070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1384.377406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1384.385622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1384.394464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1384.402403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1384.413411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1384.420799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1384.428377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1384.438972] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1384.445350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1384.462370] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1384.471002] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1384.477639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1384.487378] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1384.499229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1384.618393] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1384.629740] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1384.638471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1384.647006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1384.704806] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1384.714833] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1384.722517] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1384.732967] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1384.739717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1384.748140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1384.757842] device veth0_vlan entered promiscuous mode [ 1384.770322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1384.777859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1384.793327] device veth1_vlan entered promiscuous mode [ 1384.799287] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1384.814469] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1384.838039] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1384.868732] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1384.875925] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1384.888616] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1384.896130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1384.908019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1384.918599] device veth0_macvtap entered promiscuous mode [ 1384.931465] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1384.945709] device veth1_macvtap entered promiscuous mode [ 1384.952631] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1384.963288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1384.978915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1384.988502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1385.002706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1385.013723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1385.026232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1385.039235] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1385.049192] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1385.060766] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1385.068555] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1385.079913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1385.087724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1385.101829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1385.116678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1385.126769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1385.140837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1385.151540] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1385.158555] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1385.166956] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1385.174898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1386.151804] IPVS: ftp: loaded support on port[0] = 21 [ 1387.023099] IPVS: ftp: loaded support on port[0] = 21 12:46:00 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000580)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000003c0)='_', 0x1}], 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000380)=0x10001, 0x4) dup3(r2, r3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r5, 0x2}}, 0x18) splice(r0, 0x0, r1, 0x0, 0x8000000253c, 0x0) 12:46:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x131, &(0x7f0000000200)={&(0x7f0000000b80)={0x3c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x3c}}, 0x0) [ 1387.093516] chnl_net:caif_netlink_parms(): no params data found [ 1387.173807] bridge0: port 1(bridge_slave_0) entered blocking state [ 1387.180390] bridge0: port 1(bridge_slave_0) entered disabled state [ 1387.187603] device bridge_slave_0 entered promiscuous mode [ 1387.200810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1387.207231] bridge0: port 2(bridge_slave_1) entered disabled state 12:46:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1387.223739] device bridge_slave_1 entered promiscuous mode [ 1387.298738] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1387.309477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1387.338351] chnl_net:caif_netlink_parms(): no params data found [ 1387.511859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1387.518525] bridge0: port 1(bridge_slave_0) entered disabled state [ 1387.620633] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1387.630679] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1387.783985] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1387.793082] team0: Port device team_slave_0 added [ 1387.806279] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1387.813717] team0: Port device team_slave_1 added [ 1387.838684] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1387.845256] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1387.871423] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1387.896464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1387.903441] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1387.929117] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1387.939302] bridge0: port 1(bridge_slave_0) entered blocking state [ 1387.946597] bridge0: port 1(bridge_slave_0) entered disabled state [ 1387.956338] device bridge_slave_0 entered promiscuous mode [ 1387.963142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1387.971699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1387.979017] bridge0: port 2(bridge_slave_1) entered blocking state [ 1387.985587] bridge0: port 2(bridge_slave_1) entered disabled state [ 1387.995742] device bridge_slave_1 entered promiscuous mode [ 1388.026152] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1388.072810] device hsr_slave_0 entered promiscuous mode [ 1388.120484] device hsr_slave_1 entered promiscuous mode [ 1388.171509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1388.187759] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1388.195403] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1388.215167] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1388.223723] team0: Port device team_slave_0 added [ 1388.229655] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1388.237495] team0: Port device team_slave_1 added [ 1388.260381] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1388.266673] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1388.292509] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1388.316784] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1388.323212] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1388.348480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1388.370710] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1388.387800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1388.442331] device hsr_slave_0 entered promiscuous mode [ 1388.480355] device hsr_slave_1 entered promiscuous mode [ 1388.533470] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1388.541108] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1388.564461] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1388.612270] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1388.620008] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1388.627908] device bridge_slave_1 left promiscuous mode [ 1388.633946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1388.690934] device bridge_slave_0 left promiscuous mode [ 1388.696546] bridge0: port 1(bridge_slave_0) entered disabled state [ 1388.796499] device hsr_slave_1 left promiscuous mode [ 1388.862739] device hsr_slave_0 left promiscuous mode [ 1388.907925] team0 (unregistering): Port device team_slave_1 removed [ 1388.917383] team0 (unregistering): Port device team_slave_0 removed [ 1388.926981] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1388.973271] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1389.054949] bond0 (unregistering): Released all slaves [ 1389.108910] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1389.135277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1389.144375] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1389.153679] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1389.164404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1389.173846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1389.183099] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1389.189169] 8021q: adding VLAN 0 to HW filter on device team0 [ 1389.207720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1389.219252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1389.227921] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1389.234617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1389.243676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1389.251340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1389.257770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1389.265467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1389.276811] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1389.283785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1389.290967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1389.299823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1389.311873] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1389.318065] 8021q: adding VLAN 0 to HW filter on device team0 [ 1389.325779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1389.334524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1389.342450] bridge0: port 2(bridge_slave_1) entered blocking state [ 1389.348829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1389.357171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1389.366196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1389.373409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1389.381809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1389.389720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1389.397424] bridge0: port 1(bridge_slave_0) entered blocking state [ 1389.403862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1389.411197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1389.424291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1389.431530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1389.442278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1389.450924] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1389.460752] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1389.468025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1389.478105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1389.487178] bridge0: port 2(bridge_slave_1) entered blocking state [ 1389.493701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1389.501180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1389.509005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1389.516828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1389.524658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1389.532676] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1389.541583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1389.549866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1389.557933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1389.565680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1389.573574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1389.643840] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1389.653487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1389.663750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1389.671429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1389.679096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1389.691560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1389.699443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1389.712347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1389.724217] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1389.730686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1389.737963] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1389.748448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1389.759197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1389.767464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1389.779541] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1389.789236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1389.796907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1389.805212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1389.816415] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1389.827974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1389.838040] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1389.849247] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1389.858411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1389.868811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1389.883477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1389.892031] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1389.899309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1389.933850] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1389.951703] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1389.957990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1389.971228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1389.994823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1390.156950] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1390.169086] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1390.183062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1390.195340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1390.217859] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1390.235561] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1390.254613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1390.264352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1390.363099] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1390.382571] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1390.389485] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1390.407824] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1390.418175] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1390.427355] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1390.439021] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1390.449327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1390.459426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1390.468528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1390.476215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1390.486413] device veth0_vlan entered promiscuous mode [ 1390.496381] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1390.505708] device veth0_vlan entered promiscuous mode [ 1390.512090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1390.519446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1390.527312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1390.534293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1390.546819] device veth1_vlan entered promiscuous mode [ 1390.553783] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1390.563592] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1390.580806] device veth1_vlan entered promiscuous mode [ 1390.586886] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1390.597104] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1390.608588] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1390.616958] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1390.623549] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1390.632110] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1390.639221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1390.647084] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1390.654363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1390.663008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1390.673507] device veth0_macvtap entered promiscuous mode [ 1390.679593] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1390.712324] device veth1_macvtap entered promiscuous mode [ 1390.718484] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1390.728908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1390.740345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1390.750087] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1390.758288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1390.768627] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.777971] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1390.788211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.798366] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1390.805664] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1390.817085] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1390.824647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1390.832001] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1390.839688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1390.850686] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1390.858679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1390.874852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.884852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1390.898593] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1390.909609] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1390.920747] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1390.927763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1390.935623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1390.943391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1390.951522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1390.962144] device veth0_macvtap entered promiscuous mode [ 1390.968225] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1390.978948] device veth1_macvtap entered promiscuous mode [ 1390.985593] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1390.996036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1391.007308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1391.016919] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1391.027203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1391.036792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1391.049317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1391.058489] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1391.070124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1391.081160] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1391.088570] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1391.110901] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1391.118333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1391.126335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1391.134355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1391.147144] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1391.162991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1391.173958] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1391.187773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1391.198099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1391.208263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1391.223972] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1391.231896] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1391.244494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1391.257508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:46:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:04 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000580)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000003c0)='_', 0x1}], 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000380)=0x10001, 0x4) dup3(r2, r3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r5, 0x2}}, 0x18) splice(r0, 0x0, r1, 0x0, 0x8000000253c, 0x0) [ 1391.906755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1391.915871] bridge0: port 1(bridge_slave_0) entered disabled state 12:46:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1392.062870] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1392.073247] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:46:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1392.380575] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1392.395228] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1392.423071] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1392.442144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1392.459803] device bridge_slave_1 left promiscuous mode [ 1392.475224] bridge0: port 2(bridge_slave_1) entered disabled state 12:46:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 12:46:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1392.522118] device bridge_slave_0 left promiscuous mode [ 1392.535984] bridge0: port 1(bridge_slave_0) entered disabled state [ 1392.597281] device veth1_macvtap left promiscuous mode [ 1392.610215] device veth0_macvtap left promiscuous mode [ 1392.622245] device veth1_vlan left promiscuous mode [ 1392.634376] device veth0_vlan left promiscuous mode 12:46:05 executing program 5 (fault-call:10 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1393.064558] device hsr_slave_1 left promiscuous mode [ 1393.118066] device hsr_slave_0 left promiscuous mode [ 1393.183537] team0 (unregistering): Port device team_slave_1 removed [ 1393.212003] team0 (unregistering): Port device team_slave_0 removed [ 1393.223086] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1393.275001] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1393.363543] bond0 (unregistering): Released all slaves 12:46:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 12:46:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1395.481365] IPVS: ftp: loaded support on port[0] = 21 [ 1396.212648] IPVS: ftp: loaded support on port[0] = 21 [ 1396.285248] chnl_net:caif_netlink_parms(): no params data found [ 1396.337273] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.343827] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.351432] device bridge_slave_0 entered promiscuous mode [ 1396.361659] bridge0: port 2(bridge_slave_1) entered blocking state [ 1396.368280] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.375569] device bridge_slave_1 entered promiscuous mode [ 1396.414864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1396.438083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1396.460753] chnl_net:caif_netlink_parms(): no params data found [ 1396.474817] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1396.482211] team0: Port device team_slave_0 added [ 1396.491046] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1396.498168] team0: Port device team_slave_1 added [ 1396.522066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1396.528480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1396.553831] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1396.565314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1396.572263] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1396.597543] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1396.613230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1396.625373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1396.702226] device hsr_slave_0 entered promiscuous mode [ 1396.740303] device hsr_slave_1 entered promiscuous mode [ 1396.780288] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.786672] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.794178] device bridge_slave_0 entered promiscuous mode [ 1396.803926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1396.810898] bridge0: port 2(bridge_slave_1) entered blocking state [ 1396.817366] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.824531] device bridge_slave_1 entered promiscuous mode [ 1396.830996] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1396.857389] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1396.870670] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1396.897699] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1396.904936] team0: Port device team_slave_0 added [ 1396.916721] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1396.924380] team0: Port device team_slave_1 added [ 1396.951361] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1396.957735] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1396.983507] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1396.995019] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1397.001610] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1397.026970] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1397.044830] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1397.056336] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1397.114590] device hsr_slave_0 entered promiscuous mode [ 1397.170352] device hsr_slave_1 entered promiscuous mode [ 1397.214520] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1397.223751] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1397.243486] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1397.308071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1397.314569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1397.321334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1397.327704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1397.356999] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1397.363313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1397.374962] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1397.382034] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1397.389655] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1397.396581] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1397.405544] device bridge_slave_1 left promiscuous mode [ 1397.411368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.450941] device bridge_slave_0 left promiscuous mode [ 1397.456504] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.502013] device veth1_macvtap left promiscuous mode [ 1397.507390] device veth0_macvtap left promiscuous mode [ 1397.513402] device veth1_vlan left promiscuous mode [ 1397.518465] device veth0_vlan left promiscuous mode [ 1397.622055] device hsr_slave_1 left promiscuous mode [ 1397.662887] device hsr_slave_0 left promiscuous mode [ 1397.709218] team0 (unregistering): Port device team_slave_1 removed [ 1397.718516] team0 (unregistering): Port device team_slave_0 removed [ 1397.727400] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1397.764558] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1397.820509] bond0 (unregistering): Released all slaves [ 1397.878797] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1397.885462] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1397.892984] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.899689] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.915692] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1397.922226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1397.929067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1397.939828] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1397.946139] 8021q: adding VLAN 0 to HW filter on device team0 [ 1397.965309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1397.974927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1397.983348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1397.994199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1398.002122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1398.009904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1398.017906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.024316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1398.032511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1398.040408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1398.047997] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.054406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1398.061690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1398.071311] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1398.080461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1398.094050] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1398.102236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1398.141426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1398.150577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1398.157689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1398.168487] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1398.180922] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1398.187156] 8021q: adding VLAN 0 to HW filter on device team0 [ 1398.194524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1398.210667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1398.218511] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1398.227471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1398.239860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1398.248126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1398.257089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1398.266892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1398.278533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1398.285920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1398.294110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1398.304887] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.311299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1398.318530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1398.326954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1398.334570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1398.342638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1398.353232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1398.363094] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1398.369327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1398.377735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1398.386473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1398.395678] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.402210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1398.412571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1398.427444] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1398.435005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1398.446894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1398.455408] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1398.462998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1398.471500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1398.478344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1398.488298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1398.501378] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1398.507749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1398.516240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1398.527521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1398.540805] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1398.547817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1398.562126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1398.572640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1398.593445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1398.601568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1398.611949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1398.621207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1398.628769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1398.646371] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1398.652792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1398.687037] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1398.697953] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1398.709718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1398.718144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1398.735465] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1398.788777] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1398.807009] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1398.814393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1398.840908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1398.944632] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1398.960838] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1398.967838] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1398.985670] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1398.997929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1399.006200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1399.021664] device veth0_vlan entered promiscuous mode [ 1399.030620] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1399.037729] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1399.047754] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1399.057971] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1399.066255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1399.078681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1399.087286] device veth1_vlan entered promiscuous mode [ 1399.093252] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1399.102740] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1399.118598] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1399.128766] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1399.136310] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1399.145610] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1399.157534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1399.165924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1399.180422] device veth0_macvtap entered promiscuous mode [ 1399.186586] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1399.196911] device veth1_macvtap entered promiscuous mode [ 1399.203411] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1399.214497] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1399.221947] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1399.228717] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1399.241296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1399.250885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1399.259206] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1399.267324] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1399.275155] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1399.282963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1399.290538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1399.299713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1399.306791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1399.313939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1399.323764] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1399.333847] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1399.340930] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1399.351091] device veth0_vlan entered promiscuous mode [ 1399.356985] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1399.365812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1399.376272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1399.386309] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1399.397230] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1399.409301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1399.417649] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1399.433595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1399.447697] device veth1_vlan entered promiscuous mode [ 1399.454131] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1399.468800] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1399.480737] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1399.489563] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1399.497393] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1399.505201] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1399.512973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1399.520900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1399.530768] device veth0_macvtap entered promiscuous mode [ 1399.536951] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1399.547016] device veth1_macvtap entered promiscuous mode [ 1399.553315] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1399.563301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1399.574121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1399.583893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1399.593743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1399.604130] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1399.613971] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1399.624432] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1399.631820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1399.646369] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1399.653771] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1399.661453] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1399.669183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1399.690842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1399.706249] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1399.716559] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1399.729126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1399.739815] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1399.747448] batman_adv: batadv0: Interface activated: batadv_slave_1 12:46:12 executing program 3 (fault-call:19 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1399.758874] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1399.767176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:46:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r3, r4, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r4, 0x0, 0x6, &(0x7f0000000000)='wlan1\x00'}, 0x30) tkill(r5, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c05bc3376003639405cb4aed12f000000c822956af70eca594325a18019cf243e3d1f6c21bf5f963a9016bead8b8b4f699937be455f1dde3dfbf6442394f9e8ec8efe03b78d309d81ab2d32f66e9cdec3e9d37527c6520438cefcb1e98341b1565cec18bafeb9b9b865698066f8a6117ace54382a377379474a696d4c79731f202c7a23ea872011699f47110f3dd8a6bb50a50a50f937d1cd10db43d20db090266ddaecd5bfcef2d13c250224da571e1f6768e5733a57a3090163f7c89392092a1c70192c", 0xcb}], 0x4, 0x1) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x440240, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r1, &(0x7f00000001c0)={0x0, 0xaa, 0x0, 0x0, 0x0, 0xfffffffffffffee1}, 0x2400c080) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000100)={0x200, 0x62, 0x20, {0x3, 0x8}, 0x9, 0x1000}) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000180)={0x3, [0x463f, 0x80000001], 0x101}, 0x10) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1399.992119] FAULT_INJECTION: forcing a failure. [ 1399.992119] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.004051] CPU: 1 PID: 3382 Comm: syz-executor.3 Not tainted 4.14.166-syzkaller #0 [ 1400.011860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.021216] Call Trace: [ 1400.024078] dump_stack+0x142/0x197 [ 1400.027712] should_fail.cold+0x10f/0x159 [ 1400.031856] should_failslab+0xdb/0x130 [ 1400.035833] kmem_cache_alloc_node+0x287/0x780 [ 1400.040436] __alloc_skb+0x9c/0x500 [ 1400.044054] ? skb_trim+0x180/0x180 [ 1400.047679] ? netlink_autobind.isra.0+0x1c9/0x290 [ 1400.052694] netlink_sendmsg+0x874/0xc60 [ 1400.056751] ? netlink_unicast+0x650/0x650 [ 1400.060989] ? security_socket_sendmsg+0x89/0xb0 [ 1400.066004] ? netlink_unicast+0x650/0x650 [ 1400.070239] sock_sendmsg+0xce/0x110 [ 1400.073961] ___sys_sendmsg+0x70a/0x840 [ 1400.077923] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 1400.082789] ? __fget+0x210/0x370 [ 1400.086232] ? find_held_lock+0x35/0x130 [ 1400.090298] ? __fget+0x210/0x370 [ 1400.093757] ? lock_downgrade+0x740/0x740 [ 1400.097904] ? __fget+0x237/0x370 [ 1400.101359] ? __fget_light+0x172/0x1f0 [ 1400.105331] ? __fdget+0x1b/0x20 [ 1400.108700] ? sockfd_lookup_light+0xb4/0x160 [ 1400.113187] __sys_sendmsg+0xb9/0x140 [ 1400.117002] ? SyS_shutdown+0x170/0x170 [ 1400.120999] SyS_sendmsg+0x2d/0x50 [ 1400.124538] ? __sys_sendmsg+0x140/0x140 [ 1400.128602] do_syscall_64+0x1e8/0x640 [ 1400.132642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1400.137486] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1400.142759] RIP: 0033:0x45b159 [ 1400.145952] RSP: 002b:00007fa493c31c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1400.153658] RAX: ffffffffffffffda RBX: 00007fa493c326d4 RCX: 000000000045b159 [ 1400.161036] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000008 [ 1400.168303] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 1400.175595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 1400.182860] R13: 000000000000099c R14: 00000000004caed3 R15: 0000000000000000 [ 1400.802532] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1400.819215] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1400.842637] device bridge_slave_1 left promiscuous mode [ 1400.850936] bridge0: port 2(bridge_slave_1) entered disabled state [ 1400.900789] device bridge_slave_0 left promiscuous mode [ 1400.906388] bridge0: port 1(bridge_slave_0) entered disabled state [ 1401.015673] device hsr_slave_1 left promiscuous mode [ 1401.062898] device hsr_slave_0 left promiscuous mode [ 1401.120716] team0 (unregistering): Port device team_slave_1 removed [ 1401.130685] team0 (unregistering): Port device team_slave_0 removed [ 1401.139983] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1401.164263] bond0 (unregistering): Releasing backup interface bond_slave_0 12:46:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:14 executing program 3 (fault-call:19 fault-nth:1): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1401.235917] bond0 (unregistering): Released all slaves 12:46:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:14 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2061021, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b134) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1403.671051] IPVS: ftp: loaded support on port[0] = 21 [ 1404.493801] IPVS: ftp: loaded support on port[0] = 21 [ 1404.565828] chnl_net:caif_netlink_parms(): no params data found [ 1404.622398] bridge0: port 1(bridge_slave_0) entered blocking state [ 1404.628865] bridge0: port 1(bridge_slave_0) entered disabled state [ 1404.636699] device bridge_slave_0 entered promiscuous mode [ 1404.656987] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.663656] bridge0: port 2(bridge_slave_1) entered disabled state [ 1404.671124] device bridge_slave_1 entered promiscuous mode [ 1404.708274] chnl_net:caif_netlink_parms(): no params data found [ 1404.718754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1404.736156] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1404.771627] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1404.778831] team0: Port device team_slave_0 added [ 1404.784961] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1404.793009] team0: Port device team_slave_1 added [ 1404.813610] bridge0: port 1(bridge_slave_0) entered blocking state [ 1404.820252] bridge0: port 1(bridge_slave_0) entered disabled state [ 1404.827337] device bridge_slave_0 entered promiscuous mode [ 1404.839589] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.846128] bridge0: port 2(bridge_slave_1) entered disabled state [ 1404.854163] device bridge_slave_1 entered promiscuous mode [ 1404.861053] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1404.867656] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1404.893213] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1404.909557] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1404.916009] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1404.941481] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1404.965523] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1404.974017] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1404.985032] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1404.993076] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1405.028695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1405.036508] team0: Port device team_slave_0 added [ 1405.074647] device hsr_slave_0 entered promiscuous mode [ 1405.120346] device hsr_slave_1 entered promiscuous mode [ 1405.160695] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1405.167944] team0: Port device team_slave_1 added [ 1405.182093] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1405.194900] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1405.207939] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1405.214421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1405.241354] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1405.256239] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1405.262774] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1405.288858] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1405.309427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1405.319619] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1405.392305] device hsr_slave_0 entered promiscuous mode [ 1405.430632] device hsr_slave_1 entered promiscuous mode [ 1405.477094] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1405.492066] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1405.545120] bridge0: port 2(bridge_slave_1) entered blocking state [ 1405.551517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1405.558130] bridge0: port 1(bridge_slave_0) entered blocking state [ 1405.564926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1405.590610] bridge0: port 1(bridge_slave_0) entered disabled state [ 1405.602176] bridge0: port 2(bridge_slave_1) entered disabled state [ 1405.648369] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1405.682675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1405.697555] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1405.708286] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1405.715264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1405.722726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1405.737917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1405.745640] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1405.752410] 8021q: adding VLAN 0 to HW filter on device team0 [ 1405.766830] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1405.774432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1405.782717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1405.790806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1405.798526] bridge0: port 1(bridge_slave_0) entered blocking state [ 1405.805046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1405.814160] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1405.821500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1405.828525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1405.836919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1405.851964] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1405.863132] 8021q: adding VLAN 0 to HW filter on device team0 [ 1405.869604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1405.877888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1405.885902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1405.892288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1405.902687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1405.917382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1405.926750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1405.937023] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1405.945104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1405.953342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1405.961482] bridge0: port 1(bridge_slave_0) entered blocking state [ 1405.967821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1405.974931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1405.983500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1405.993037] bridge0: port 2(bridge_slave_1) entered blocking state [ 1405.999933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1406.007968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1406.016590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1406.025605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1406.034269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1406.042796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1406.053352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1406.065884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1406.074070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1406.082652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1406.091456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1406.098929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1406.108832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1406.125062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1406.133111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1406.142436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1406.153108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1406.161652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1406.171140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1406.179070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1406.186411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1406.194971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1406.204693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1406.212404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1406.220452] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1406.229928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1406.241630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1406.249281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1406.258685] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1406.265414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1406.274008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1406.284350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1406.294227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1406.301984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1406.309567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1406.317646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1406.331500] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1406.337859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1406.348321] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1406.356936] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1406.364936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1406.371999] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1406.388813] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1406.399250] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1406.408110] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1406.414776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1406.422312] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1406.434389] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1406.482962] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1406.495307] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1406.505431] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1406.512489] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1406.521386] device bridge_slave_1 left promiscuous mode [ 1406.526862] bridge0: port 2(bridge_slave_1) entered disabled state [ 1406.561106] device bridge_slave_0 left promiscuous mode [ 1406.566603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1406.623181] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1406.629944] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1406.639251] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1406.646104] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1406.653831] device bridge_slave_1 left promiscuous mode [ 1406.659294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1406.711171] device bridge_slave_0 left promiscuous mode [ 1406.716696] bridge0: port 1(bridge_slave_0) entered disabled state [ 1406.762804] device veth1_macvtap left promiscuous mode [ 1406.768334] device veth0_macvtap left promiscuous mode [ 1406.774163] device veth1_vlan left promiscuous mode [ 1406.779216] device veth0_vlan left promiscuous mode [ 1406.784744] device veth1_macvtap left promiscuous mode [ 1406.790193] device veth0_macvtap left promiscuous mode [ 1406.795507] device veth1_vlan left promiscuous mode [ 1406.800725] device veth0_vlan left promiscuous mode [ 1406.964192] device hsr_slave_1 left promiscuous mode [ 1407.004101] device hsr_slave_0 left promiscuous mode [ 1407.049285] team0 (unregistering): Port device team_slave_1 removed [ 1407.058443] team0 (unregistering): Port device team_slave_0 removed [ 1407.068263] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1407.104474] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1407.161439] bond0 (unregistering): Released all slaves [ 1407.283605] device hsr_slave_1 left promiscuous mode [ 1407.322995] device hsr_slave_0 left promiscuous mode [ 1407.388325] team0 (unregistering): Port device team_slave_1 removed [ 1407.399435] team0 (unregistering): Port device team_slave_0 removed [ 1407.408527] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1407.434133] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1407.509787] bond0 (unregistering): Released all slaves [ 1407.581806] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1407.594977] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1407.602548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1407.611068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1407.640644] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1407.654854] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1407.662318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1407.670707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1407.681350] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1407.688272] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1407.701072] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1407.714638] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1407.721982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1407.729448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1407.737732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1407.745086] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1407.759463] device veth0_vlan entered promiscuous mode [ 1407.770694] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1407.777715] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1407.784718] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1407.792750] device veth1_vlan entered promiscuous mode [ 1407.798481] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1407.809167] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1407.817130] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1407.824704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1407.832608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1407.841109] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1407.847957] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1407.901268] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1407.941066] device veth0_vlan entered promiscuous mode [ 1407.958353] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1407.968475] device veth1_vlan entered promiscuous mode [ 1407.979390] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1407.989918] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1408.002709] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1408.013761] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1408.022074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1408.029731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1408.044133] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1408.055258] device veth0_macvtap entered promiscuous mode [ 1408.063659] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1408.078775] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1408.090402] device veth1_macvtap entered promiscuous mode [ 1408.096695] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1408.111753] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1408.124351] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1408.132463] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1408.139887] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1408.151388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1408.159141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1408.173957] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1408.185132] device veth0_macvtap entered promiscuous mode [ 1408.193081] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1408.202662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1408.212999] device veth1_macvtap entered promiscuous mode [ 1408.219348] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1408.233161] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1408.250068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1408.260731] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1408.267770] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1408.278050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1408.288559] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1408.300770] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1408.307906] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1408.316281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1408.325705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1408.336440] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1408.349873] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1408.357838] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1408.368646] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1408.378559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1408.390660] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1408.400187] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1408.409904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1408.420000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1408.429964] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1408.440965] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1408.449180] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1408.459162] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1408.467826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1408.478204] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1408.490361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1408.499482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1408.511848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1408.522596] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1408.529498] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1408.537631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1408.547579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1408.742323] bridge0: port 2(bridge_slave_1) entered disabled state [ 1408.749014] bridge0: port 1(bridge_slave_0) entered disabled state [ 1408.878634] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1408.899320] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1409.079047] bridge0: port 2(bridge_slave_1) entered disabled state [ 1409.085784] bridge0: port 1(bridge_slave_0) entered disabled state [ 1409.138029] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1409.149050] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:46:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) tkill(r2, 0x22) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000003c0)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fcntl$setflags(r5, 0x2, 0x1) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r6 = socket$nl_route(0x10, 0x3, 0x0) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'system.', '^vboxnet1\x00'}, &(0x7f0000000300)='/dev/dlm-control\x00', 0x11, 0x2) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002b80)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$sock_netrom_SIOCADDRT(r7, 0x890b, &(0x7f0000002bc0)={0x0, @null, @bpq0='bpq0\x00', 0x3, 'syz0\x00', @null, 0x9, 0x8, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1410.793702] IPVS: ftp: loaded support on port[0] = 21 12:46:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x8, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000069c0)=[{{&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000640)=""/232, 0xe8}, {&(0x7f0000000740)=""/183, 0xb7}, {&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000800)=""/4090, 0xffa}, {&(0x7f0000001800)=""/91, 0x5b}, {&(0x7f0000001880)=""/226, 0xe2}, {&(0x7f0000001980)}, {&(0x7f00000019c0)=""/145, 0x91}], 0x8, &(0x7f0000001b00)=""/226, 0xe2}, 0x6}, {{&(0x7f0000001c00)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001c80)=""/40, 0x28}], 0x1, &(0x7f0000001d00)=""/175, 0xaf}, 0x6e33139c}, {{&(0x7f0000001dc0)=@nfc_llcp, 0x80, &(0x7f0000002e40)=[{&(0x7f0000001e40)=""/4096, 0x1000}], 0x1, &(0x7f0000002e80)=""/76, 0x4c}, 0x3}, {{&(0x7f0000002f00)=@llc, 0x80, &(0x7f0000004200)=[{&(0x7f0000002f80)=""/82, 0x52}, {&(0x7f0000003000)=""/147, 0x93}, {&(0x7f00000030c0)=""/26, 0x1a}, {&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004100)=""/240, 0xf0}], 0x5, &(0x7f0000004280)=""/4096, 0x1000}, 0x1949305f}, {{0x0, 0x0, &(0x7f0000005500)=[{&(0x7f0000005280)=""/224, 0xe0}, {&(0x7f0000005380)=""/13, 0xd}, {&(0x7f00000053c0)=""/113, 0x71}, {&(0x7f0000005440)=""/7, 0x7}, {&(0x7f0000005480)=""/115, 0x73}], 0x5, &(0x7f0000005580)=""/19, 0x13}, 0x5}, {{&(0x7f00000055c0), 0x80, &(0x7f0000005940)=[{&(0x7f0000005640)=""/184, 0xb8}, {&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000005800)=""/165, 0xa5}, {&(0x7f00000058c0)=""/57, 0x39}, {&(0x7f0000005900)=""/51, 0x33}], 0x5, &(0x7f00000059c0)=""/233, 0xe9}, 0x8}, {{&(0x7f0000005ac0)=@nfc_llcp, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000005b40)=""/210, 0xd2}, {&(0x7f0000005c40)=""/112, 0x70}, {&(0x7f0000005cc0)=""/61, 0x3d}, {&(0x7f0000005d00)=""/187, 0xbb}], 0x4, &(0x7f0000005e00)=""/249, 0xf9}}, {{&(0x7f0000005f00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000006280)=[{&(0x7f0000005f80)=""/11, 0xb}, {&(0x7f0000005fc0)=""/130, 0x82}, {&(0x7f0000006080)=""/241, 0xf1}, {&(0x7f0000006180)=""/64, 0x40}, {&(0x7f00000061c0)=""/142, 0x8e}], 0x5, &(0x7f0000006300)=""/199, 0xc7}, 0x81}, {{&(0x7f0000006400), 0x80, &(0x7f0000006840)=[{&(0x7f0000006480)=""/130, 0x82}, {&(0x7f0000006540)=""/183, 0xb7}, {&(0x7f0000006600)=""/53, 0x35}, {&(0x7f0000006640)=""/8, 0x8}, {&(0x7f0000006680)=""/255, 0xff}, {&(0x7f0000006780)=""/129, 0x81}], 0x6, &(0x7f00000068c0)=""/211, 0xd3}, 0x2ae7}], 0x9, 0x4162, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x9, 0x0) sched_getscheduler(r4) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r7 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r6, r7, 0x0) ioctl$EVIOCGREP(r7, 0x80084503, &(0x7f00000003c0)=""/238) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x959026, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r5 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r4, r5, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r5, 0x500e, 0x0) write(r3, &(0x7f00000002c0)="2e859f251ae1b4e45c5894be5d8840edb98b2797d29e56e882e5f2382fbb477ba8d81459ee4747a6044e7771f77bc38bb7be6091000232bf0fc58ba3f1623583493a73863f9bdaccd6424812af3b9807e6caa13cf68909c59bcdb4f0af6e0723", 0xb) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r6, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x2, 0x13, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1411.571609] chnl_net:caif_netlink_parms(): no params data found [ 1411.616088] bridge0: port 1(bridge_slave_0) entered blocking state [ 1411.623289] bridge0: port 1(bridge_slave_0) entered disabled state [ 1411.630703] device bridge_slave_0 entered promiscuous mode [ 1411.637777] bridge0: port 2(bridge_slave_1) entered blocking state [ 1411.644843] bridge0: port 2(bridge_slave_1) entered disabled state [ 1411.652211] device bridge_slave_1 entered promiscuous mode [ 1411.674516] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1411.684310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1411.701369] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1411.708509] team0: Port device team_slave_0 added [ 1411.715619] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1411.723949] team0: Port device team_slave_1 added [ 1411.740242] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1411.746490] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1411.772579] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1411.786386] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1411.792840] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1411.818840] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1411.829574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1411.837315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1411.903361] device hsr_slave_0 entered promiscuous mode [ 1411.940387] device hsr_slave_1 entered promiscuous mode [ 1411.982364] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1411.990797] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1412.052095] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1412.085070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1412.093452] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1412.105401] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1412.113049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1412.120309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1412.129513] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1412.135736] 8021q: adding VLAN 0 to HW filter on device team0 [ 1412.147899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1412.156344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1412.164961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1412.173051] bridge0: port 1(bridge_slave_0) entered blocking state [ 1412.179741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1412.191362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1412.202260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1412.209319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1412.217286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1412.225166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1412.233480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1412.240240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1412.247344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1412.257891] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1412.265622] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1412.274258] device bridge_slave_1 left promiscuous mode [ 1412.279831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1412.320694] device bridge_slave_0 left promiscuous mode [ 1412.326250] bridge0: port 1(bridge_slave_0) entered disabled state [ 1412.442671] device hsr_slave_1 left promiscuous mode [ 1412.482526] device hsr_slave_0 left promiscuous mode [ 1412.547213] team0 (unregistering): Port device team_slave_1 removed [ 1412.558331] team0 (unregistering): Port device team_slave_0 removed [ 1412.567374] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1412.602977] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1412.679465] bond0 (unregistering): Released all slaves [ 1412.725414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1412.733134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1412.743798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1412.753624] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1412.760889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1412.768531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1412.776321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1412.784024] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1412.791962] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1412.801110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1412.808227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1412.816711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1412.826516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1412.833613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1412.841287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1412.850997] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1412.857157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1412.874235] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1412.882344] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1412.888584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1412.895585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1412.936724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1413.029305] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1413.049021] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1413.056843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1413.068959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1413.129521] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1413.138197] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1413.149177] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1413.165017] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1413.172645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1413.184648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1413.194411] device veth0_vlan entered promiscuous mode [ 1413.202183] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1413.209203] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1413.220886] device veth1_vlan entered promiscuous mode [ 1413.226743] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1413.237587] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1413.254885] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1413.267438] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1413.279193] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1413.287364] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1413.298146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1413.306062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1413.320363] device veth0_macvtap entered promiscuous mode [ 1413.326743] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1413.337348] device veth1_macvtap entered promiscuous mode [ 1413.343845] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1413.353731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1413.364996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1413.374555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1413.384671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1413.395801] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1413.403677] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1413.413447] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1413.421310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1413.428524] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1413.436545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1413.446509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1413.457102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1413.467638] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1413.475328] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1413.482802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1413.493203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1414.451375] IPVS: ftp: loaded support on port[0] = 21 [ 1415.174326] chnl_net:caif_netlink_parms(): no params data found [ 1415.224490] bridge0: port 1(bridge_slave_0) entered blocking state [ 1415.231458] bridge0: port 1(bridge_slave_0) entered disabled state [ 1415.238648] device bridge_slave_0 entered promiscuous mode [ 1415.245959] bridge0: port 2(bridge_slave_1) entered blocking state [ 1415.252763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1415.259750] device bridge_slave_1 entered promiscuous mode [ 1415.280706] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1415.290202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1415.306962] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1415.314516] team0: Port device team_slave_0 added [ 1415.323960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1415.331238] team0: Port device team_slave_1 added [ 1415.348357] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1415.355028] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1415.381334] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1415.395571] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1415.402295] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 12:46:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) fadvise64(r6, 0x9, 0x1ff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1415.428334] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1415.439088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1415.448635] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 12:46:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x240000, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 12:46:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1415.515595] device hsr_slave_0 entered promiscuous mode [ 1415.570368] device hsr_slave_1 entered promiscuous mode [ 1415.610885] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1415.618243] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 12:46:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1415.817813] bridge0: port 2(bridge_slave_1) entered blocking state [ 1415.824533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1415.831314] bridge0: port 1(bridge_slave_0) entered blocking state [ 1415.837863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1415.893956] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1415.904884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1415.914892] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1415.927905] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1415.936411] device bridge_slave_1 left promiscuous mode [ 1415.946166] bridge0: port 2(bridge_slave_1) entered disabled state [ 1415.991099] device bridge_slave_0 left promiscuous mode [ 1415.996793] bridge0: port 1(bridge_slave_0) entered disabled state [ 1416.186329] device hsr_slave_1 left promiscuous mode [ 1416.244509] device hsr_slave_0 left promiscuous mode [ 1416.299664] team0 (unregistering): Port device team_slave_1 removed [ 1416.315749] team0 (unregistering): Port device team_slave_0 removed [ 1416.329203] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1416.378118] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1416.469377] bond0 (unregistering): Released all slaves [ 1416.556272] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1416.563785] bridge0: port 1(bridge_slave_0) entered disabled state [ 1416.570844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1416.578055] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1416.588192] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1416.594643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1416.601644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1416.611604] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1416.617845] 8021q: adding VLAN 0 to HW filter on device team0 [ 1416.626581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1416.634291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1416.642388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1416.649980] bridge0: port 1(bridge_slave_0) entered blocking state [ 1416.656396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1416.665666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1416.673189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1416.681675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1416.689212] bridge0: port 2(bridge_slave_1) entered blocking state [ 1416.695715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1416.709251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1416.717544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1416.728395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1416.736626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1416.746801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1416.753943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1416.761888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1416.769688] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1416.825106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1416.832958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1416.845873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1416.856083] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1416.867231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1416.877685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1416.892379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1416.904486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1416.912998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1416.926551] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1416.933263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1416.954711] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1416.963860] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1416.975556] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1416.983019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1416.994788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1417.090913] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1417.106942] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1417.115391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1417.129205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1417.211250] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1417.218500] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1417.231439] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1417.242084] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1417.249029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1417.262434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1417.276626] device veth0_vlan entered promiscuous mode [ 1417.285287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1417.296612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1417.307853] device veth1_vlan entered promiscuous mode [ 1417.317853] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1417.328728] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1417.346269] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1417.361854] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1417.368850] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1417.381272] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1417.388625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1417.401055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1417.412413] device veth0_macvtap entered promiscuous mode [ 1417.418634] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1417.434178] device veth1_macvtap entered promiscuous mode [ 1417.445125] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1417.455471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1417.471684] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1417.485251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.495370] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.508733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1417.519041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.534039] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1417.543773] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1417.558726] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1417.567525] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1417.578047] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1417.588738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1417.603594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1417.634156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.649623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1417.659643] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1417.670353] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1417.677426] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1417.685013] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1417.697078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:46:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1418.721295] IPVS: ftp: loaded support on port[0] = 21 [ 1418.867812] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.874563] bridge0: port 1(bridge_slave_0) entered disabled state [ 1419.008240] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1419.019884] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:46:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r1, r2, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000040)={0x8, 0x6, 0x4, 0x100000, 0x7, {r3, r4/1000+30000}, {0x4, 0xc, 0x56, 0x4a, 0x80, 0xf1, "4d869e65"}, 0x9a, 0x4, @fd, 0x1ff, 0x0, 0xffffffffffffffff}) ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0x18) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'vboxnet0(posix_acl_access(md5sum'}, {0x20, ']*'}, {0x20, '/dev/input/mice\x00'}, {0x20, '/dev/uinput\x00'}, {0x20, 'ppp0\x93!&ppp0'}], 0xa, "9eb91e4a45d1a11d2eec1f7f4f6e0c07e0a3425fc89bec5b795e1d84bb3933b8390aa96891c94552ec1965f8806de06bf09dcf7564a083dd3a4b3b74bc5ab4c9bd8acf494a227b04eefcb1328afe3200c5a4d8232873001cc002aad793d303ca23d72565f52fb7d60ca474b9d5ee93ba4b6302d64b734fd92011a80dc5e59864cc407c48e8152a39014515cffb6b0dc185"}, 0xea) 12:46:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1419.603841] IPVS: ftp: loaded support on port[0] = 21 [ 1419.682768] chnl_net:caif_netlink_parms(): no params data found [ 1419.795655] chnl_net:caif_netlink_parms(): no params data found [ 1419.807492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1419.817222] bridge0: port 1(bridge_slave_0) entered disabled state [ 1419.825030] device bridge_slave_0 entered promiscuous mode [ 1419.843301] bridge0: port 2(bridge_slave_1) entered blocking state [ 1419.849940] bridge0: port 2(bridge_slave_1) entered disabled state [ 1419.858837] device bridge_slave_1 entered promiscuous mode [ 1419.885466] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1419.895079] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1419.921609] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1419.928772] team0: Port device team_slave_0 added [ 1419.938124] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1419.945548] team0: Port device team_slave_1 added [ 1419.972815] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1419.979262] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1420.005811] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1420.016009] bridge0: port 1(bridge_slave_0) entered blocking state [ 1420.023309] bridge0: port 1(bridge_slave_0) entered disabled state [ 1420.030472] device bridge_slave_0 entered promiscuous mode [ 1420.041637] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1420.047894] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1420.073238] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1420.084014] bridge0: port 2(bridge_slave_1) entered blocking state [ 1420.090870] bridge0: port 2(bridge_slave_1) entered disabled state [ 1420.097892] device bridge_slave_1 entered promiscuous mode [ 1420.104718] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1420.113036] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1420.182555] device hsr_slave_0 entered promiscuous mode [ 1420.220510] device hsr_slave_1 entered promiscuous mode [ 1420.262037] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1420.272086] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1420.286619] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1420.301617] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1420.308607] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1420.316499] team0: Port device team_slave_0 added [ 1420.326911] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1420.334435] team0: Port device team_slave_1 added [ 1420.363228] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1420.369568] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1420.395059] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1420.412961] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1420.419376] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1420.445509] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1420.458791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1420.472636] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1420.543813] device hsr_slave_0 entered promiscuous mode [ 1420.580442] device hsr_slave_1 entered promiscuous mode [ 1420.627139] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1420.637972] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1420.665966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1420.674587] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1420.681600] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1420.689168] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1420.696209] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1420.704067] device bridge_slave_1 left promiscuous mode [ 1420.709697] bridge0: port 2(bridge_slave_1) entered disabled state [ 1420.751472] device bridge_slave_0 left promiscuous mode [ 1420.757086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1420.812118] device veth1_macvtap left promiscuous mode [ 1420.817938] device veth0_macvtap left promiscuous mode [ 1420.823422] device veth1_vlan left promiscuous mode [ 1420.829077] device veth0_vlan left promiscuous mode [ 1420.943869] device hsr_slave_1 left promiscuous mode [ 1420.983893] device hsr_slave_0 left promiscuous mode [ 1421.028822] team0 (unregistering): Port device team_slave_1 removed [ 1421.038391] team0 (unregistering): Port device team_slave_0 removed [ 1421.048612] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1421.085078] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1421.180570] bond0 (unregistering): Released all slaves [ 1421.280782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1421.310532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1421.326256] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1421.339002] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1421.348285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1421.355807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1421.363922] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1421.370331] 8021q: adding VLAN 0 to HW filter on device team0 [ 1421.379622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1421.388991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1421.397945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1421.406532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1421.414216] bridge0: port 1(bridge_slave_0) entered blocking state [ 1421.420706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1421.428914] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1421.439294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1421.446749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1421.454316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1421.462170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1421.469743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1421.476139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1421.532068] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1421.541369] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1421.547524] 8021q: adding VLAN 0 to HW filter on device team0 [ 1421.554262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1421.561401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1421.571203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1421.578999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1421.586873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1421.600766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1421.608551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1421.616679] bridge0: port 1(bridge_slave_0) entered blocking state [ 1421.623088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1421.632822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1421.640434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1421.647483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1421.666341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1421.674844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1421.688535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1421.697130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1421.710238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1421.718239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1421.731416] bridge0: port 2(bridge_slave_1) entered blocking state [ 1421.737946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1421.752746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1421.768524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1421.776856] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1421.789400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1421.799013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1421.812641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1421.825781] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1421.837457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1421.845655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1421.853935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1421.862238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1421.878421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1421.887982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1421.901023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1421.909193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1421.923055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1421.934266] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1421.944407] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1421.956926] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1421.965177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1421.978315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1421.986969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1421.994964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1422.005871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1422.015892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1422.025684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1422.039236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1422.049598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1422.062621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1422.074510] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1422.085952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1422.093688] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1422.108783] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1422.122553] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1422.136606] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1422.143338] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1422.156621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1422.163723] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1422.174954] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1422.187960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1422.196445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1422.397924] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1422.409408] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1422.419239] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1422.426761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1422.435733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1422.446129] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1422.453324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1422.467227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1422.507125] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1422.515059] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1422.522524] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1422.532649] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1422.540339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1422.547844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1422.556255] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1422.564468] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1422.572997] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1422.585414] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1422.592745] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1422.600876] device veth0_vlan entered promiscuous mode [ 1422.612127] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1422.619735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1422.627667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1422.635945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1422.643506] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1422.653467] device veth0_vlan entered promiscuous mode [ 1422.664206] device veth1_vlan entered promiscuous mode [ 1422.670354] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1422.681689] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1422.689826] device veth1_vlan entered promiscuous mode [ 1422.695833] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1422.715695] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1422.731586] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1422.752476] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1422.768079] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1422.776374] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1422.784504] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1422.792713] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1422.801307] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1422.808588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1422.816753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1422.826800] device veth0_macvtap entered promiscuous mode [ 1422.833368] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1422.845523] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1422.853749] device veth1_macvtap entered promiscuous mode [ 1422.860876] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1422.867498] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1422.875814] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1422.883820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1422.891868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1422.901832] device veth0_macvtap entered promiscuous mode [ 1422.908036] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1422.918103] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1422.932151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1422.943319] device veth1_macvtap entered promiscuous mode [ 1422.949475] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1422.966927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1422.976490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1422.986970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1422.997721] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1423.005591] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1423.016470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1423.029086] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1423.036652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1423.044160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1423.052080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1423.062550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1423.073978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1423.084467] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1423.091676] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1423.100764] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1423.111340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1423.120786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1423.130927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1423.141819] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1423.148907] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1423.159000] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1423.171590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1423.180140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1423.187915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1423.198544] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1423.208979] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1423.218778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1423.228601] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1423.239029] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1423.246208] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1423.254584] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1423.262702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1423.585812] bridge0: port 2(bridge_slave_1) entered disabled state [ 1423.592394] bridge0: port 1(bridge_slave_0) entered disabled state [ 1423.719863] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1423.737067] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:46:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5b434f232a12583897117e3322efcc513d2f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x2, 0x80000, 0x7f) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x132c, 0xd, 0x2, 0x3, 0x70bd25, 0x25dfdbff, {0x1, 0x0, 0x3}, [@nested={0x10b2, 0x66, 0x0, 0x1, [@typed={0xc, 0x57, 0x0, 0x0, @u64=0x6}, @typed={0x8, 0x27, 0x0, 0x0, @pid}, @generic="16b2d1bcd0ac5b68791f5e312b9e71c88c182763d43fb2d4e37dd96f7da62735e4dfe3b3797e89e3e072288190c5addedd9adf550ce7735467a77e9e52cda2dee69345cfc7e25cd2b2bf044bd092822f67fbbf497bd3e2cf2c360ddaf6d9e80b614ffb25d00ee5f5f14052c9bcea884fcac88b2d578125efd89b181b03ac358a07caf041df14", @generic="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", @typed={0x14, 0x46, 0x0, 0x0, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x30}}}]}, @nested={0x17d, 0x49, 0x0, 0x1, [@typed={0xc, 0x36, 0x0, 0x0, @u64=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x31}}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x4}, @generic="05c52b9bd4b255674bf55821747a0030082f48b5623dd603ad4858f37731161bd1911569680654fece3ed6bd36a28cfd38b8f32fb300edfff87fcd1112d0cf3d6d146fc8ee32284cd97741c6f9b9fda3b3a44278c56758b6d43f5849c9b1f4c740d8ff9fd5b43c3265126ca91ba29f9a77a6c8aa851905dd5517bf62c9facd24d57aa8c84bcbc18790926196238c93a10314607e87785b080e95674757c81c6c71c3bfa74c97097430fd999c928804218d2b9cd1346a9f0f3e1a2b1885a1a1f393", @generic="34676cc90f1bb2ee57fa40bda5a22b846f6e30efae12cfeb2ba586acb6", @generic="f8e61f0230af770dec21f4dd8d9ac544d7e776b8b468033ebb933dbe06c2d801da650d00fda737b0517887c671e7e448a4caa40a9a973d0040643625c823eac62765b063e23c35f3f38194fa6d18c2ff589027d99dbc966af3682bad0cccf1d31a6a0eb3b488c882e651054099fb811df22c32", @typed={0xc, 0x28, 0x0, 0x0, @u64=0x4bbe64c6}]}, @typed={0xe3, 0x31, 0x0, 0x0, @binary="3ada7e6710bd22f3c20e173f21eb5a0db7448dfc59e37274fd3f2cc231b81712a0eab7b93ca263f1810750d9fa46c66c6f69300bf0de1e43e8baf98f2acc7a9c35c2daae02b47c12c14803b2dbbbd87ae74d23e4e4e5b1cfd3576296d03f61ed95989cff2df4e746c2311ded59977f3a0a565ad79f2bab0e2b2c0f3018e1905a79827dc50ca2c98b869ab1a2a886b74b6a22ff0e4cfc489dee778245762ff581b0a7b5b079b4445a1d1299929bc938e34a82233d3a04edcafbbecef6bbef5b11116d49cc95d663201d554a8bd7b8f1549f62a706129a0ce5b58acca47b68f5"}]}, 0x132c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40004) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80, 0x48, 0x40, 0x4, 0x0, 0x3, 0x41dc, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x100, 0x1}, 0x10000, 0xd825, 0x40, 0x4, 0x643ccb83, 0x2, 0x7fff}, r0, 0xc, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1424.317537] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1424.330820] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1424.346920] device bridge_slave_1 left promiscuous mode [ 1424.356909] bridge0: port 2(bridge_slave_1) entered disabled state [ 1424.411635] device bridge_slave_0 left promiscuous mode [ 1424.417399] bridge0: port 1(bridge_slave_0) entered disabled state 12:46:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0], 0x2}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1424.602854] device hsr_slave_1 left promiscuous mode [ 1424.645371] device hsr_slave_0 left promiscuous mode [ 1424.702707] team0 (unregistering): Port device team_slave_1 removed [ 1424.739218] team0 (unregistering): Port device team_slave_0 removed [ 1424.766705] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1424.813975] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1424.885260] bond0 (unregistering): Released all slaves 12:46:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:37 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x600000, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000002c0), &(0x7f0000000300)=0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000640)=""/149) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000400)={'TPROXY\x00'}, &(0x7f0000000480)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0xa, 0x0, 0x5, 0x7fff, 0x0, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) write(r4, &(0x7f0000000700)="6f151d150ce45398f22b2bcbf7f1ae429d70d540220973e7eb8a426cca89e588c17da1e0dd6a0000000000000074916a0400000006fe9ef74b1106a51a298e17aa59c635b58bff9d7358413957ef6159373a49f2ab69697d0b89a22ca1e885cb93f97595aa8b2ff65042b83a378f1ff2a8767640f0375fd023061add7c5e4cab0d2a9fca8660c38217dad269201a398755bbc769eaf824a0c9075aeca45067d06df7956a5d87ab7e000000000000000000", 0xb1) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, &(0x7f00000002c0)) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000000040)={0x2, [0x4000, 0x0]}, 0x8) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80000, 0x0) readlinkat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10040, 0x0) bind$ax25(r2, &(0x7f0000000040)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 12:46:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1427.353469] IPVS: ftp: loaded support on port[0] = 21 [ 1428.133901] IPVS: ftp: loaded support on port[0] = 21 [ 1428.179941] chnl_net:caif_netlink_parms(): no params data found [ 1428.243744] bridge0: port 1(bridge_slave_0) entered blocking state [ 1428.250585] bridge0: port 1(bridge_slave_0) entered disabled state [ 1428.257561] device bridge_slave_0 entered promiscuous mode [ 1428.265060] bridge0: port 2(bridge_slave_1) entered blocking state [ 1428.271797] bridge0: port 2(bridge_slave_1) entered disabled state [ 1428.278826] device bridge_slave_1 entered promiscuous mode [ 1428.300594] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1428.316550] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1428.345643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1428.352977] team0: Port device team_slave_0 added [ 1428.389420] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1428.397087] team0: Port device team_slave_1 added [ 1428.437553] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1428.446301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1428.471752] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1428.481783] chnl_net:caif_netlink_parms(): no params data found [ 1428.491131] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1428.497471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1428.523189] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1428.540367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1428.551404] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1428.623880] device hsr_slave_0 entered promiscuous mode [ 1428.670335] device hsr_slave_1 entered promiscuous mode [ 1428.719791] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1428.726675] bridge0: port 1(bridge_slave_0) entered blocking state [ 1428.733656] bridge0: port 1(bridge_slave_0) entered disabled state [ 1428.740677] device bridge_slave_0 entered promiscuous mode [ 1428.747523] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1428.762852] bridge0: port 2(bridge_slave_1) entered blocking state [ 1428.769370] bridge0: port 2(bridge_slave_1) entered disabled state [ 1428.776467] device bridge_slave_1 entered promiscuous mode [ 1428.806309] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1428.820314] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1428.849335] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1428.856995] team0: Port device team_slave_0 added [ 1428.863324] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1428.870731] team0: Port device team_slave_1 added [ 1428.905514] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1428.912164] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1428.937827] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1428.954163] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1428.960500] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1428.986383] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1428.997173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1429.005000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1429.062464] device hsr_slave_0 entered promiscuous mode [ 1429.100361] device hsr_slave_1 entered promiscuous mode [ 1429.141045] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1429.150623] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1429.167447] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.174020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1429.180754] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.187798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1429.197193] bridge0: port 1(bridge_slave_0) entered disabled state [ 1429.207102] bridge0: port 2(bridge_slave_1) entered disabled state [ 1429.276495] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1429.306532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1429.316398] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1429.329774] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1429.336959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1429.344259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1429.354770] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1429.361368] 8021q: adding VLAN 0 to HW filter on device team0 [ 1429.372999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1429.381925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1429.389736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1429.397689] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.404083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1429.416560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1429.424651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1429.432809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1429.441275] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.447745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1429.460987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1429.468169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1429.480328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1429.488809] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1429.499676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1429.510185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1429.517824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1429.526300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1429.534552] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1429.543526] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1429.556607] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1429.564923] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1429.572749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1429.580372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1429.587580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1429.596060] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1429.606019] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1429.612675] 8021q: adding VLAN 0 to HW filter on device team0 [ 1429.623084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1429.632118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1429.639670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1429.649470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1429.658701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1429.669107] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1429.675358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1429.684090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1429.691719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1429.699130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1429.706649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1429.714510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1429.723182] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.729677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1429.740651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1429.749565] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1429.757456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1429.768210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1429.776089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1429.784696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1429.792440] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.799251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1429.806555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1429.817977] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1429.825310] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1429.833277] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1429.840876] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1429.848438] device bridge_slave_1 left promiscuous mode [ 1429.854144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1429.900901] device bridge_slave_0 left promiscuous mode [ 1429.906463] bridge0: port 1(bridge_slave_0) entered disabled state [ 1429.964601] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1429.972192] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1429.979754] device bridge_slave_1 left promiscuous mode [ 1429.985484] bridge0: port 2(bridge_slave_1) entered disabled state [ 1430.030693] device bridge_slave_0 left promiscuous mode [ 1430.036340] bridge0: port 1(bridge_slave_0) entered disabled state [ 1430.092023] device veth1_macvtap left promiscuous mode [ 1430.097801] device veth0_macvtap left promiscuous mode [ 1430.103395] device veth1_vlan left promiscuous mode [ 1430.108438] device veth0_vlan left promiscuous mode [ 1430.223995] device hsr_slave_1 left promiscuous mode [ 1430.262873] device hsr_slave_0 left promiscuous mode [ 1430.307583] team0 (unregistering): Port device team_slave_1 removed [ 1430.318457] team0 (unregistering): Port device team_slave_0 removed [ 1430.328399] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1430.363561] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1430.439371] bond0 (unregistering): Released all slaves [ 1430.534163] device hsr_slave_1 left promiscuous mode [ 1430.572746] device hsr_slave_0 left promiscuous mode [ 1430.617094] team0 (unregistering): Port device team_slave_1 removed [ 1430.628056] team0 (unregistering): Port device team_slave_0 removed [ 1430.637015] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1430.683502] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1430.740551] bond0 (unregistering): Released all slaves [ 1430.783909] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1430.794722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1430.802756] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1430.815868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1430.825548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1430.836234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1430.845323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1430.853629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1430.861456] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1430.876628] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1430.884602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1430.893095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1430.902457] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1430.910970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1430.921188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1430.928296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1430.937066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1430.944682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1430.952707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1430.962540] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1430.968585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1430.986946] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1430.996406] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1431.003060] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1431.009881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1431.024030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1431.062312] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1431.074178] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1431.083540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1431.095877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1431.214613] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1431.228419] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1431.236741] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1431.247369] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1431.255052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1431.266731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1431.288607] device veth0_vlan entered promiscuous mode [ 1431.298595] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1431.307207] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1431.315003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1431.326669] device veth1_vlan entered promiscuous mode [ 1431.337736] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1431.347277] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 1431.359116] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1431.367363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1431.386240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1431.406962] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1431.428379] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1431.453726] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1431.467726] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1431.475620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1431.483656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1431.497694] device veth0_macvtap entered promiscuous mode [ 1431.504747] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1431.519954] device veth1_macvtap entered promiscuous mode [ 1431.531075] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1431.544991] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1431.553462] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1431.561223] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1431.569599] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1431.581323] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1431.587941] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1431.596132] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1431.604370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1431.612228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1431.624203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1431.633841] device veth0_vlan entered promiscuous mode [ 1431.641743] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1431.649337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1431.663346] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1431.678866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1431.693966] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1431.701862] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1431.718429] device veth1_vlan entered promiscuous mode [ 1431.725579] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1431.732554] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1431.741907] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1431.749777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1431.764473] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1431.777059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1431.789386] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1431.798859] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1431.810688] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1431.829127] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1431.844896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1431.857090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1431.872790] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1431.893503] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1431.901398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1431.909754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1431.920803] device veth0_macvtap entered promiscuous mode [ 1431.926880] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1431.939222] device veth1_macvtap entered promiscuous mode [ 1431.945748] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1431.955927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1431.967066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1431.977493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1431.992812] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.004605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.014796] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.025266] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1432.032441] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1432.042379] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1432.049916] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1432.057290] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1432.065275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1432.075714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.085936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.095373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.105565] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.116439] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1432.123534] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1432.131698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1432.141164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1432.293901] bridge0: port 2(bridge_slave_1) entered disabled state [ 1432.300597] bridge0: port 1(bridge_slave_0) entered disabled state [ 1432.433295] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1432.443403] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1432.523159] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58380 sclass=netlink_route_socket pig=3756 comm=syz-executor.3 [ 1432.621334] bridge0: port 2(bridge_slave_1) entered disabled state [ 1432.628220] bridge0: port 1(bridge_slave_0) entered disabled state [ 1432.670572] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1432.679274] batman_adv: batadv0: Interface deactivated: batadv_slave_1 12:46:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:46:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000000000), 0x4) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000200)=0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ptrace$setopts(0x6305, r0, 0x5fe9, 0x8) dup3(r3, r4, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r4, 0x40405514, &(0x7f0000000040)={0x0, 0x5, 0x9, 0x8, '\x00', 0x4}) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4ae", 0x12}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 12:46:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff45, 0x0, 0xffffffffffffff79, 0x0, 0x65e35f8cd3f447d7}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x6) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000040)=0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1433.153801] IPVS: ftp: loaded support on port[0] = 21 [ 1433.252400] chnl_net:caif_netlink_parms(): no params data found [ 1433.276952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58380 sclass=netlink_route_socket pig=3756 comm=syz-executor.3 12:46:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) recvmmsg(r1, &(0x7f0000001f80)=[{{&(0x7f00000002c0)=@l2, 0x80, &(0x7f0000002080)=[{&(0x7f00000003c0)=""/86, 0x56}], 0x1, &(0x7f0000000640)=""/4096, 0x1000}, 0x3f}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000440)=""/82, 0x52}, {&(0x7f0000001640)=""/130, 0x82}, {&(0x7f00000004c0)=""/29, 0x1d}, {&(0x7f0000001700)=""/97, 0x61}], 0x4, &(0x7f00000017c0)=""/175, 0xaf}, 0x6}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001880)=""/116, 0x74}, {&(0x7f0000001900)=""/92, 0x5c}, {&(0x7f0000001980)=""/54, 0x36}], 0x3, &(0x7f0000001a00)=""/83, 0x53}, 0xb68}, {{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001a80)=""/99, 0x63}, {&(0x7f0000001b00)=""/217, 0xd9}, {&(0x7f0000001c00)=""/64, 0x40}, {&(0x7f0000001c40)=""/199, 0xc7}, {&(0x7f0000001d40)=""/212, 0xd4}], 0x5, &(0x7f0000001ec0)=""/151, 0x97}, 0xaf}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc1a4d5717cd1b136) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x81000) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="02f600000000000008001b0000000000012c80c8f30d2ceeca2021c5c97d629f5bce2f495225ee37fe117e1022efcc51212f21d2c01f62b249b50cd5e45ca4bca13260e54f36250280377a7264303769159a7ab442afce560fc440c436b52c3669302f9911534f286207b7f376c3ea0729c7abf64d7e87b681eb90a07dd0959bce5f695e0143d8a507b7934d4c4d6a39a4599e4b8d54423714d780d639641fe4b945afd89993ead000bc0852ac2fa187de1c71710693d5eea72a898ef7d087323c35382404721104f747a0ee6a6c91fb451a69a3f53de2036ca3941725164109a2b0303fc544a55e7f0fbca3482ac28effe5be9dbe27a3bd7c26e5ceff181754939a5feb3e4d120dbd3e7c4aa7c42bd8390c69c5ed"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 1433.305215] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.311964] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.318911] device bridge_slave_0 entered promiscuous mode [ 1433.326820] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.333504] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.345456] device bridge_slave_1 entered promiscuous mode [ 1433.376602] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1433.386781] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1433.405470] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1433.412828] team0: Port device team_slave_0 added [ 1433.420010] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1433.427216] team0: Port device team_slave_1 added [ 1433.444939] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1433.451341] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1433.476656] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1433.502073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1433.508772] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1433.534527] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1433.548201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1433.556044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1433.577235] device hsr_slave_0 entered promiscuous mode [ 1433.583007] device hsr_slave_1 entered promiscuous mode [ 1433.589240] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1433.597906] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1433.656944] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.663474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1433.670199] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.676594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1433.709672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1433.718042] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1433.728733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1433.736109] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.744094] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.756703] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1433.763205] 8021q: adding VLAN 0 to HW filter on device team0 [ 1433.773210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1433.780751] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.787300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1433.797084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1433.805296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.811713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1433.823995] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1433.832552] ================================================================== [ 1433.840191] BUG: KASAN: null-ptr-deref in batadv_tvlv_container_ogm_append+0x172/0x480 [ 1433.848767] Read of size 24 at addr (null) by task kworker/u4:4/2332 [ 1433.856109] [ 1433.857721] CPU: 1 PID: 2332 Comm: kworker/u4:4 Not tainted 4.14.166-syzkaller #0 [ 1433.865326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.874703] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 1433.881793] Call Trace: [ 1433.884529] dump_stack+0x142/0x197 [ 1433.888170] ? batadv_tvlv_container_ogm_append+0x172/0x480 [ 1433.893919] kasan_report.cold+0x127/0x2af [ 1433.898185] check_memory_region+0x123/0x190 [ 1433.902587] memcpy+0x24/0x50 [ 1433.905736] batadv_tvlv_container_ogm_append+0x172/0x480 [ 1433.911268] batadv_iv_ogm_schedule+0xba0/0xe20 [ 1433.915930] ? save_trace+0x290/0x290 [ 1433.919722] ? process_one_work+0x787/0x1600 [ 1433.924189] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1433.930640] process_one_work+0x863/0x1600 [ 1433.934872] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 1433.939538] worker_thread+0x5d9/0x1050 [ 1433.943507] kthread+0x319/0x430 [ 1433.946965] ? process_one_work+0x1600/0x1600 [ 1433.951569] ? kthread_create_on_node+0xd0/0xd0 [ 1433.956258] ret_from_fork+0x24/0x30 [ 1433.959966] ================================================================== [ 1433.967330] Disabling lock debugging due to kernel taint [ 1433.972823] Kernel panic - not syncing: panic_on_warn set ... [ 1433.972823] [ 1433.980180] CPU: 1 PID: 2332 Comm: kworker/u4:4 Tainted: G B 4.14.166-syzkaller #0 [ 1433.989007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.998361] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 1434.005495] Call Trace: [ 1434.008072] dump_stack+0x142/0x197 [ 1434.011689] ? batadv_tvlv_container_ogm_append+0x172/0x480 [ 1434.017385] panic+0x1f9/0x42d [ 1434.020569] ? add_taint.cold+0x16/0x16 [ 1434.024673] kasan_end_report+0x47/0x4f [ 1434.028737] kasan_report.cold+0x130/0x2af [ 1434.032968] check_memory_region+0x123/0x190 [ 1434.037370] memcpy+0x24/0x50 [ 1434.040473] batadv_tvlv_container_ogm_append+0x172/0x480 [ 1434.046114] batadv_iv_ogm_schedule+0xba0/0xe20 [ 1434.050800] ? save_trace+0x290/0x290 [ 1434.054600] ? process_one_work+0x787/0x1600 [ 1434.059010] batadv_iv_send_outstanding_bat_ogm_packet+0x4a1/0x680 [ 1434.065629] process_one_work+0x863/0x1600 [ 1434.069867] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 1434.074561] worker_thread+0x5d9/0x1050 [ 1434.078522] kthread+0x319/0x430 [ 1434.081878] ? process_one_work+0x1600/0x1600 [ 1434.086473] ? kthread_create_on_node+0xd0/0xd0 [ 1434.091201] ret_from_fork+0x24/0x30 [ 1434.096648] Kernel Offset: disabled [ 1434.100341] Rebooting in 86400 seconds..