code=0x50000 [ 1759.661056] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 06:10:01 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:01 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:01 executing program 2: r0 = epoll_create(0x6) r1 = epoll_create(0x2d) r2 = socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)={0x4000000c0000001}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @loopback}}, 0x0, 0x9, 0x0, "701b3d6fa025de62e8177c57991824e553afcbcc019f40d6f2bee00244eb56f86e32271ef14ad419582d9d2df2c9b00039e7c0d2fcd005cfb52ad1cccc6761d67c9b762ec30f247212608954a15febe4"}, 0xd8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000dff4)) 06:10:01 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000a26620ff9f1a8a9800004edaf388f4d61cd6e4084bc53092e1ea0fc78a8da367d1be66fadbdb1985bb4d39e54881feee382b4188652cb535d03b21c7d416049d7bb9e3a3c6b3cc1ed0f79edfae45c9a4d033061154e60046d7ac398af83abe690634f9fcdf74aeee010293590dfad304e8a9545009c793c1527ef04cc60371d102c4ad09118d6a3400409b429b0e"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) readlinkat(r3, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000500)=""/115, 0x73) ptrace$cont(0x18, r5, 0x3, 0x0) [ 1759.667086] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1759.680604] device bridge_slave_1 left promiscuous mode [ 1759.686101] bridge0: port 2(bridge_slave_1) entered disabled state [ 1759.724424] device bridge_slave_0 left promiscuous mode [ 1759.729949] bridge0: port 1(bridge_slave_0) entered disabled state 06:10:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x4e24}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x8}}, {{@in=@local}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0xe8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000140)) setsockopt$sock_int(r1, 0x1, 0x11, &(0x7f0000000100)=0x8, 0x4) [ 1759.782565] device bridge_slave_1 left promiscuous mode [ 1759.814602] bridge0: port 2(bridge_slave_1) entered disabled state [ 1759.891517] device bridge_slave_0 left promiscuous mode [ 1759.897565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1760.352657] device hsr_slave_1 left promiscuous mode [ 1760.414577] device hsr_slave_0 left promiscuous mode [ 1760.482814] team0 (unregistering): Port device team_slave_1 removed [ 1760.526911] team0 (unregistering): Port device team_slave_0 removed [ 1760.572573] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1760.640253] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1760.700963] bond0 (unregistering): Released all slaves [ 1760.802557] device hsr_slave_1 left promiscuous mode [ 1760.854553] device hsr_slave_0 left promiscuous mode [ 1760.894882] team0 (unregistering): Port device team_slave_1 removed [ 1760.905218] team0 (unregistering): Port device team_slave_0 removed [ 1760.915074] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1760.975039] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1761.058843] bond0 (unregistering): Released all slaves [ 1761.114225] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1761.123843] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1761.131334] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1761.171451] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1761.179820] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1761.204428] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1761.213456] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1761.585926] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:02 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:02 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:02 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000500)={0x80000001, 0x9, 0x0, 0x4, 0x6, 0x7}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000540)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, r0, 0x0, 0x1, &(0x7f0000000580)='\x00', 0xffffffffffffffff}, 0x30) getpgrp(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)) r2 = gettid() r3 = syz_open_procfs(r2, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x20000000800, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:10:02 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2287, 0x718000) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 06:10:02 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x3f) 06:10:03 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xef, 0x101200) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x14}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10002011}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x128, r2, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x84, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r1}}}]}}, {{0x8, 0x1, r1}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r1}}}]}}]}, 0x128}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000340)={0x7, 0x100}) [ 1761.832027] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:03 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x3f) 06:10:03 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1761.907623] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:03 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca542902ae4d0aedc5d") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d23b8e300e7c69f0e7338ca6d6aabf71c89389ceb06c85975deb38eee6e51a8991ad5f06c8a30c818cff2ce6c13f8d5f95089ff793669918f42cf25ff12dfed092f3810697c6cd402ef6ef95728cb3ca63102c6abcc86993135ca59112102f3593b6251a1", @ANYRESHEX=r1, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="b2eb000000000000643d", @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000200,max_read=0x0000000000000000,\x00']) 06:10:03 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x30, r1, 0x825, 0x0, 0x0, {{0x1, 0x0, 0x3f00}, 0x4, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x02'}}}, 0x30}}, 0x0) 06:10:03 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1762.265537] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:04 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:04 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:04 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:04 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x44848000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x270, 0x3, 0x8, 0x212, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x200}, [@generic="395fa896495b69777062f59bd8b6c4a43b8194a1307241328e3e8b17d276ce4453548a96a1e7879dc47409fafd45063c8d6c3f52d70472a60964", @generic="7a665d02e4178a93882c0e246897e7ccd607e3d0690180de856760b1cf819ef9d3318bb8892b67a42ba0391d955d0c830ebda9252d02b67da8e77930b3956bf7df924abfcbcad178b5469f8200cb94f44cfa986f00bf3699c044a8d26bf91926c3fe4f", @nested={0xe4, 0x5c, [@generic="ff15da88ae2803254ed7edc52f503802ff75a758f9d39f457e6963932de2917c9bf9121a", @generic="2f1bca48b28237301ca2b20155e179789752678ea6ba7c8b86c0885fabfdaa566fb6a153863d3fff4ef1f7db1ef0f675be6018274d2c564af389787cd56eb91776f93ecd787ead72bf9667cba4fe5579206a66c17e70820981f019366910c463b2a8f32cbdc222e5a60043d6580397fca90b8df18367aa0665aa7d48f3c151161864b983d730d2696a2c5ca16b303cae1a2fd16030693dd50a5f82f6637fa470928a657fb6b1af47", @typed={0x14, 0x18, @ipv6=@dev={0xfe, 0x80, [], 0x22}}]}, @generic="bbf56f44311e527ad3f3e07bdb1c011e088fab26683cb738f6f6420b8b0880ff42baff45c7c839489bd566260e22b3196b8646a4ae20e954dce0d7fc2c35065da352a3be6b985737de67dc11a82f54dd5a4b6cfa3bfe3146634b3084d1af0e8dd6949952cec56ab9232e677b01b589bfeacdecd416a4ed8a6f03532e75daab20bbbafb7f2e913dc0d7f9a526f5e98fd8cda1dbac57da0462c3a3eb36f30d86b38f73e7b131ab901af540fe888e1b0cba96d1b0b42569d8fbbe95ec3558305cfbc03367c7462bdd995af3e39fe3dcf0890aad808fd51b797209882e"]}, 0x270}, 0x1, 0x0, 0x0, 0x20040000}, 0x40000) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x756d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) [ 1762.827220] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:04 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x80000001, 0x1, 0x8205, 0xf53, 0x8, 0xc719, 0xdba6, 0x7eb, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x0, 0x0) [ 1765.900213] IPVS: ftp: loaded support on port[0] = 21 [ 1766.291564] IPVS: ftp: loaded support on port[0] = 21 [ 1766.325709] chnl_net:caif_netlink_parms(): no params data found [ 1766.397359] bridge0: port 1(bridge_slave_0) entered blocking state [ 1766.404162] bridge0: port 1(bridge_slave_0) entered disabled state [ 1766.411598] device bridge_slave_0 entered promiscuous mode [ 1766.418409] bridge0: port 2(bridge_slave_1) entered blocking state [ 1766.424930] bridge0: port 2(bridge_slave_1) entered disabled state [ 1766.433503] device bridge_slave_1 entered promiscuous mode [ 1766.440239] IPVS: ftp: loaded support on port[0] = 21 [ 1766.473650] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1766.486605] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1766.532928] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1766.540391] team0: Port device team_slave_0 added [ 1766.549558] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1766.557134] team0: Port device team_slave_1 added [ 1766.566261] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1766.579584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1766.694244] device hsr_slave_0 entered promiscuous mode [ 1766.731217] device hsr_slave_1 entered promiscuous mode [ 1766.790788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1766.806350] chnl_net:caif_netlink_parms(): no params data found [ 1766.818064] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1766.924475] bridge0: port 2(bridge_slave_1) entered blocking state [ 1766.930892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1766.937529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1766.943922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1766.986370] bridge0: port 1(bridge_slave_0) entered blocking state [ 1766.993106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1767.000085] device bridge_slave_0 entered promiscuous mode [ 1767.006528] chnl_net:caif_netlink_parms(): no params data found [ 1767.018729] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.025208] bridge0: port 2(bridge_slave_1) entered disabled state [ 1767.032745] device bridge_slave_1 entered promiscuous mode [ 1767.059456] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1767.081325] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1767.108616] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1767.117088] team0: Port device team_slave_0 added [ 1767.139312] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1767.146515] team0: Port device team_slave_1 added [ 1767.168388] bridge0: port 1(bridge_slave_0) entered blocking state [ 1767.176131] bridge0: port 1(bridge_slave_0) entered disabled state [ 1767.183708] device bridge_slave_0 entered promiscuous mode [ 1767.190710] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1767.197843] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.204267] bridge0: port 2(bridge_slave_1) entered disabled state [ 1767.211573] device bridge_slave_1 entered promiscuous mode [ 1767.235789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1767.244178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1767.261861] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1767.334470] device hsr_slave_0 entered promiscuous mode [ 1767.360653] device hsr_slave_1 entered promiscuous mode [ 1767.409936] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1767.418075] team0: Port device team_slave_0 added [ 1767.423370] bridge0: port 1(bridge_slave_0) entered disabled state [ 1767.430754] bridge0: port 2(bridge_slave_1) entered disabled state [ 1767.439501] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1767.447021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1767.454272] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1767.461897] team0: Port device team_slave_1 added [ 1767.482915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1767.496115] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1767.514858] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1767.526936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1767.536673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1767.592492] device hsr_slave_0 entered promiscuous mode [ 1767.650361] device hsr_slave_1 entered promiscuous mode [ 1767.701248] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1767.714569] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1767.722420] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1767.740650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1767.747560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1767.765465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1767.783307] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1767.789385] 8021q: adding VLAN 0 to HW filter on device team0 [ 1767.804527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1767.815353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1767.827009] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1767.834155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1767.842958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1767.850778] bridge0: port 1(bridge_slave_0) entered blocking state [ 1767.857122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1767.864291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1767.872305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1767.879803] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.886199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1767.893078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1767.922298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1767.937456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1767.943833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1767.959645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1767.968847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1767.979133] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1767.988857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1767.996899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1768.006904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1768.017001] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1768.023737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1768.031603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1768.039202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1768.048989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1768.059254] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1768.069383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1768.076990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1768.085118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1768.092441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1768.102644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1768.111705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1768.119169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1768.127967] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1768.135553] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1768.142513] 8021q: adding VLAN 0 to HW filter on device team0 [ 1768.152714] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1768.158724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1768.171421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1768.178283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1768.188116] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1768.195474] 8021q: adding VLAN 0 to HW filter on device team0 [ 1768.205677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1768.217701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1768.225668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1768.233497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1768.241961] bridge0: port 1(bridge_slave_0) entered blocking state [ 1768.248300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1768.255304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1768.263480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1768.271190] bridge0: port 1(bridge_slave_0) entered blocking state [ 1768.277524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1768.284795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1768.292439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1768.302074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1768.315802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1768.324513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1768.335771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1768.343571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1768.349899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1768.357110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1768.364999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1768.372657] bridge0: port 2(bridge_slave_1) entered blocking state [ 1768.378982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1768.389004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1768.399017] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1768.406957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1768.415063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1768.424041] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1768.438876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1768.448482] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1768.456974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1768.465450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1768.475947] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1768.487705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1768.501150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1768.508896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1768.518218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1768.525977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1768.534181] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1768.541833] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1768.552013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1768.562157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1768.575058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1768.583300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1768.591413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1768.598972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1768.607971] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1768.621330] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1768.635465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1768.643647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1768.651440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1768.658997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1768.669556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1768.677156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1768.684977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1768.692521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1768.703699] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1768.709722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1768.726500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1768.740888] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1768.753505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1768.762142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1768.777004] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1768.783148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1768.803961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1768.816683] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1768.847373] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1768.998991] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1769.021604] kauditd_printk_skb: 3143 callbacks suppressed [ 1769.021613] audit: type=1326 audit(1564467010.307:216972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28748 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 [ 1769.109616] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1769.134872] audit: type=1326 audit(1564467010.417:216973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1769.172516] audit: type=1326 audit(1564467010.427:216974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.207537] audit: type=1326 audit(1564467010.427:216975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.246487] audit: type=1326 audit(1564467010.427:216976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.279029] audit: type=1326 audit(1564467010.437:216977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.305032] audit: type=1326 audit(1564467010.437:216978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.330273] audit: type=1326 audit(1564467010.437:216979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.355566] audit: type=1326 audit(1564467010.447:216980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.381262] audit: type=1326 audit(1564467010.447:216981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1769.570667] device bridge_slave_1 left promiscuous mode [ 1769.576198] bridge0: port 2(bridge_slave_1) entered disabled state [ 1769.621415] device bridge_slave_0 left promiscuous mode [ 1769.631774] bridge0: port 1(bridge_slave_0) entered disabled state [ 1769.692001] device bridge_slave_1 left promiscuous mode [ 1769.697576] bridge0: port 2(bridge_slave_1) entered disabled state 06:10:11 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x3f) 06:10:11 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:11 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000640)=@known='system.sockprotoname\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x2}, 0xfffffffffffffd97, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) 06:10:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000080)=0x2, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x800, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000100)=""/36) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 06:10:11 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1769.751166] device bridge_slave_0 left promiscuous mode [ 1769.757572] bridge0: port 1(bridge_slave_0) entered disabled state 06:10:11 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1769.864520] device bridge_slave_1 left promiscuous mode [ 1769.873739] bridge0: port 2(bridge_slave_1) entered disabled state [ 1769.944231] device bridge_slave_0 left promiscuous mode [ 1769.954310] bridge0: port 1(bridge_slave_0) entered disabled state 06:10:11 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:11 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1770.443789] device hsr_slave_1 left promiscuous mode [ 1770.484940] device hsr_slave_0 left promiscuous mode [ 1770.554383] team0 (unregistering): Port device team_slave_1 removed [ 1770.592793] team0 (unregistering): Port device team_slave_0 removed [ 1770.641885] bond0 (unregistering): Releasing backup interface bond_slave_1 06:10:12 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1770.721860] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1770.918746] bond0 (unregistering): Released all slaves 06:10:12 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1771.053207] device hsr_slave_1 left promiscuous mode [ 1771.114554] device hsr_slave_0 left promiscuous mode [ 1771.176371] team0 (unregistering): Port device team_slave_1 removed 06:10:12 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1771.218402] team0 (unregistering): Port device team_slave_0 removed [ 1771.232528] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1771.275632] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1771.369397] bond0 (unregistering): Released all slaves 06:10:12 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1771.484700] device hsr_slave_1 left promiscuous mode [ 1771.524605] device hsr_slave_0 left promiscuous mode [ 1771.574181] team0 (unregistering): Port device team_slave_1 removed [ 1771.594317] team0 (unregistering): Port device team_slave_0 removed [ 1771.612560] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1771.655554] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1771.727409] bond0 (unregistering): Released all slaves [ 1771.791863] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:13 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000600)) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:13 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:13 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000100)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) 06:10:13 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000640)=@known='system.sockprotoname\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x2}, 0xfffffffffffffd97, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) [ 1772.004924] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1772.043405] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1775.660180] IPVS: ftp: loaded support on port[0] = 21 [ 1775.973563] chnl_net:caif_netlink_parms(): no params data found [ 1776.019603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1776.026115] bridge0: port 1(bridge_slave_0) entered disabled state [ 1776.034158] device bridge_slave_0 entered promiscuous mode [ 1776.041912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1776.048328] bridge0: port 2(bridge_slave_1) entered disabled state [ 1776.055818] device bridge_slave_1 entered promiscuous mode [ 1776.078171] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1776.088886] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1776.109226] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1776.117366] team0: Port device team_slave_0 added [ 1776.123099] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1776.130664] team0: Port device team_slave_1 added [ 1776.135971] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1776.143663] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1776.203898] device hsr_slave_0 entered promiscuous mode [ 1776.250542] device hsr_slave_1 entered promiscuous mode [ 1776.293351] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1776.306065] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1776.318652] bridge0: port 2(bridge_slave_1) entered blocking state [ 1776.325065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1776.331676] bridge0: port 1(bridge_slave_0) entered blocking state [ 1776.338012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1776.375377] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1776.381997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1776.389790] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1776.398353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1776.407122] bridge0: port 1(bridge_slave_0) entered disabled state [ 1776.413823] bridge0: port 2(bridge_slave_1) entered disabled state [ 1776.427325] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1776.433581] 8021q: adding VLAN 0 to HW filter on device team0 [ 1776.442151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1776.449695] bridge0: port 1(bridge_slave_0) entered blocking state [ 1776.456100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1776.466708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1776.474336] bridge0: port 2(bridge_slave_1) entered blocking state [ 1776.480726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1776.501450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1776.509130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1776.518921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1776.526037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1776.536479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1776.550736] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1776.556764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1776.572199] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1776.587076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1776.960577] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1777.177358] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1777.194257] kauditd_printk_skb: 3527 callbacks suppressed [ 1777.194266] audit: type=1326 audit(1564467018.487:220509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1777.220117] audit: type=1326 audit(1564467018.487:220510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.257465] audit: type=1326 audit(1564467018.487:220511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.288749] audit: type=1326 audit(1564467018.487:220512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.313863] audit: type=1326 audit(1564467018.487:220513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.338993] audit: type=1326 audit(1564467018.487:220514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.364119] audit: type=1326 audit(1564467018.487:220515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.389274] audit: type=1326 audit(1564467018.487:220516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.414467] audit: type=1326 audit(1564467018.487:220517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1777.439505] audit: type=1326 audit(1564467018.487:220518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28814 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 06:10:18 executing program 5: mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:18 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbff, 0x40000}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) r2 = semget(0x1, 0x0, 0x8) semctl$GETVAL(r2, 0x4, 0xc, &(0x7f0000000500)=""/43) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="300000001000010800000000000000008fa5947f7b0186e73a18000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000de6734d9a24fa3f787a8db013fcb88a2b1d65665b676593017bdc86308a0fc2c3c29aac36c20e0989fa2ce9a190ed68cacb791ac8a06600ecfb0aa31a777f9a57f691b5c83c8f81a2241f75184dfed41af32d588358a7c7a2de236e9416e9a00"/135], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(r0, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:10:18 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:18 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000600)) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:18 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:18 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000640)=@known='system.sockprotoname\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x2}, 0xfffffffffffffd97, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) [ 1777.595680] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 06:10:19 executing program 5: mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1777.668582] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0xca53, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000180)="1c6b4b1c963aaf043fe7e6f4711bc5290503514d2d75ec9b8ae16f1ea45a93ddc053730ea0dd6cd203cc510f9cb11f68042866f28b2c9f08f5ec1d7ef90f596da91a7946d78bc7e93d7e9801992e1575e5e2f93b6c3ad0a9da04b2cef21110965ed877e505d0fbf3ee67442189094dfdb03b90b84418ae1cc5fd5b2e5ae5578f353e829f427545504742ff0570e356039aad409658b80ecf4a8532d8664163bd4ecc42737c86accd8ff88047ebe029ccb14dd080f4d6008f9d87358514126ff4a1492cd4644ef96676a06dfc66c0bf19b3de8b2380128c8a74dc1e6afc04276079b103355b66951951f0", 0xea, 0x5}, {&(0x7f0000000280)="f3377d86f9de6218001cbcb6d09631a825f9dc107d771577a191e9b4a4f7515f974bd67b03f963e4e14455cba22eb67f22ad0a14407fc8bf4d3a77ecc58eca145c89363158c06cbaca6b6083d47b8cd2af1f837bc3c88a0ebd46925cad9e48dcfbc31261ad7b34746e47b0d1", 0x6c, 0xa45}, {&(0x7f00000000c0)="4adf44964111c13610a93ec681153de064705b3b4610f703a4267c7837e99edf5ae94b968c63253f68b03832dbdba5c6e726725791d5f1c0aed8", 0x3a, 0x412ff799}, {&(0x7f0000000300)="a9bcbd1e30d4", 0x6, 0x4}, {&(0x7f0000000340)="97902bb4ee8838daab4a810b98b7c4a57a4259a48d788e40d351cefc9ad93f8815281749a167b2f45d967873a2f85988c515196731046c8d6759b32c96e952fd9f58d23e8cde2087c3aaa6604ae8b18780e27fab19ad5d5294a8e202c45b3578a4cd33d4d3f26940a6b8d386bdc62445d27c", 0x72, 0x3}], 0x8, &(0x7f0000000500)={[{@session={'session', 0x3d, 0x2}}, {@quiet='quiet'}], [{@uid_eq={'uid', 0x3d, r1}}]}) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2c00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x80, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000640)={0x3, &(0x7f0000000600)=[{}, {}, {}]}) write(r0, &(0x7f0000000540)="a1772f485ea29c6e97bab32718594c11b1bb1c5a63b8cc96b50386da2be5677891c42b4f623a9ba49ef7641c4d665e8110e331c16bd7f72f5f07cd8d6e036389a6d44606ca909cbc92e982297f0a67a38f0465bf73f0c0eb67a590d1da54e35ca3f74e54a5d317ba521cf6a8ba54fdd1b2c20eb6b81a3401ec3873", 0x7b) 06:10:19 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:19 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="30800092b98b6a132da2d469acb5f18f0000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$selinux_create(r3, &(0x7f0000000500)=@objname={'system_u:object_r:random_device_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x20, 0x20, './file0/file0\x00'}, 0x57) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000100)={0x1, 0xf92c, 0x9a}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) [ 1777.914115] device bridge_slave_1 left promiscuous mode [ 1777.937412] bridge0: port 2(bridge_slave_1) entered disabled state [ 1778.001476] device bridge_slave_0 left promiscuous mode [ 1778.008498] bridge0: port 1(bridge_slave_0) entered disabled state [ 1778.022280] hfs: invalid session number or type of track [ 1778.027761] hfs: can't find a HFS filesystem on dev loop2 [ 1778.141593] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35769 sclass=netlink_route_socket pig=28836 comm=syz-executor.4 06:10:19 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1778.195586] device bridge_slave_1 left promiscuous mode [ 1778.228834] bridge0: port 2(bridge_slave_1) entered disabled state [ 1778.293052] device bridge_slave_0 left promiscuous mode [ 1778.302902] bridge0: port 1(bridge_slave_0) entered disabled state [ 1778.362880] device bridge_slave_1 left promiscuous mode [ 1778.368383] bridge0: port 2(bridge_slave_1) entered disabled state [ 1778.441132] device bridge_slave_0 left promiscuous mode [ 1778.449035] bridge0: port 1(bridge_slave_0) entered disabled state 06:10:19 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:19 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000008400004500"/24], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) [ 1778.759469] hfs: invalid session number or type of track [ 1778.776133] hfs: can't find a HFS filesystem on dev loop2 06:10:20 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1779.002672] device hsr_slave_1 left promiscuous mode [ 1779.054618] device hsr_slave_0 left promiscuous mode [ 1779.135954] team0 (unregistering): Port device team_slave_1 removed [ 1779.175529] team0 (unregistering): Port device team_slave_0 removed [ 1779.225082] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1779.275572] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1779.466457] bond0 (unregistering): Released all slaves [ 1779.595379] device hsr_slave_1 left promiscuous mode [ 1779.655920] device hsr_slave_0 left promiscuous mode [ 1779.716248] team0 (unregistering): Port device team_slave_1 removed [ 1779.746739] team0 (unregistering): Port device team_slave_0 removed [ 1779.779755] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1779.854626] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1779.939252] bond0 (unregistering): Released all slaves [ 1780.021904] device hsr_slave_1 left promiscuous mode [ 1780.084521] device hsr_slave_0 left promiscuous mode [ 1780.144001] team0 (unregistering): Port device team_slave_1 removed [ 1780.153925] team0 (unregistering): Port device team_slave_0 removed [ 1780.163896] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1780.195840] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1780.285594] bond0 (unregistering): Released all slaves [ 1780.347604] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1784.100171] IPVS: ftp: loaded support on port[0] = 21 [ 1784.378139] IPVS: ftp: loaded support on port[0] = 21 [ 1784.433831] chnl_net:caif_netlink_parms(): no params data found [ 1784.507222] IPVS: ftp: loaded support on port[0] = 21 [ 1784.514378] bridge0: port 1(bridge_slave_0) entered blocking state [ 1784.521214] bridge0: port 1(bridge_slave_0) entered disabled state [ 1784.528353] device bridge_slave_0 entered promiscuous mode [ 1784.535304] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.541776] bridge0: port 2(bridge_slave_1) entered disabled state [ 1784.548920] device bridge_slave_1 entered promiscuous mode [ 1784.575350] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1784.587351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1784.612271] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1784.619440] team0: Port device team_slave_0 added [ 1784.627176] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1784.634538] team0: Port device team_slave_1 added [ 1784.649340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1784.669988] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1784.783858] device hsr_slave_0 entered promiscuous mode [ 1784.840475] device hsr_slave_1 entered promiscuous mode [ 1784.884216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1784.894373] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1784.905638] chnl_net:caif_netlink_parms(): no params data found [ 1784.985024] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.991455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1784.998100] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.004530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1785.049157] chnl_net:caif_netlink_parms(): no params data found [ 1785.066378] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.073157] bridge0: port 1(bridge_slave_0) entered disabled state [ 1785.080188] device bridge_slave_0 entered promiscuous mode [ 1785.092357] bridge0: port 2(bridge_slave_1) entered blocking state [ 1785.098760] bridge0: port 2(bridge_slave_1) entered disabled state [ 1785.106162] device bridge_slave_1 entered promiscuous mode [ 1785.134524] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1785.143759] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1785.172682] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1785.179921] team0: Port device team_slave_0 added [ 1785.194853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1785.202825] team0: Port device team_slave_1 added [ 1785.214690] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1785.223120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1785.249995] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.256507] bridge0: port 1(bridge_slave_0) entered disabled state [ 1785.264025] device bridge_slave_0 entered promiscuous mode [ 1785.282963] bridge0: port 2(bridge_slave_1) entered blocking state [ 1785.289373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1785.296427] device bridge_slave_1 entered promiscuous mode [ 1785.354569] device hsr_slave_0 entered promiscuous mode [ 1785.410513] device hsr_slave_1 entered promiscuous mode [ 1785.450709] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1785.468602] bridge0: port 1(bridge_slave_0) entered disabled state [ 1785.476405] bridge0: port 2(bridge_slave_1) entered disabled state [ 1785.485833] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1785.494295] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1785.506379] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1785.537080] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1785.544408] team0: Port device team_slave_0 added [ 1785.556328] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1785.563960] team0: Port device team_slave_1 added [ 1785.575957] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1785.584082] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1785.596288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1785.603323] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1785.619741] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1785.693599] device hsr_slave_0 entered promiscuous mode [ 1785.740267] device hsr_slave_1 entered promiscuous mode [ 1785.782130] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1785.789197] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1785.797648] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1785.806826] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1785.813246] 8021q: adding VLAN 0 to HW filter on device team0 [ 1785.825286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1785.832345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1785.853242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1785.868896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1785.875570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1785.883819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1785.892219] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.898564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1785.909054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1785.919029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1785.927298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1785.935467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1785.943167] bridge0: port 2(bridge_slave_1) entered blocking state [ 1785.949506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1785.956635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1785.966432] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1785.974478] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1785.983913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1785.995362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1786.005863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1786.014999] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1786.024797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1786.032855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1786.041413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1786.048203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1786.056099] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1786.064136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1786.073632] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1786.079699] 8021q: adding VLAN 0 to HW filter on device team0 [ 1786.089554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1786.097387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1786.113583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1786.124297] device bridge_slave_1 left promiscuous mode [ 1786.129786] bridge0: port 2(bridge_slave_1) entered disabled state [ 1786.171066] device bridge_slave_0 left promiscuous mode [ 1786.176510] bridge0: port 1(bridge_slave_0) entered disabled state [ 1786.313526] device hsr_slave_1 left promiscuous mode [ 1786.352577] device hsr_slave_0 left promiscuous mode [ 1786.392587] team0 (unregistering): Port device team_slave_1 removed [ 1786.403070] team0 (unregistering): Port device team_slave_0 removed [ 1786.412595] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1786.453352] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1786.545121] bond0 (unregistering): Released all slaves [ 1786.583926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1786.591946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1786.601733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1786.612334] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1786.623091] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1786.629098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1786.638124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1786.646058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1786.654444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1786.662027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1786.669657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1786.677301] bridge0: port 1(bridge_slave_0) entered blocking state [ 1786.683655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1786.691533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1786.709428] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1786.723368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1786.733158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1786.742110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1786.749629] bridge0: port 2(bridge_slave_1) entered blocking state [ 1786.756020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1786.764934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1786.777393] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1786.785055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1786.799713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1786.808148] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1786.815166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1786.823259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1786.840794] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1786.848031] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1786.859731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1786.867211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1786.874707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1786.883163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1786.893642] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1786.899712] 8021q: adding VLAN 0 to HW filter on device team0 [ 1786.908407] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1786.919796] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1786.929990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1786.937978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1786.948365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1786.961143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1786.967906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1786.983107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1786.996105] bridge0: port 1(bridge_slave_0) entered blocking state [ 1787.002526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1787.011275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1787.018954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1787.027489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1787.058048] kauditd_printk_skb: 1437 callbacks suppressed [ 1787.058057] audit: type=1326 audit(1564467028.347:221956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1787.093755] audit: type=1326 audit(1564467028.347:221957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.130263] audit: type=1326 audit(1564467028.347:221958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.132569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1787.171358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1787.179620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1787.192439] bridge0: port 2(bridge_slave_1) entered blocking state [ 1787.198820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1787.200122] audit: type=1326 audit(1564467028.357:221959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.214290] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1787.246410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1787.254559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1787.266989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1787.270995] audit: type=1326 audit(1564467028.357:221960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.275891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1787.299491] audit: type=1326 audit(1564467028.357:221961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.331139] audit: type=1326 audit(1564467028.357:221962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.358524] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1787.360926] audit: type=1326 audit(1564467028.357:221963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.371603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1787.389517] audit: type=1326 audit(1564467028.357:221964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.389535] audit: type=1326 audit(1564467028.357:221965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28881 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1787.444839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1787.472584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1787.499027] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 06:10:28 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1787.524133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1787.542843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1787.551485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1787.564336] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1787.579882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1787.588263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1787.608538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1787.628144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1787.649550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1787.661963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1787.669895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1787.695461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1787.712505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1787.730683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1787.756945] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1787.766864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1787.795096] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1787.806737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1789.039673] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1789.107026] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:30 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000600)) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:30 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8, 0x113000) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) 06:10:30 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:30 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="30800092b98b6a132da2d469acb5f18f0000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$selinux_create(r3, &(0x7f0000000500)=@objname={'system_u:object_r:random_device_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x20, 0x20, './file0/file0\x00'}, 0x57) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000100)={0x1, 0xf92c, 0x9a}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) 06:10:30 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:30 executing program 5: mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1789.362605] device bridge_slave_1 left promiscuous mode [ 1789.365274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35769 sclass=netlink_route_socket pig=28906 comm=syz-executor.2 [ 1789.380739] bridge0: port 2(bridge_slave_1) entered disabled state [ 1789.411132] device bridge_slave_0 left promiscuous mode [ 1789.418296] bridge0: port 1(bridge_slave_0) entered disabled state 06:10:30 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:31 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0xd20, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20004000) ioctl$BLKIOMIN(r0, 0x40081271, &(0x7f0000000000)) r2 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x1, 0x3, 0x1, 0x6, r2}) [ 1789.743516] device hsr_slave_1 left promiscuous mode [ 1789.794574] device hsr_slave_0 left promiscuous mode 06:10:31 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setregid(0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 1789.854634] team0 (unregistering): Port device team_slave_1 removed [ 1789.942477] team0 (unregistering): Port device team_slave_0 removed 06:10:31 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1789.989725] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1790.047422] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1790.067529] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:10:31 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1790.281758] bond0 (unregistering): Released all slaves 06:10:31 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000280)) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1790.356383] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:31 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, 0x0) ptrace$cont(0x18, r6, 0x3, 0x3f) 06:10:31 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r4 = creat(0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0xfffffffffffffffc) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="30000000ae000108000000000000000000008000cc90a1009e8897b09a469406000751d470b656", @ANYRES32=0x0, @ANYBLOB="00000080f9a40925080000000800040000450000aec3634e147e4b11ca2b5a5177177ef67ab2d410d1c03f349bc3d70821647bd75750dbffffff7f00000000635166489a41cabdcbdac853fc891a27a025ae574ce26aa6d2f0b743ffd9d1f283ad05c586112d192f010100000000000001c49e9a70eabc1e2eead5674600000000"], 0x30}}, 0x0) ioctl$PPPIOCDISCONN(r2, 0x7439) sched_setattr(0x0, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) fchownat(r4, &(0x7f0000000100)='./file0/file0\x00', r0, r6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r7, 0x3, 0x0) 06:10:31 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000280)) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:31 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000400004500"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1793.580161] IPVS: ftp: loaded support on port[0] = 21 [ 1793.891842] IPVS: ftp: loaded support on port[0] = 21 [ 1793.942166] chnl_net:caif_netlink_parms(): no params data found [ 1794.003302] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.009731] bridge0: port 1(bridge_slave_0) entered disabled state [ 1794.017045] device bridge_slave_0 entered promiscuous mode [ 1794.024263] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.030866] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.037988] device bridge_slave_1 entered promiscuous mode [ 1794.073282] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1794.127404] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1794.173944] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1794.181329] team0: Port device team_slave_0 added [ 1794.189845] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1794.196936] team0: Port device team_slave_1 added [ 1794.202329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1794.209410] chnl_net:caif_netlink_parms(): no params data found [ 1794.224881] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1794.292801] device hsr_slave_0 entered promiscuous mode [ 1794.330289] device hsr_slave_1 entered promiscuous mode [ 1794.370589] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1794.385629] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1794.413645] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.420552] bridge0: port 1(bridge_slave_0) entered disabled state [ 1794.427678] device bridge_slave_0 entered promiscuous mode [ 1794.434689] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.441127] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.448273] device bridge_slave_1 entered promiscuous mode [ 1794.461608] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.467970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1794.474636] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.481030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1794.510624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1794.520083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1794.544082] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1794.552129] team0: Port device team_slave_0 added [ 1794.561703] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1794.568745] team0: Port device team_slave_1 added [ 1794.574373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1794.585228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1794.632198] device hsr_slave_0 entered promiscuous mode [ 1794.690311] device hsr_slave_1 entered promiscuous mode [ 1794.731010] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1794.738272] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1794.757316] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.763715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1794.770387] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.776763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1794.795442] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1794.801913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1794.816395] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1794.827465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1794.834765] bridge0: port 1(bridge_slave_0) entered disabled state [ 1794.841912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.849170] bridge0: port 1(bridge_slave_0) entered disabled state [ 1794.855984] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.865172] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1794.871681] 8021q: adding VLAN 0 to HW filter on device team0 [ 1794.883845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1794.891500] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.897838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1794.916894] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1794.925084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1794.933390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.939723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1794.954369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1794.963063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1794.973777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1794.986085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1794.998962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1795.006534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1795.017021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1795.025076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1795.032824] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1795.047021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1795.055125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1795.062791] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1795.073073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1795.081786] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1795.087995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1795.097942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1795.107357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1795.118409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1795.126044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1795.135132] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1795.144822] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1795.151308] 8021q: adding VLAN 0 to HW filter on device team0 [ 1795.158167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1795.165397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1795.176664] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1795.183753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1795.192765] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1795.200898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1795.208685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1795.216907] bridge0: port 1(bridge_slave_0) entered blocking state [ 1795.223257] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1795.239194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1795.247510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1795.255252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1795.263702] bridge0: port 2(bridge_slave_1) entered blocking state [ 1795.270096] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1795.278813] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1795.291569] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1795.299254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1795.311329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1795.319531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1795.329489] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1795.347271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1795.355078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1795.363075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1795.371118] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1795.385962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1795.392971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1795.402089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1795.412463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1795.421107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1795.428605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1795.438104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1795.446518] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1795.458691] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1795.465440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1795.473309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1795.486313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1795.494760] device bridge_slave_1 left promiscuous mode [ 1795.500442] bridge0: port 2(bridge_slave_1) entered disabled state [ 1795.544618] device bridge_slave_0 left promiscuous mode [ 1795.552366] bridge0: port 1(bridge_slave_0) entered disabled state [ 1795.559978] kauditd_printk_skb: 1411 callbacks suppressed [ 1795.559986] audit: type=1326 audit(1564467036.847:223377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1795.597232] audit: type=1326 audit(1564467036.857:223378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.627688] audit: type=1326 audit(1564467036.857:223379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.660631] device bridge_slave_1 left promiscuous mode [ 1795.666114] bridge0: port 2(bridge_slave_1) entered disabled state [ 1795.674138] audit: type=1326 audit(1564467036.857:223380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.705866] audit: type=1326 audit(1564467036.867:223381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.731408] audit: type=1326 audit(1564467036.867:223382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.756200] audit: type=1326 audit(1564467036.867:223383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.780945] audit: type=1326 audit(1564467036.877:223384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.806964] audit: type=1326 audit(1564467036.877:223385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 06:10:37 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:37 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, 0x0) ptrace$cont(0x18, r6, 0x3, 0x3f) 06:10:37 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000400004500"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:37 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000500)=@random={'system.', ']keyring!}*\x00'}) write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x3, &(0x7f0000000540)=[{&(0x7f0000000640)="1fb6f2e808e7b2129e66f4cde55e3d55843c146854a2c5245a5dbeb0ceacff852f7c570f30273eb4469676bf4808f7cfd57ced6b689e430bfb0c7b26b78d6e7a110ccb74f2dd8765a1cee59e8a0ff192f85f902ee39e0f2c0a379aa49b06809a2d45b98b194d6ba2b4e752a261e226c13ff704af41a0f865d36cd1105640bfb0f173abbcd7d9bd93853d33f8c9cb2c30612a5eb2eeaf4e55fd6026c6a8b8ea9edc03944b030dee56c6313eb8710a709a1e61267dde0560abe170743c43b5706e64238f3f1aec1091866d59ed55998bcbe0", 0xd1, 0x20}, {&(0x7f0000000740)="6b51048d50973e4829e6e450257512a2f8d778619efc303fa635bf7ad1e7b453d6f41801d39e61b81b9cf846bdc7428237bbf6978d11e42899c55291333fb2c222076da6fbb820b8359e866cb490b596b59bf79f8c85557c23dbd159d5c1985fa88dc76b2a01c573be2b7bd7d59f9e5bf80deb740292e2be07bc23c80af457eab5693ce99ff78f4565f7f74a3bd50fac9948e10f08a7c20fec6b5689e870fe28b32d9a9856f351e08ea3dfa83b4475fab62b33ceb37507b715441064eab4fb0dbabb8f068f82664e8b", 0xc9, 0x5}, {&(0x7f0000000840)="0819b372376bf31908646b94f7aa4f171b0a613ccfb5cabcd106360e3c09a5e9a650801d4f933e702ade202d2d2d101be5bed1ebb9ea6bc75e49eb5dd7449d134b74e45587803bd2ef26bc91686471cb243f42ae6832f5cb43d9a3e7ae3c966a855e4b56551b1ce96a89b6a0110df3450269002e67503992663407f8bb8870211fe7ced84a43649a0bc997d581a287bda47039e36da605c351fac5d15010337730a79cc631725d7a9ac2cfa19353d2f74fa91944452149d5a610a3d6daa85a4bb79ac7793f2334a4adb99abd6e9532cd5c67f5e0953823191e1d92943d2f0675e8fc3592682b6f3f4cf74123b33750f0216db9a148c582d32b07", 0xfa, 0x4}], 0x800, &(0x7f0000000940)={[{@data_err_abort='data_err=abort'}, {@nodiscard='nodiscard'}, {@mblk_io_submit='mblk_io_submit'}, {@data_writeback='data=writeback'}], [{@fowner_lt={'fowner<', r0}}, {@seclabel='seclabel'}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) 06:10:37 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setregid(0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 1795.831751] audit: type=1326 audit(1564467036.877:223386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28957 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1795.837479] device bridge_slave_0 left promiscuous mode [ 1795.884293] bridge0: port 1(bridge_slave_0) entered disabled state [ 1796.014960] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:10:37 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000400004500"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1796.293648] device hsr_slave_1 left promiscuous mode [ 1796.334213] device hsr_slave_0 left promiscuous mode [ 1796.394471] team0 (unregistering): Port device team_slave_1 removed [ 1796.434039] team0 (unregistering): Port device team_slave_0 removed 06:10:37 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1796.477383] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1796.555171] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1796.697049] bond0 (unregistering): Released all slaves 06:10:38 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1796.822549] device hsr_slave_1 left promiscuous mode [ 1796.875502] device hsr_slave_0 left promiscuous mode [ 1796.926847] team0 (unregistering): Port device team_slave_1 removed [ 1796.982208] team0 (unregistering): Port device team_slave_0 removed 06:10:38 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1797.050542] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1797.137546] bond0 (unregistering): Releasing backup interface bond_slave_0 06:10:38 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1797.359276] bond0 (unregistering): Released all slaves [ 1797.435058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1797.479688] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1797.524187] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1797.596276] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1797.838703] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:39 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000280)) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:39 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:39 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x200, 0x0) recvfrom$rose(r1, &(0x7f0000000640)=""/212, 0xd4, 0x1, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1798.162804] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1801.130191] IPVS: ftp: loaded support on port[0] = 21 [ 1801.462109] chnl_net:caif_netlink_parms(): no params data found [ 1801.509348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.515879] bridge0: port 1(bridge_slave_0) entered disabled state [ 1801.525863] device bridge_slave_0 entered promiscuous mode [ 1801.533193] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.539551] bridge0: port 2(bridge_slave_1) entered disabled state [ 1801.546570] device bridge_slave_1 entered promiscuous mode [ 1801.563425] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1801.577042] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1801.595302] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1801.602668] team0: Port device team_slave_0 added [ 1801.608486] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1801.615761] team0: Port device team_slave_1 added [ 1801.621150] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1801.628408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1801.703081] device hsr_slave_0 entered promiscuous mode [ 1801.740249] device hsr_slave_1 entered promiscuous mode [ 1801.780531] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1801.787443] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1801.804309] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.810724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1801.817329] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.823732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1801.858620] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1801.864762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1801.873837] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1801.882173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1801.889249] bridge0: port 1(bridge_slave_0) entered disabled state [ 1801.896368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1801.908922] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1801.915200] 8021q: adding VLAN 0 to HW filter on device team0 [ 1801.924076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1801.931797] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.938143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1801.951871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1801.959449] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.965846] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1801.981606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1801.989244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1801.997003] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1802.014488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1802.025324] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1802.036157] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1802.042326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1802.049215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1802.066990] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1802.077126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1802.450510] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1802.620508] device bridge_slave_1 left promiscuous mode [ 1802.626043] bridge0: port 2(bridge_slave_1) entered disabled state [ 1802.681028] device bridge_slave_0 left promiscuous mode [ 1802.686536] bridge0: port 1(bridge_slave_0) entered disabled state [ 1802.705796] kauditd_printk_skb: 3702 callbacks suppressed [ 1802.705805] audit: type=1326 audit(1564467043.997:227089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1802.737845] device bridge_slave_1 left promiscuous mode [ 1802.741482] audit: type=1326 audit(1564467043.997:227090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.746084] bridge0: port 2(bridge_slave_1) entered disabled state [ 1802.773692] audit: type=1326 audit(1564467043.997:227091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.800825] audit: type=1326 audit(1564467043.997:227092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.825685] audit: type=1326 audit(1564467043.997:227093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.851315] device bridge_slave_0 left promiscuous mode [ 1802.852136] audit: type=1326 audit(1564467043.997:227094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.856782] bridge0: port 1(bridge_slave_0) entered disabled state [ 1802.886591] audit: type=1326 audit(1564467043.997:227095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.913251] audit: type=1326 audit(1564467043.997:227096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.938025] audit: type=1326 audit(1564467043.997:227097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1802.962843] audit: type=1326 audit(1564467043.997:227098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29015 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1803.173651] device hsr_slave_1 left promiscuous mode [ 1803.225551] device hsr_slave_0 left promiscuous mode [ 1803.284581] team0 (unregistering): Port device team_slave_1 removed [ 1803.307241] team0 (unregistering): Port device team_slave_0 removed [ 1803.325292] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1803.385171] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1803.470964] bond0 (unregistering): Released all slaves [ 1803.562648] device hsr_slave_1 left promiscuous mode [ 1803.604191] device hsr_slave_0 left promiscuous mode [ 1803.644187] team0 (unregistering): Port device team_slave_1 removed [ 1803.654080] team0 (unregistering): Port device team_slave_0 removed [ 1803.664154] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1803.705991] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1803.787057] bond0 (unregistering): Released all slaves 06:10:45 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, 0x0) ptrace$cont(0x18, r6, 0x3, 0x3f) 06:10:45 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:45 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0x2000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={&(0x7f0000000100)='./file0/file0\x00', r0}, 0x10) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x15, r5, 0x3, 0x0) 06:10:45 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setregid(0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 06:10:45 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1803.834523] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1803.973247] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:45 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0xffffffffffffffff, r6, 0x3, 0x3f) 06:10:45 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1804.280412] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:45 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:45 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) stat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) [ 1804.567824] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:45 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:46 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001080000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:46 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001080000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1805.566540] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1808.380201] IPVS: ftp: loaded support on port[0] = 21 [ 1808.648476] IPVS: ftp: loaded support on port[0] = 21 [ 1808.705067] chnl_net:caif_netlink_parms(): no params data found [ 1808.772037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1808.778484] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.786658] device bridge_slave_0 entered promiscuous mode [ 1808.796326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1808.803086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.809948] device bridge_slave_1 entered promiscuous mode [ 1808.836222] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1808.845521] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1808.861224] IPVS: ftp: loaded support on port[0] = 21 [ 1808.879598] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1808.886778] team0: Port device team_slave_0 added [ 1808.901994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1808.909140] team0: Port device team_slave_1 added [ 1808.918031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1808.943081] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1809.044380] device hsr_slave_0 entered promiscuous mode [ 1809.110258] device hsr_slave_1 entered promiscuous mode [ 1809.184320] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1809.193588] chnl_net:caif_netlink_parms(): no params data found [ 1809.209854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1809.246731] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.253148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1809.259794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.266204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1809.305568] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.312062] bridge0: port 1(bridge_slave_0) entered disabled state [ 1809.318883] device bridge_slave_0 entered promiscuous mode [ 1809.326485] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.333106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1809.339927] device bridge_slave_1 entered promiscuous mode [ 1809.368180] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1809.383826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1809.472661] chnl_net:caif_netlink_parms(): no params data found [ 1809.481812] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1809.488881] team0: Port device team_slave_0 added [ 1809.494751] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1809.502063] team0: Port device team_slave_1 added [ 1809.516491] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1809.522773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1809.533890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1809.545627] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1809.552189] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1809.612317] device hsr_slave_0 entered promiscuous mode [ 1809.660409] device hsr_slave_1 entered promiscuous mode [ 1809.730906] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1809.745527] bridge0: port 1(bridge_slave_0) entered disabled state [ 1809.752456] bridge0: port 2(bridge_slave_1) entered disabled state [ 1809.759384] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1809.769151] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1809.775585] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1809.798954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1809.805929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1809.818863] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1809.825379] 8021q: adding VLAN 0 to HW filter on device team0 [ 1809.832419] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.838855] bridge0: port 1(bridge_slave_0) entered disabled state [ 1809.846297] device bridge_slave_0 entered promiscuous mode [ 1809.856503] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1809.866701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1809.874333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1809.882628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1809.890327] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.896655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1809.903694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1809.911702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1809.919195] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.925569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1809.932557] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.938914] bridge0: port 2(bridge_slave_1) entered disabled state [ 1809.946533] device bridge_slave_1 entered promiscuous mode [ 1809.963032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1809.971404] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1809.982309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1809.997082] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1810.007281] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1810.017726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1810.042774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1810.052131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1810.061004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1810.073576] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1810.082428] team0: Port device team_slave_0 added [ 1810.087649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1810.095952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1810.104058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1810.111921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1810.119424] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1810.129719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1810.137095] team0: Port device team_slave_1 added [ 1810.147763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1810.155558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1810.164079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1810.172187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1810.182831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1810.212837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1810.253977] device hsr_slave_0 entered promiscuous mode [ 1810.290738] device hsr_slave_1 entered promiscuous mode [ 1810.350896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1810.358405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1810.368185] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1810.374380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1810.385835] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1810.398187] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1810.420860] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1810.429252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1810.445561] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1810.458262] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1810.471697] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1810.480797] device bridge_slave_1 left promiscuous mode [ 1810.486298] bridge0: port 2(bridge_slave_1) entered disabled state [ 1810.521220] device bridge_slave_0 left promiscuous mode [ 1810.526671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1810.636305] device hsr_slave_1 left promiscuous mode [ 1810.682609] device hsr_slave_0 left promiscuous mode [ 1810.735251] team0 (unregistering): Port device team_slave_1 removed [ 1810.744931] team0 (unregistering): Port device team_slave_0 removed [ 1810.755921] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1810.803754] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1810.876128] bond0 (unregistering): Released all slaves [ 1810.945854] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1810.954321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1810.965550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1810.985121] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1810.992051] 8021q: adding VLAN 0 to HW filter on device team0 [ 1811.001494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1811.016641] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1811.024287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1811.032457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1811.040616] bridge0: port 1(bridge_slave_0) entered blocking state [ 1811.046987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1811.054406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1811.062588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1811.070735] bridge0: port 2(bridge_slave_1) entered blocking state [ 1811.077090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1811.092110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1811.108940] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1811.117269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1811.131698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1811.141935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1811.151827] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1811.162380] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1811.168457] 8021q: adding VLAN 0 to HW filter on device team0 [ 1811.176759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1811.185165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1811.192267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1811.199077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1811.221470] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1811.232306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1811.243147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1811.251468] kauditd_printk_skb: 3063 callbacks suppressed [ 1811.251477] audit: type=1326 audit(1564467052.547:230162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1811.283983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1811.293054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1811.301417] audit: type=1326 audit(1564467052.547:230163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.326254] audit: type=1326 audit(1564467052.547:230164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.351246] audit: type=1326 audit(1564467052.547:230165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.375995] audit: type=1326 audit(1564467052.547:230166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.408238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1811.415114] audit: type=1326 audit(1564467052.547:230167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.444148] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1811.451783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1811.459568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1811.467888] bridge0: port 1(bridge_slave_0) entered blocking state [ 1811.474289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1811.481524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1811.484495] audit: type=1326 audit(1564467052.547:230168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.489245] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1811.528693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1811.542480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1811.549250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1811.556994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1811.559302] audit: type=1326 audit(1564467052.547:230169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.570948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1811.590473] audit: type=1326 audit(1564467052.547:230170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.610464] bridge0: port 2(bridge_slave_1) entered blocking state [ 1811.622662] audit: type=1326 audit(1564467052.547:230171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29068 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1811.628393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1811.666320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1811.674562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1811.691469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1811.699217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1811.712092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1811.719651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1811.727531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1811.741455] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1811.751654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1811.761064] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1811.767081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1811.775201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1811.783453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1811.791608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1811.799428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1811.817084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1811.834866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1811.843105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1811.852821] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1811.868505] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1811.876223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1811.889688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1811.907011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1811.915783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1811.930071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1811.938008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1811.975930] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1811.995050] 8021q: adding VLAN 0 to HW filter on device batadv0 06:10:54 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000400004500"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:54 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000100)=0x2, 0x4) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r3, 0x3, 0x0) 06:10:54 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001080000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:54 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setregid(0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 06:10:54 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1813.242459] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1813.413897] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:54 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000400004500"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:54 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0xffffffffffffffff, r6, 0x3, 0x3f) 06:10:54 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:55 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0xffffffffffffffff, r6, 0x3, 0x3f) 06:10:55 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:55 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:10:55 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000140)={0x4, [0x8, 0x49, 0x5, 0x81]}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) [ 1814.081063] device bridge_slave_1 left promiscuous mode [ 1814.086989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1814.161202] device bridge_slave_0 left promiscuous mode [ 1814.166918] bridge0: port 1(bridge_slave_0) entered disabled state 06:10:55 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1814.260466] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1814.483522] device hsr_slave_1 left promiscuous mode 06:10:55 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1814.545900] device hsr_slave_0 left promiscuous mode [ 1814.605212] team0 (unregistering): Port device team_slave_1 removed [ 1814.672207] team0 (unregistering): Port device team_slave_0 removed [ 1814.731293] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1814.835295] bond0 (unregistering): Releasing backup interface bond_slave_0 06:10:56 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1815.141955] bond0 (unregistering): Released all slaves [ 1815.205627] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1815.225257] erspan0: Invalid MTU 17664 requested, hw max 1500 06:10:57 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1817.840194] IPVS: ftp: loaded support on port[0] = 21 [ 1818.161947] IPVS: ftp: loaded support on port[0] = 21 [ 1818.195637] chnl_net:caif_netlink_parms(): no params data found [ 1818.266527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.273063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1818.279919] device bridge_slave_0 entered promiscuous mode [ 1818.286869] IPVS: ftp: loaded support on port[0] = 21 [ 1818.292653] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.299092] bridge0: port 2(bridge_slave_1) entered disabled state [ 1818.306450] device bridge_slave_1 entered promiscuous mode [ 1818.379385] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1818.399647] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1818.424252] chnl_net:caif_netlink_parms(): no params data found [ 1818.463019] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1818.471151] team0: Port device team_slave_0 added [ 1818.476775] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1818.484571] team0: Port device team_slave_1 added [ 1818.489937] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1818.500169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1818.526829] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.533344] bridge0: port 1(bridge_slave_0) entered disabled state [ 1818.540623] device bridge_slave_0 entered promiscuous mode [ 1818.563908] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.573301] bridge0: port 2(bridge_slave_1) entered disabled state [ 1818.581132] device bridge_slave_1 entered promiscuous mode [ 1818.644246] device hsr_slave_0 entered promiscuous mode [ 1818.690579] device hsr_slave_1 entered promiscuous mode [ 1818.749901] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1818.768204] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1818.778448] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1818.797104] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1818.816117] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1818.824319] team0: Port device team_slave_0 added [ 1818.856671] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1818.863971] team0: Port device team_slave_1 added [ 1818.894000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1818.907709] chnl_net:caif_netlink_parms(): no params data found [ 1818.917282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1818.954733] bridge0: port 2(bridge_slave_1) entered blocking state [ 1818.961167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1818.967808] bridge0: port 1(bridge_slave_0) entered blocking state [ 1818.974223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1819.032552] device hsr_slave_0 entered promiscuous mode [ 1819.090412] device hsr_slave_1 entered promiscuous mode [ 1819.162322] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1819.175535] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1819.192898] bridge0: port 1(bridge_slave_0) entered blocking state [ 1819.199294] bridge0: port 1(bridge_slave_0) entered disabled state [ 1819.207033] device bridge_slave_0 entered promiscuous mode [ 1819.221688] bridge0: port 1(bridge_slave_0) entered disabled state [ 1819.230163] bridge0: port 2(bridge_slave_1) entered disabled state [ 1819.240795] bridge0: port 2(bridge_slave_1) entered blocking state [ 1819.247140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1819.254803] device bridge_slave_1 entered promiscuous mode [ 1819.297503] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1819.306754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1819.322673] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1819.348089] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1819.357269] team0: Port device team_slave_0 added [ 1819.365658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1819.374482] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1819.382934] team0: Port device team_slave_1 added [ 1819.389283] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1819.398563] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1819.407325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1819.429776] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1819.473879] device hsr_slave_0 entered promiscuous mode [ 1819.510408] device hsr_slave_1 entered promiscuous mode [ 1819.561610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1819.568563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1819.578205] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1819.584517] 8021q: adding VLAN 0 to HW filter on device team0 [ 1819.593982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1819.601570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1819.614585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1819.622727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1819.630422] bridge0: port 1(bridge_slave_0) entered blocking state [ 1819.636763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1819.644983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1819.654353] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1819.661735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1819.669564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1819.677318] bridge0: port 2(bridge_slave_1) entered blocking state [ 1819.683743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1819.694394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1819.704865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1819.716007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1819.729869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1819.736914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1819.745026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1819.752756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1819.760450] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1819.777768] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1819.791098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1819.805082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1819.813220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1819.830801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1819.844423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1819.851563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1819.859080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1819.867036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1819.874586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1819.885671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1819.899460] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1819.906570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1819.924949] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1819.945713] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1819.956058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1819.963185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1819.974062] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1819.984540] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1819.990729] 8021q: adding VLAN 0 to HW filter on device team0 [ 1820.008353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1820.016945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1820.025136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1820.032893] bridge0: port 1(bridge_slave_0) entered blocking state [ 1820.039230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1820.046268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1820.058262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1820.071186] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1820.077243] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1820.087157] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1820.094126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1820.094554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1820.112513] bridge0: port 2(bridge_slave_1) entered blocking state [ 1820.118856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1820.128686] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1820.138937] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1820.147492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1820.157959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1820.166803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1820.177359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1820.187223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1820.196582] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1820.203722] 8021q: adding VLAN 0 to HW filter on device team0 [ 1820.209965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1820.229262] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1820.239433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1820.247719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1820.256130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1820.269445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1820.280663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1820.289102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1820.296409] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1820.303692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1820.311522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1820.319037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1820.325466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1820.332939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1820.340680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1820.348232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1820.355937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1820.363675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1820.378248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1820.387280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1820.394994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1820.404552] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1820.413516] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1820.419532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1820.438371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1820.446529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1820.454203] bridge0: port 2(bridge_slave_1) entered blocking state [ 1820.460586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1820.470759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1820.487882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1820.517531] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1820.528093] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1820.546683] kauditd_printk_skb: 1611 callbacks suppressed [ 1820.546692] audit: type=1326 audit(1564467061.837:231783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1820.562102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1820.593919] audit: type=1326 audit(1564467061.837:231784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1820.625935] audit: type=1326 audit(1564467061.837:231785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1820.647356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1820.659192] audit: type=1326 audit(1564467061.847:231786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1820.688661] device bridge_slave_1 left promiscuous mode [ 1820.696965] audit: type=1326 audit(1564467061.847:231787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1820.700324] bridge0: port 2(bridge_slave_1) entered disabled state [ 1820.727934] audit: type=1326 audit(1564467061.847:231788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1820.753651] audit: type=1326 audit(1564467061.877:231789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1820.778558] audit: type=1326 audit(1564467061.887:231790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1820.803411] audit: type=1326 audit(1564467061.897:231791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x459829 code=0x50000 06:11:02 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:02 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1820.828355] audit: type=1326 audit(1564467061.897:231792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29142 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1820.853445] device bridge_slave_0 left promiscuous mode [ 1820.859167] bridge0: port 1(bridge_slave_0) entered disabled state [ 1820.902436] device bridge_slave_1 left promiscuous mode [ 1820.907923] bridge0: port 2(bridge_slave_1) entered disabled state [ 1820.951595] device bridge_slave_0 left promiscuous mode [ 1820.957216] bridge0: port 1(bridge_slave_0) entered disabled state [ 1821.153230] device hsr_slave_1 left promiscuous mode [ 1821.193836] device hsr_slave_0 left promiscuous mode [ 1821.234285] team0 (unregistering): Port device team_slave_1 removed [ 1821.245440] team0 (unregistering): Port device team_slave_0 removed [ 1821.255775] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1821.295530] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1821.366870] bond0 (unregistering): Released all slaves [ 1821.432583] device hsr_slave_1 left promiscuous mode [ 1821.473672] device hsr_slave_0 left promiscuous mode [ 1821.513756] team0 (unregistering): Port device team_slave_1 removed [ 1821.526207] team0 (unregistering): Port device team_slave_0 removed [ 1821.535989] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1821.583590] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1821.645677] bond0 (unregistering): Released all slaves [ 1821.686287] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1821.693878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1821.701821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1821.709372] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1821.718713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1821.736659] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1821.743559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1821.751630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1821.769209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1821.776627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1821.788429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1821.817269] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1821.827215] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1821.843747] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1821.849805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1821.859224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1821.872473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1821.894513] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1821.906508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1822.069537] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:03 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000400004500"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:03 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x72, 0x1) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000140)={0x7, 0x6d, 0x2}, 0x7) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) sync_file_range(r0, 0xc1c, 0xc04, 0x1) ptrace$cont(0x18, r5, 0x3, 0x0) 06:11:03 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) sendto$rxrpc(r1, &(0x7f0000000200)="4eff2a6fb354ed527fbe1fedcbae9c21efac73bc32b7ed10eac72b14b4928d99273d3a056ee4463ce0b7e2d80373ad6f447cbe6df08349c3664a1da6833be496b7954ecbfb5bbc2acf92dd36221e4afdc91137a612b4eba24d2d79149fc8598d0cc27f64cde6009f4e390a281193d919f18abc4e7ca048de7fe84ccb141ac0c1473718e9202888fcb1950e80d610dba99b323a9f333bb8d9503734267f007b15aa840aaa4e21f94d64a70b3bb2e6fefdead55a45e104de443cdadf6bd1ff167ea3a99cbea83e", 0xc6, 0x80, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @local, 0x3}}, 0x24) preadv(r0, &(0x7f0000001380)=[{0x0, 0x3ac}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x33e, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) syz_read_part_table(0xcd, 0x9, &(0x7f00000008c0)=[{0x0, 0x0, 0x312c}, {&(0x7f0000000300)="09f1c81393c5a638ff3c7fd4ed12f205393892afb365f65aea4492c1d54dd75ac46bd34733842a52297445d469d7fece24cc205c57b83f1a1d3ecaf26b54c6daf3d481fbcb346a9e02c228d35ba0661c4b221faa9d52dffdb8f0cd5358776555aa87fba4a658a6eff5e324cd8e1e6024ef07cd74cfc3dbf4bc6c3772fc40ca9830943dedd2f54ce709123f4a69f32349efe89c27dae512081d130b7e33e88a9952eea9cf81b7ceb067c70df1e45edcda18dd3f331ef79e98c5e9535f2950d38f4b3097afaf679d9107bd2122c9e76ece0ff142ed1f132b5902a037d67c5ebbdee0171423bb6f9de75a38ff8732a14e5bf9425178", 0xf4, 0x9}, {0x0}, {&(0x7f0000000500)="24bc92a814c13bd7475a9e8797d463ae05408afaf371bfc1ef0980de7457b4d9994c1929490cbb8309d6935361f45dd6d913351fd6c479aff2e91dd1652a681e871c8ac497581e9a197f3999ae8ddb8900ee244f851ad850cf467d6a9583d87d7ad924ef4facc0807ed3be0c9459e52c18b114b06dca8b3938031ae8eb8d75784a3a97de90d617b46636a212eb954000cb8d30c80d27112f9188a2302b99279debb1358472", 0xa5}, {0x0, 0x0, 0x58}, {&(0x7f0000000700)="420d8c5d6eaf61457abf2539deae2e041f82ff82fd58f9e83d124351c59d0b3b4578eca6ef4673f2dda830baddedc7f5c108bb0ebc73a4447e45fc1b1a32ec3ee2e1e4c627ec8d", 0x47, 0x9}, {&(0x7f0000000780)}, {0x0, 0x0, 0x1}, {&(0x7f0000000880)="1f1db8df6cdc2d", 0x7}]) recvfrom$rxrpc(r2, &(0x7f0000000080)=""/147, 0x93, 0x2, 0x0, 0x0) recvfrom$x25(r2, &(0x7f0000000040)=""/6, 0x6, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x80) 06:11:03 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:03 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:03 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:03 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1822.406911] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:03 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:03 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x7, 0x4, 0x7fffffff, {}, {0x0, 0x7530}, {0x3, 0x5}, 0x1, @canfd={{0x0, 0x5ac89cf2, 0x6, 0x3}, 0x17, 0x1, 0x0, 0x0, "88e1e83eba2763cfc24d2d3346c1e9c9cc823b404b469849e2e62912e2e7de810e7effff772827cc86909df2b26fd8b869efd98a910715433027fe40ec75ee1e"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) write$selinux_access(r2, 0x0, 0x0) write$selinux_access(r2, 0x0, 0x0) r3 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000000)=""/70) socket$inet6_udplite(0xa, 0x2, 0x88) 06:11:03 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:03 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:04 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x0, 0x3f) 06:11:04 executing program 2: uselib(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000480), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x7, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3d556e4621331a24"}}, 0x48}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfffffffffffffeff, 0x20081) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x10000, 0x0) renameat2(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00', 0x1) recvmmsg(r0, &(0x7f0000000700), 0x40000000000016c, 0x2163, 0x0) 06:11:04 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000500)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f0000000640)='fuseblk\x00', 0x2818, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}], [{@obj_type={'obj_type', 0x3d, 'bpf\x00'}}]}}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r5, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r7, 0x3, 0x0) 06:11:04 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1a1001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8, [@default, @bcast, @bcast, @null, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x19}, 0x8}, r2}}, 0x38) setsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f0000000080), 0x4) 06:11:04 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:04 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1823.352214] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1826.480325] IPVS: ftp: loaded support on port[0] = 21 [ 1826.822895] IPVS: ftp: loaded support on port[0] = 21 [ 1826.864887] chnl_net:caif_netlink_parms(): no params data found [ 1826.927045] bridge0: port 1(bridge_slave_0) entered blocking state [ 1826.933637] bridge0: port 1(bridge_slave_0) entered disabled state [ 1826.940990] device bridge_slave_0 entered promiscuous mode [ 1826.948066] bridge0: port 2(bridge_slave_1) entered blocking state [ 1826.954848] bridge0: port 2(bridge_slave_1) entered disabled state [ 1826.962502] device bridge_slave_1 entered promiscuous mode [ 1826.972462] IPVS: ftp: loaded support on port[0] = 21 [ 1826.999409] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1827.020385] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1827.117193] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1827.125544] team0: Port device team_slave_0 added [ 1827.134323] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1827.142331] team0: Port device team_slave_1 added [ 1827.154313] chnl_net:caif_netlink_parms(): no params data found [ 1827.164961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1827.172444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1827.264475] device hsr_slave_0 entered promiscuous mode [ 1827.310486] device hsr_slave_1 entered promiscuous mode [ 1827.389171] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1827.404910] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1827.467082] bridge0: port 2(bridge_slave_1) entered blocking state [ 1827.473496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1827.480167] bridge0: port 1(bridge_slave_0) entered blocking state [ 1827.486541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1827.546671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1827.553242] bridge0: port 1(bridge_slave_0) entered disabled state [ 1827.560325] device bridge_slave_0 entered promiscuous mode [ 1827.566758] chnl_net:caif_netlink_parms(): no params data found [ 1827.579130] bridge0: port 2(bridge_slave_1) entered blocking state [ 1827.585594] bridge0: port 2(bridge_slave_1) entered disabled state [ 1827.593011] device bridge_slave_1 entered promiscuous mode [ 1827.634137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1827.643921] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1827.682503] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1827.689717] team0: Port device team_slave_0 added [ 1827.703737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1827.714041] bridge0: port 1(bridge_slave_0) entered disabled state [ 1827.720980] device bridge_slave_0 entered promiscuous mode [ 1827.727703] bridge0: port 2(bridge_slave_1) entered blocking state [ 1827.734146] bridge0: port 2(bridge_slave_1) entered disabled state [ 1827.741433] device bridge_slave_1 entered promiscuous mode [ 1827.747750] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1827.755232] team0: Port device team_slave_1 added [ 1827.787967] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1827.796469] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1827.806483] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1827.825762] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1827.862248] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1827.869462] team0: Port device team_slave_0 added [ 1827.875150] bridge0: port 1(bridge_slave_0) entered disabled state [ 1827.882184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1827.932646] device hsr_slave_0 entered promiscuous mode [ 1827.970303] device hsr_slave_1 entered promiscuous mode [ 1828.012012] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1828.019035] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1828.026514] team0: Port device team_slave_1 added [ 1828.036147] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1828.044474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1828.051926] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1828.073818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1828.124302] device hsr_slave_0 entered promiscuous mode [ 1828.170305] device hsr_slave_1 entered promiscuous mode [ 1828.210622] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1828.221031] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1828.233314] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1828.245780] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1828.253420] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1828.266217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1828.273633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1828.285373] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1828.291720] 8021q: adding VLAN 0 to HW filter on device team0 [ 1828.306462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1828.316332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1828.325363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1828.333086] bridge0: port 1(bridge_slave_0) entered blocking state [ 1828.339412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1828.348584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1828.359131] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1828.369125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1828.377254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1828.385267] bridge0: port 2(bridge_slave_1) entered blocking state [ 1828.391639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1828.401998] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1828.417782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1828.427373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1828.437248] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1828.447600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1828.455470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1828.464039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1828.475542] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1828.486167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1828.493144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1828.504042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1828.511823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1828.519328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1828.527395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1828.554261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1828.563176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1828.571889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1828.581993] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1828.587999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1828.601546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1828.625384] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1828.635119] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1828.645141] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1828.655010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1828.665506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1828.676182] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1828.698533] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1828.705735] 8021q: adding VLAN 0 to HW filter on device team0 [ 1828.716858] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1828.725757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1828.734070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1828.742030] bridge0: port 1(bridge_slave_0) entered blocking state [ 1828.748357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1828.763083] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1828.770220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1828.777237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1828.785426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1828.793068] bridge0: port 2(bridge_slave_1) entered blocking state [ 1828.799406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1828.810745] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1828.818718] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1828.828615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1828.846546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1828.863087] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1828.877736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1828.886582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1828.896528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1828.907255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1828.925677] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1828.934187] 8021q: adding VLAN 0 to HW filter on device team0 [ 1828.942912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1828.967606] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1828.974340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1828.985648] kauditd_printk_skb: 1414 callbacks suppressed [ 1828.985658] audit: type=1326 audit(1564467070.277:233207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1828.989447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1829.010893] audit: type=1326 audit(1564467070.287:233208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.027066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1829.068394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1829.086058] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1829.096145] audit: type=1326 audit(1564467070.287:233209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.121640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1829.121905] audit: type=1326 audit(1564467070.287:233210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.129515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1829.154645] audit: type=1326 audit(1564467070.287:233211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.169089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1829.186590] audit: type=1326 audit(1564467070.287:233212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.194768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1829.218841] audit: type=1326 audit(1564467070.287:233213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.233513] bridge0: port 1(bridge_slave_0) entered blocking state [ 1829.251344] audit: type=1326 audit(1564467070.287:233214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.256965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1829.282596] audit: type=1326 audit(1564467070.287:233215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.299295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1829.319673] audit: type=1326 audit(1564467070.297:233216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29225 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1829.346775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1829.364140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 06:11:10 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:10 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:10 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1, 0x20012, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x4c, 0x0, &(0x7f0000000280)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000100)={@flat=@binder={0x73682a85}, @flat=@weak_binder, @fda}, &(0x7f0000000180)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) 06:11:10 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300200001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r4, 0x3, 0x0) [ 1829.386365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1829.402599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 06:11:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet6(0xa, 0x7, 0x800000007fc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r5, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r8 = socket(0x9, 0x6, 0xffff) r9 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$TIOCGSID(r9, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000440)=r10) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r9, 0x80287010, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_DELDEST(r8, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x7f, 0x2}}, 0x44) r11 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r7, &(0x7f0000000c40)=ANY=[], 0x0) close(r6) r12 = dup3(r2, r11, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r12, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000002000290f0000000000000000020000000000004a000000000004000000711b90c7b59d5ff9a3fc6bc46aa3bd0c001400", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) sendmsg$key(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r5], 0x2}}, 0x0) sendmsg$key(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000b40)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="033c9f0c3059a000000000cda18ea1474d2a3b9b169cec5d6e5036a25b2b431fe59c731615da52652845fec858e6609dd05ec8071ad3ea08bb18bd01a5a6", @ANYRESHEX=r4, @ANYRESOCT=r3, @ANYRES32, @ANYRES64=r1, @ANYRESDEC=r2], @ANYRESOCT=0x0]], 0x8}}, 0x0) [ 1829.434831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1829.449708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1829.466551] bridge0: port 2(bridge_slave_1) entered blocking state [ 1829.472961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1829.485105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1829.502433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1829.515328] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1829.539848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1829.564263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1829.606261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1829.629041] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1829.639972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1829.663785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1829.683537] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1829.761726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1829.805063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1829.849765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1829.863230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1829.875074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1829.883900] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1829.895654] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1829.904555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1829.913117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1829.923865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1829.937809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1829.953212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1829.965098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1829.977626] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1829.985141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1829.993360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1830.008679] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1830.015749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1830.036636] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1830.051591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1830.454966] device bridge_slave_1 left promiscuous mode [ 1830.460989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1830.512879] device bridge_slave_0 left promiscuous mode [ 1830.519596] bridge0: port 1(bridge_slave_0) entered disabled state [ 1830.572564] device bridge_slave_1 left promiscuous mode [ 1830.582737] bridge0: port 2(bridge_slave_1) entered disabled state 06:11:11 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1830.637886] device bridge_slave_0 left promiscuous mode [ 1830.644388] bridge0: port 1(bridge_slave_0) entered disabled state [ 1830.691733] device bridge_slave_1 left promiscuous mode [ 1830.697266] bridge0: port 2(bridge_slave_1) entered disabled state [ 1830.741060] device bridge_slave_0 left promiscuous mode [ 1830.747196] bridge0: port 1(bridge_slave_0) entered disabled state [ 1831.112832] device hsr_slave_1 left promiscuous mode [ 1831.174496] device hsr_slave_0 left promiscuous mode [ 1831.235333] team0 (unregistering): Port device team_slave_1 removed [ 1831.255639] team0 (unregistering): Port device team_slave_0 removed [ 1831.275596] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1831.335774] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1831.417175] bond0 (unregistering): Released all slaves [ 1831.502043] device hsr_slave_1 left promiscuous mode [ 1831.562894] device hsr_slave_0 left promiscuous mode [ 1831.603944] team0 (unregistering): Port device team_slave_1 removed [ 1831.614156] team0 (unregistering): Port device team_slave_0 removed [ 1831.625864] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1831.666376] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1831.757936] bond0 (unregistering): Released all slaves [ 1831.852700] device hsr_slave_1 left promiscuous mode [ 1831.902997] device hsr_slave_0 left promiscuous mode [ 1831.943855] team0 (unregistering): Port device team_slave_1 removed [ 1831.955029] team0 (unregistering): Port device team_slave_0 removed [ 1831.964738] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1832.006777] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1832.077073] bond0 (unregistering): Released all slaves 06:11:13 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x0, 0x3f) 06:11:13 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:13 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:13 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000500)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:init_var_run_t:s0\x00', 0x24, 0x3) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800450000000000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0xfffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000100)={0x14, 0x49, 0x1, {0x10, 0x0, 0x3}}, 0x14) 06:11:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet6(0xa, 0x7, 0x800000007fc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r5, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r8 = socket(0x9, 0x6, 0xffff) r9 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$TIOCGSID(r9, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000440)=r10) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r9, 0x80287010, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_DELDEST(r8, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x7f, 0x2}}, 0x44) r11 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r7, &(0x7f0000000c40)=ANY=[], 0x0) close(r6) r12 = dup3(r2, r11, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r12, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000002000290f0000000000000000020000000000004a000000000004000000711b90c7b59d5ff9a3fc6bc46aa3bd0c001400", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) sendmsg$key(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r5], 0x2}}, 0x0) sendmsg$key(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000b40)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="033c9f0c3059a000000000cda18ea1474d2a3b9b169cec5d6e5036a25b2b431fe59c731615da52652845fec858e6609dd05ec8071ad3ea08bb18bd01a5a6", @ANYRESHEX=r4, @ANYRESOCT=r3, @ANYRES32, @ANYRES64=r1, @ANYRESDEC=r2], @ANYRESOCT=0x0]], 0x8}}, 0x0) [ 1832.142956] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:13 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1832.261261] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29266 comm=syz-executor.4 [ 1832.301250] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 06:11:13 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x0, 0x3f) [ 1832.333997] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:13 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x7fff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000500)={0x1, @pix={0x0, 0x0, 0x47524247}}) 06:11:13 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:13 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101802, 0x0) getsockname$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x7, 0x0, 0x710000, 0x0, 0x2}}) 06:11:13 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:11:13 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffe18, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000000), 0x4) 06:11:14 executing program 2: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed000046", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0x154) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x79, &(0x7f0000001fde)=0x7, 0x346) [ 1832.716341] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1836.740203] IPVS: ftp: loaded support on port[0] = 21 [ 1837.065086] IPVS: ftp: loaded support on port[0] = 21 [ 1837.090989] chnl_net:caif_netlink_parms(): no params data found [ 1837.168935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1837.175765] bridge0: port 1(bridge_slave_0) entered disabled state [ 1837.182708] device bridge_slave_0 entered promiscuous mode [ 1837.189688] bridge0: port 2(bridge_slave_1) entered blocking state [ 1837.196594] bridge0: port 2(bridge_slave_1) entered disabled state [ 1837.205482] IPVS: ftp: loaded support on port[0] = 21 [ 1837.214820] device bridge_slave_1 entered promiscuous mode [ 1837.248384] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1837.265927] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1837.311603] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1837.318684] team0: Port device team_slave_0 added [ 1837.373757] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1837.381772] team0: Port device team_slave_1 added [ 1837.397381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1837.404982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1837.415774] chnl_net:caif_netlink_parms(): no params data found [ 1837.493116] device hsr_slave_0 entered promiscuous mode [ 1837.530397] device hsr_slave_1 entered promiscuous mode [ 1837.590977] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1837.598010] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1837.707605] bridge0: port 1(bridge_slave_0) entered blocking state [ 1837.714141] bridge0: port 1(bridge_slave_0) entered disabled state [ 1837.721578] device bridge_slave_0 entered promiscuous mode [ 1837.727929] chnl_net:caif_netlink_parms(): no params data found [ 1837.743507] bridge0: port 2(bridge_slave_1) entered blocking state [ 1837.749856] bridge0: port 2(bridge_slave_1) entered disabled state [ 1837.757336] device bridge_slave_1 entered promiscuous mode [ 1837.788807] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1837.798415] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1837.815419] bridge0: port 2(bridge_slave_1) entered blocking state [ 1837.821837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1837.828406] bridge0: port 1(bridge_slave_0) entered blocking state [ 1837.834799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1837.875420] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1837.884286] team0: Port device team_slave_0 added [ 1837.890370] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1837.897428] team0: Port device team_slave_1 added [ 1837.902918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1837.918580] bridge0: port 1(bridge_slave_0) entered blocking state [ 1837.926072] bridge0: port 1(bridge_slave_0) entered disabled state [ 1837.933536] device bridge_slave_0 entered promiscuous mode [ 1837.940268] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1837.947334] bridge0: port 2(bridge_slave_1) entered blocking state [ 1837.954122] bridge0: port 2(bridge_slave_1) entered disabled state [ 1837.961088] device bridge_slave_1 entered promiscuous mode [ 1837.999211] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1838.054347] device hsr_slave_0 entered promiscuous mode [ 1838.090460] device hsr_slave_1 entered promiscuous mode [ 1838.131892] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1838.139772] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1838.147529] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1838.158129] bridge0: port 1(bridge_slave_0) entered disabled state [ 1838.165335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1838.195790] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1838.211679] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1838.218893] team0: Port device team_slave_0 added [ 1838.225101] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1838.232586] team0: Port device team_slave_1 added [ 1838.242697] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1838.250981] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1838.302711] device hsr_slave_0 entered promiscuous mode [ 1838.350480] device hsr_slave_1 entered promiscuous mode [ 1838.403328] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1838.412223] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1838.431597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1838.447570] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1838.472430] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1838.485366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1838.492624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1838.501135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1838.514852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1838.525805] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1838.532363] 8021q: adding VLAN 0 to HW filter on device team0 [ 1838.541966] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1838.550584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1838.557709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1838.565685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1838.574393] bridge0: port 1(bridge_slave_0) entered blocking state [ 1838.580792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1838.595864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1838.604285] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1838.614663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1838.622577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1838.630767] bridge0: port 2(bridge_slave_1) entered blocking state [ 1838.637104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1838.644386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1838.651589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1838.660986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1838.669449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1838.679796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1838.688139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1838.696056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1838.703949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1838.711969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1838.720457] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1838.728660] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1838.738907] 8021q: adding VLAN 0 to HW filter on device team0 [ 1838.749043] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1838.764162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1838.774523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1838.784476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1838.792742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1838.800627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1838.808193] bridge0: port 1(bridge_slave_0) entered blocking state [ 1838.814583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1838.824699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1838.837626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1838.845183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1838.853106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1838.860771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1838.867105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1838.877030] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1838.885395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1838.894101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1838.901925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1838.909317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1838.919251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1838.934009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1838.944604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1838.955102] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1838.961456] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1838.968257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1838.976250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1838.984189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1838.994513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1839.008281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1839.016407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1839.024530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1839.039672] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1839.048317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1839.067382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1839.074260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1839.082389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1839.093039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1839.106645] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1839.116553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1839.125307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1839.136274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1839.145582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1839.153644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1839.168490] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1839.177979] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1839.195049] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1839.209761] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1839.216870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1839.227163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1839.236922] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1839.243647] 8021q: adding VLAN 0 to HW filter on device team0 [ 1839.262444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1839.269658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1839.285825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1839.293695] bridge0: port 1(bridge_slave_0) entered blocking state [ 1839.300128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1839.309071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1839.325128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1839.333085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1839.348113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1839.357009] bridge0: port 2(bridge_slave_1) entered blocking state [ 1839.363424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1839.377599] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1839.388495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1839.398461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1839.406517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1839.419413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1839.426727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1839.435179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1839.453480] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1839.464254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1839.476028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1839.484741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1839.500694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1839.508381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1839.527941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1839.588262] kauditd_printk_skb: 4085 callbacks suppressed [ 1839.588271] audit: type=1326 audit(1564467080.877:237302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1839.602699] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1839.663772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1839.679289] audit: type=1326 audit(1564467080.917:237303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1839.726982] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1839.741285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1839.751506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1839.769749] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1839.777850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1839.805680] audit: type=1326 audit(1564467080.917:237304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1839.858438] audit: type=1326 audit(1564467080.927:237305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1839.868750] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1839.884202] audit: type=1326 audit(1564467080.927:237306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1839.910641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1839.920542] audit: type=1326 audit(1564467080.927:237307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=101 compat=0 ip=0x459829 code=0x50000 [ 1839.920562] audit: type=1326 audit(1564467080.937:237308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1839.920582] audit: type=1326 audit(1564467080.937:237309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 06:11:21 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f00000001c0)={0x85, 0x29, &(0x7f00000000c0)="9344ae7b80a53f0be7d716f10cefb5d5ab7869e463f876722e8397f1d79e74c4ae679bea87f5ca7976de858eb891cd9922009b6ba28f32b3d6913ca5c7a03fecdacb8b9f29c314395d62b34edf42645d84ae50dff2b38c7a083c8e9f4408190b60a124437f092353f2c8e83e1d4a188059a577afd11d6271c7539b4ff28920994b43a09d5c2e98b213a7c519f7fde1575a7396d44f83a4c974c64db3dbb8d574adcd46052e67bc4e5f7f4ecd6f86280ef790595d4296e3069a1c05a9c618059654757fcc1492a6ce49589bad60", {0x400, 0x100000001, 0x4f565559, 0x8, 0x3, 0x0, 0xf, 0x6}}) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000040)={0x0, "32293a6dd4c71c89803e7dfcc384198557df634dcdfcb0ab772c153388edd877"}) 06:11:21 executing program 4: r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000500)={0x3, 0xffffffff00000001, 0x9, {0x77359400}, 0x1, 0x7ff}) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000000100a7871fc5e68c6e9504"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) 06:11:21 executing program 0 (fault-call:20 fault-nth:0): lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) [ 1839.920605] audit: type=1326 audit(1564467080.937:237310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1839.920623] audit: type=1326 audit(1564467080.937:237311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29314 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 06:11:21 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x181002) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f00000001c0)={&(0x7f0000ffc000/0x1000)=nil, 0x2, 0x1, 0x80, &(0x7f0000ffe000/0x1000)=nil, 0x7fff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) socket$caif_stream(0x25, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000040)=[0x3, 0x2], 0x2) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x4) [ 1840.149423] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1840.239053] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1840.378664] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1840.410758] device bridge_slave_1 left promiscuous mode [ 1840.416308] bridge0: port 2(bridge_slave_1) entered disabled state [ 1840.471690] device bridge_slave_0 left promiscuous mode [ 1840.481898] bridge0: port 1(bridge_slave_0) entered disabled state [ 1840.552077] device bridge_slave_1 left promiscuous mode [ 1840.557600] bridge0: port 2(bridge_slave_1) entered disabled state [ 1840.632057] device bridge_slave_0 left promiscuous mode [ 1840.637693] bridge0: port 1(bridge_slave_0) entered disabled state 06:11:22 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x2}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:22 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:11:22 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:22 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80000001) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/dev/sequencer2\x00'}, {0x20, '/dev/sequencer2\x00'}, {0x20, '/dev/sequencer2\x00'}, {0x20, '/dev/sequencer2\x00'}, {0x20, '/dev/sequencer2\x00'}], 0xa, "884d28062b29875907fb196db365a513fd77a8e74a9193f4f56ac7338f"}, 0x7d) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) write$sndseq(r1, &(0x7f0000000000)=[{0x5b93, 0x0, 0xffffffffffffffa0, 0x0, @tick, {}, {}, @connect}], 0x1c) 06:11:22 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a40)=ANY=[@ANYBLOB="30eaff00000167801f490000003db6ea171b14c0826aab4febff5cd65f78f795cd38ab3174a024a2a63a781d55000000dbcc2523de2e8200e29a8ba524537ba81c0db566884bb1e52064c879d8a34886ec0bcf485f4ff229e61aa01b210579a423bdb46c51402c99800d08ffaba3cae3e9201c514888343de9c1c56804c82153dbbd6d38d5121303fd3f9d746805b735af0600000000000000d3d68faa822435cd4fd1b81b5d36d2c8103c84c6f04aa82a17839ce00654786b9300a1ef49d41714b56d66edaa5885d29f6173f4409a", @ANYRES32=0x0, @ANYBLOB="000000b53f9ac1c668e134b7eee61c87b567614aadea313b0000080043001b0019d6537331b4d4028b0faee41ff2bcc350b07828d6df186f0dd9b819d0b210d824ca3bc7fd73a8fd9b5ba6956c98ff15632e541811aa9cddb5350fd7793e129969c0e4cac9e24fa0d92cc6534beab9cdc8562cddca6f09494331e21c879745f98b700d18534be242396c534709346c6434c90a8f00f088a3f48141b75b6d989f5046c1d121f9b904c44b45e8abf08ef177542378d20e504f869a28d14558ad4149f39c676ead3bc258d4b0548307"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000540)={0xbf, @broadcast, 0x4e23, 0x0, 'dh\x00', 0x2d, 0x9, 0x51}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x4, 0x400, 0x1ff, 0x7d4, 0x7ff}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e24, 0xc8af, @ipv4={[], [], @multicast1}, 0x3}}, [0x7b21ba5, 0x10001, 0x1d1fa86a, 0x100000000, 0x1, 0x9, 0xf05, 0x8, 0x8, 0x9, 0x100000001, 0x8001, 0x800, 0x81000000000, 0x7]}, &(0x7f0000000500)=0x100) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) [ 1840.691674] device bridge_slave_1 left promiscuous mode [ 1840.698715] bridge0: port 2(bridge_slave_1) entered disabled state [ 1840.751315] device bridge_slave_0 left promiscuous mode [ 1840.759116] bridge0: port 1(bridge_slave_0) entered disabled state 06:11:22 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f000000efcc)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0xc0f85403, &(0x7f00000000c0)={{0x1, 0x400, 0x0, 0x2}}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x1, 0x0, 0x7f, 0x9, 0x7, 0x5, 0x6, 0x8000, 0x2, 0x800, 0x3, 0x10001, 0x80000, 0x6, 0x40, 0x9, 0x10000, 0x9, 0x0, 0x100, 0x3, 0x3, 0x79fb, 0x9, 0x800000, 0xfffffffffffffff8, 0x3ff, 0x7, 0x8000, 0x6]}) [ 1840.796430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pig=29353 comm=syz-executor.4 06:11:22 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x800000000000003, 0x3) getsockname(r0, 0x0, &(0x7f0000000180)=0x51d) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8040, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x7, 0xc, 0x4, 0x400000, {r2, r3/1000+30000}, {0x6, 0xc, 0x6aa, 0xffffffff, 0x8001, 0x4, "5c69bcb7"}, 0x9, 0x3, @userptr=0x2fd7, 0x4}) 06:11:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x13}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x80, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f00000001c0)={0x3, 0x8000, 0x1ff, 0x1}) r3 = creat(&(0x7f0000000200)='./file0\x00', 0x5) ioctl$CAPI_GET_SERIAL(r3, 0xc0044308, &(0x7f0000000080)=0x1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) 06:11:22 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x1}, 0x7) r3 = socket$packet(0x11, 0x3, 0x300) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000000)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000000c0)={0x3, 0x0, 0x7, 0x9, 'syz1\x00', 0xdb2b}) 06:11:22 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x53, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xc4) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r4 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, &(0x7f0000000440)) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x4, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x8, 0x0, 0x0, 0x50000}]}) getsockname$tipc(r0, &(0x7f0000000140)=@name, &(0x7f0000000400)=0x10) ioctl$TIOCSBRK(r0, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) [ 1841.360573] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.366354] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.440129] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.445315] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.551084] device hsr_slave_1 left promiscuous mode [ 1841.591621] device hsr_slave_0 left promiscuous mode [ 1841.629201] team0 (unregistering): Port device team_slave_1 removed [ 1841.666828] team0 (unregistering): Port device team_slave_0 removed [ 1841.680135] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.685211] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.703641] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1841.782459] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1841.885552] bond0 (unregistering): Released all slaves [ 1841.920117] protocol 88fb is buggy, dev hsr_slave_0 [ 1842.006157] device hsr_slave_1 left promiscuous mode [ 1842.059250] device hsr_slave_0 left promiscuous mode [ 1842.094752] team0 (unregistering): Port device team_slave_1 removed [ 1842.125172] team0 (unregistering): Port device team_slave_0 removed [ 1842.151514] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1842.204893] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1842.334644] bond0 (unregistering): Released all slaves [ 1842.452408] device hsr_slave_1 left promiscuous mode [ 1842.493830] device hsr_slave_0 left promiscuous mode [ 1842.544829] team0 (unregistering): Port device team_slave_1 removed [ 1842.555468] team0 (unregistering): Port device team_slave_0 removed [ 1842.565328] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1842.605219] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1842.669741] bond0 (unregistering): Released all slaves 06:11:24 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1ff, 0x2000) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000140), 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r3, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) 06:11:24 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1846.450160] IPVS: ftp: loaded support on port[0] = 21 [ 1846.774533] IPVS: ftp: loaded support on port[0] = 21 [ 1846.804065] chnl_net:caif_netlink_parms(): no params data found [ 1846.872888] bridge0: port 1(bridge_slave_0) entered blocking state [ 1846.879315] bridge0: port 1(bridge_slave_0) entered disabled state [ 1846.886425] device bridge_slave_0 entered promiscuous mode [ 1846.893586] bridge0: port 2(bridge_slave_1) entered blocking state [ 1846.899933] bridge0: port 2(bridge_slave_1) entered disabled state [ 1846.907190] device bridge_slave_1 entered promiscuous mode [ 1846.936108] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1846.945441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1846.968104] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1846.975863] team0: Port device team_slave_0 added [ 1846.981587] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1846.988824] team0: Port device team_slave_1 added [ 1847.004733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1847.051682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1847.152563] device hsr_slave_0 entered promiscuous mode [ 1847.190407] device hsr_slave_1 entered promiscuous mode [ 1847.253763] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1847.260883] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1847.267627] chnl_net:caif_netlink_parms(): no params data found [ 1847.297511] bridge0: port 2(bridge_slave_1) entered blocking state [ 1847.303926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1847.310619] bridge0: port 1(bridge_slave_0) entered blocking state [ 1847.316966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1847.359224] bridge0: port 1(bridge_slave_0) entered blocking state [ 1847.366585] bridge0: port 1(bridge_slave_0) entered disabled state [ 1847.374096] device bridge_slave_0 entered promiscuous mode [ 1847.381023] bridge0: port 2(bridge_slave_1) entered blocking state [ 1847.387415] bridge0: port 2(bridge_slave_1) entered disabled state [ 1847.394377] device bridge_slave_1 entered promiscuous mode [ 1847.423795] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1847.436432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1847.459836] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1847.467996] team0: Port device team_slave_0 added [ 1847.478212] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1847.485772] team0: Port device team_slave_1 added [ 1847.491658] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1847.499366] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1847.564572] device hsr_slave_0 entered promiscuous mode [ 1847.600491] device hsr_slave_1 entered promiscuous mode [ 1847.641067] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1847.648441] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1847.671262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1847.677633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1847.684319] bridge0: port 1(bridge_slave_0) entered blocking state [ 1847.690721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1847.713271] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1847.719338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1847.729943] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1847.743872] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1847.749943] 8021q: adding VLAN 0 to HW filter on device team0 [ 1847.758350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1847.765814] bridge0: port 1(bridge_slave_0) entered disabled state [ 1847.773768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1847.781564] bridge0: port 1(bridge_slave_0) entered disabled state [ 1847.788140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1847.796157] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1847.808620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1847.816485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1847.825009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1847.832714] bridge0: port 1(bridge_slave_0) entered blocking state [ 1847.839075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1847.857822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1847.864969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1847.873529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1847.881433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1847.887773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1847.906732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1847.914565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1847.924369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1847.934247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1847.942717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1847.950720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1847.958378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1847.966287] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1847.976987] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1847.989540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1847.997100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1848.005868] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1848.015666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1848.024738] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1848.030983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1848.038515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1848.052239] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1848.060245] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1848.066576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1848.074250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1848.082107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1848.089001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1848.098443] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1848.104551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1848.117455] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1848.123835] 8021q: adding VLAN 0 to HW filter on device team0 [ 1848.133310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1848.141773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1848.149581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1848.157418] bridge0: port 1(bridge_slave_0) entered blocking state [ 1848.163801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1848.174691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1848.186436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1848.194426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1848.202120] bridge0: port 2(bridge_slave_1) entered blocking state [ 1848.208443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1848.218186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1848.228671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1848.237158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1848.244846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1848.254172] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1848.266634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1848.279804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1848.294175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1848.303786] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1848.312525] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1848.323125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1848.330378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1848.338084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1848.357094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1848.367879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1848.375126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1848.382950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1848.390828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1848.398382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1848.419229] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1848.429179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1848.444351] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1848.454217] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1848.855270] net_ratelimit: 8 callbacks suppressed [ 1848.855285] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1848.885616] kauditd_printk_skb: 1932 callbacks suppressed [ 1848.885647] audit: type=1326 audit(1564467090.177:239244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1848.924421] audit: type=1326 audit(1564467090.177:239245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1848.956448] audit: type=1326 audit(1564467090.177:239246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1848.988180] audit: type=1326 audit(1564467090.187:239247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1849.019831] audit: type=1326 audit(1564467090.187:239248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1849.045579] audit: type=1326 audit(1564467090.187:239249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1849.070916] audit: type=1326 audit(1564467090.187:239250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1849.095693] audit: type=1326 audit(1564467090.187:239251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1849.122402] audit: type=1326 audit(1564467090.187:239252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1849.147182] audit: type=1326 audit(1564467090.187:239253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29409 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1849.190492] device bridge_slave_1 left promiscuous mode [ 1849.195961] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.251499] device bridge_slave_0 left promiscuous mode [ 1849.257150] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.301870] device bridge_slave_1 left promiscuous mode [ 1849.307740] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.351443] device bridge_slave_0 left promiscuous mode [ 1849.359287] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.411856] device bridge_slave_1 left promiscuous mode [ 1849.417378] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.471122] device bridge_slave_0 left promiscuous mode [ 1849.476820] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.796815] device hsr_slave_1 left promiscuous mode [ 1849.836626] device hsr_slave_0 left promiscuous mode [ 1849.874832] team0 (unregistering): Port device team_slave_1 removed [ 1849.894883] team0 (unregistering): Port device team_slave_0 removed [ 1849.915793] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1849.964721] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1850.055381] bond0 (unregistering): Released all slaves [ 1850.144564] device hsr_slave_1 left promiscuous mode [ 1850.184895] device hsr_slave_0 left promiscuous mode [ 1850.223062] team0 (unregistering): Port device team_slave_1 removed [ 1850.235175] team0 (unregistering): Port device team_slave_0 removed [ 1850.245004] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1850.284617] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1850.346970] bond0 (unregistering): Released all slaves [ 1850.453309] device hsr_slave_1 left promiscuous mode [ 1850.495459] device hsr_slave_0 left promiscuous mode [ 1850.574368] team0 (unregistering): Port device team_slave_1 removed [ 1850.584384] team0 (unregistering): Port device team_slave_0 removed [ 1850.595298] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1850.644894] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1850.717552] bond0 (unregistering): Released all slaves 06:11:32 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x1}, 0x7) r3 = socket$packet(0x11, 0x3, 0x300) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000000)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000000c0)={0x3, 0x0, 0x7, 0x9, 'syz1\x00', 0xdb2b}) 06:11:32 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:32 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000540)=&(0x7f0000000500)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r5, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x40, 0x0, &(0x7f0000000000)) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) 06:11:32 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:32 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x1}, 0x7) r3 = socket$packet(0x11, 0x3, 0x300) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000000)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000000c0)={0x3, 0x0, 0x7, 0x9, 'syz1\x00', 0xdb2b}) 06:11:32 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1850.771963] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:32 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:32 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r5, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000340)={0x4, r3}) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x7) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000000000108000000001c00000000000000", @ANYRES32=0x0, @ANYBLOB="000000002d6ce0aebad10c51e10b000000000a001b000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r7, 0x3, 0x0) [ 1850.906019] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:32 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:32 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1851.191597] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:32 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1851.511868] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:33 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:33 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x207, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xc15, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000300)='\a', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000540)="3894e0aa755678642797c675ec97969c56f2bf12f6039bb83db491604e9211ccc8408e7618ea37393e03de7717926ee49759d8a25fe0ee491d33465a996e601cab82e84deffd4f43b4b8de7c4fc0f12375966fce546ed08ab352a291b7f16898f20eb89ab513fe62e97796f94ae97e59c92f1eb86a95087d0372707700c803790f74e808663977e98054589d308059a63b0534d429abbad8c75335c1bcd5f596b4ef809be3492bf40907de6a8cedbb24290c9e878204418bbe903f3ced734530", 0xc0, 0xfffffffffffffffd) io_setup(0xfff, &(0x7f0000000080)=0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x4040, 0x0) io_cancel(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000440)="b2cf4288a0aa1ded391521eae0fc69a6d0e18a0b44819289a863a5676ef857b1e0732b8a39b2758a6e2f2d9df41c0780d705f3439591ad8169d6757b0de43e48ed4aac475d464945c58db9ad37c75c02bf12cd18709f7253ad494f77844a8b824e496096730c617e8d214c39e9cf1d1c5cc4968d937b3dd07062a9c45fe9de0597c91833", 0x84, 0x400, 0x0, 0x3, r4}, &(0x7f0000000340)) keyctl$dh_compute(0x17, &(0x7f0000000180)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0x3e3, &(0x7f00000001c0)={&(0x7f0000000040)={'crc32c-intel\x00\x00\xc0\x00\x00\x00\x00 \x00\x01\xc0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01W\x00'}, &(0x7f00000001c0)}) [ 1851.857201] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1855.460298] IPVS: ftp: loaded support on port[0] = 21 [ 1855.749656] IPVS: ftp: loaded support on port[0] = 21 [ 1855.813713] chnl_net:caif_netlink_parms(): no params data found [ 1855.887780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1855.894308] bridge0: port 1(bridge_slave_0) entered disabled state [ 1855.901854] device bridge_slave_0 entered promiscuous mode [ 1855.908885] bridge0: port 2(bridge_slave_1) entered blocking state [ 1855.915389] bridge0: port 2(bridge_slave_1) entered disabled state [ 1855.922333] IPVS: ftp: loaded support on port[0] = 21 [ 1855.928431] device bridge_slave_1 entered promiscuous mode [ 1855.985585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1855.995040] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1856.082560] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1856.089664] team0: Port device team_slave_0 added [ 1856.094804] chnl_net:caif_netlink_parms(): no params data found [ 1856.115958] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1856.123337] team0: Port device team_slave_1 added [ 1856.128778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1856.136191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1856.233079] device hsr_slave_0 entered promiscuous mode [ 1856.270360] device hsr_slave_1 entered promiscuous mode [ 1856.325835] bridge0: port 1(bridge_slave_0) entered blocking state [ 1856.332338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1856.339186] device bridge_slave_0 entered promiscuous mode [ 1856.354022] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1856.390532] bridge0: port 2(bridge_slave_1) entered blocking state [ 1856.396916] bridge0: port 2(bridge_slave_1) entered disabled state [ 1856.404045] device bridge_slave_1 entered promiscuous mode [ 1856.410340] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1856.462323] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1856.472096] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1856.499916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1856.507671] team0: Port device team_slave_0 added [ 1856.517717] chnl_net:caif_netlink_parms(): no params data found [ 1856.526414] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1856.533798] team0: Port device team_slave_1 added [ 1856.539424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1856.546864] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1856.566155] bridge0: port 2(bridge_slave_1) entered blocking state [ 1856.572984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1856.579610] bridge0: port 1(bridge_slave_0) entered blocking state [ 1856.585989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1856.642953] device hsr_slave_0 entered promiscuous mode [ 1856.690435] device hsr_slave_1 entered promiscuous mode [ 1856.772437] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1856.787713] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1856.807788] bridge0: port 1(bridge_slave_0) entered disabled state [ 1856.816190] bridge0: port 2(bridge_slave_1) entered disabled state [ 1856.832340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1856.838714] bridge0: port 1(bridge_slave_0) entered disabled state [ 1856.846752] device bridge_slave_0 entered promiscuous mode [ 1856.854442] bridge0: port 2(bridge_slave_1) entered blocking state [ 1856.860939] bridge0: port 2(bridge_slave_1) entered disabled state [ 1856.867906] device bridge_slave_1 entered promiscuous mode [ 1856.901106] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1856.910632] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1856.929172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1856.948368] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1856.955629] team0: Port device team_slave_0 added [ 1856.963705] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1856.971369] team0: Port device team_slave_1 added [ 1856.983513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1856.991280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1857.002591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1857.025805] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1857.063203] device hsr_slave_0 entered promiscuous mode [ 1857.090487] device hsr_slave_1 entered promiscuous mode [ 1857.132942] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1857.139934] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1857.155977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1857.171268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1857.178072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1857.186810] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1857.197967] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1857.204461] 8021q: adding VLAN 0 to HW filter on device team0 [ 1857.227095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1857.255219] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1857.261541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1857.269315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1857.277554] bridge0: port 1(bridge_slave_0) entered blocking state [ 1857.283949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1857.293690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1857.305325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1857.313260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1857.320916] bridge0: port 2(bridge_slave_1) entered blocking state [ 1857.327253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1857.341902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1857.351094] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1857.357171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1857.368042] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1857.375794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1857.386689] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1857.397634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1857.404681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1857.411778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1857.418580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1857.428365] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1857.444056] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1857.452010] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1857.458075] 8021q: adding VLAN 0 to HW filter on device team0 [ 1857.466366] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1857.473674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1857.480973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1857.487798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1857.496094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1857.503840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1857.516987] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1857.523177] 8021q: adding VLAN 0 to HW filter on device team0 [ 1857.536850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1857.547473] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1857.554416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1857.562486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1857.570271] bridge0: port 1(bridge_slave_0) entered blocking state [ 1857.576609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1857.583770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1857.591574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1857.599462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1857.608654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1857.618823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1857.625950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1857.634505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1857.642231] bridge0: port 1(bridge_slave_0) entered blocking state [ 1857.648590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1857.655610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1857.663280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1857.678292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1857.689113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1857.698604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1857.706808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1857.714586] bridge0: port 2(bridge_slave_1) entered blocking state [ 1857.720987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1857.733258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1857.742528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1857.752673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1857.760528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1857.768106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1857.774544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1857.782045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1857.789449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1857.804555] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1857.810909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1857.825244] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1857.835533] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1857.842646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1857.856406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1857.866395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1857.873880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1857.882308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1857.889807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1857.907332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1857.914594] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1857.922122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1857.929729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1857.939277] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1857.949200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1857.959285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1857.968174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1857.979354] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1857.987731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1858.002894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1858.010549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1858.018083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1858.026077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1858.033754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1858.041579] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1858.050668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1858.058438] device bridge_slave_1 left promiscuous mode [ 1858.064847] bridge0: port 2(bridge_slave_1) entered disabled state [ 1858.101035] device bridge_slave_0 left promiscuous mode [ 1858.106501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1858.142032] device bridge_slave_1 left promiscuous mode [ 1858.147496] bridge0: port 2(bridge_slave_1) entered disabled state [ 1858.200955] device bridge_slave_0 left promiscuous mode [ 1858.206451] bridge0: port 1(bridge_slave_0) entered disabled state [ 1858.365105] device hsr_slave_1 left promiscuous mode [ 1858.412975] device hsr_slave_0 left promiscuous mode [ 1858.453151] team0 (unregistering): Port device team_slave_1 removed [ 1858.463944] team0 (unregistering): Port device team_slave_0 removed [ 1858.473553] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1858.523239] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1858.606760] bond0 (unregistering): Released all slaves [ 1858.711891] device hsr_slave_1 left promiscuous mode [ 1858.752876] device hsr_slave_0 left promiscuous mode [ 1858.804726] team0 (unregistering): Port device team_slave_1 removed [ 1858.815410] team0 (unregistering): Port device team_slave_0 removed [ 1858.825120] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1858.885512] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1858.955849] bond0 (unregistering): Released all slaves [ 1859.004740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1859.013506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1859.028165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1859.036766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1859.046351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1859.056481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1859.064956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1859.072798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1859.082215] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1859.088230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1859.105972] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1859.115251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1859.133193] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1859.152779] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1859.167392] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1859.186077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1859.318988] kauditd_printk_skb: 2371 callbacks suppressed [ 1859.318997] audit: type=1326 audit(1564467100.607:241625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1859.354390] audit: type=1326 audit(1564467100.617:241626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1859.381708] audit: type=1326 audit(1564467100.617:241627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1859.407130] audit: type=1326 audit(1564467100.617:241628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1859.432377] audit: type=1326 audit(1564467100.617:241629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1859.457722] audit: type=1326 audit(1564467100.617:241630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1859.484005] audit: type=1326 audit(1564467100.647:241631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1859.508942] audit: type=1326 audit(1564467100.647:241632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x459829 code=0x50000 [ 1859.534247] audit: type=1326 audit(1564467100.647:241633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1859.561504] audit: type=1326 audit(1564467100.647:241634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29475 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 06:11:41 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="8cff7c1cd4bb1ff17900005345214c696e75af1200000000c46f0006000000070000003c9f2300000000000000c200000000000000000000007f9542773a2105b6e03410582d57aa000067681bfd070000000000000000fb6c7a2ce29a2227ea9d5b40d547f23023b493338065255f91ffca3a2cfb46d8f90b3514c7635daa6f7146cf6b5a7033fdfd6d608942dceb8e94b4e5df7b5bcc41b095b881e0"], 0x4b) write$selinux_load(r0, &(0x7f0000000200)={0xf97cff8c, 0x8, 'SE Linux', "1c8edafbdfa2d23f1c2bc1d3569c7d3966e3cdcad03b3a50c5748e3a5f73d94c8ec0e1e35fa55d5437abbb0cbe4e001e39b1056a0cf5eb9b49eca59c2443ddce507d91eb070be4addea1b3b054ab7d26d7065ca15f8027be77e1d94596d500a05fe2adc454e4850205d1fcb5c0d41988318a13ccd8af46c05fa990130d2b8448734ebf91eeeda5875b365e09d6da96f075c786f7d3c0fadc03887cd171b92adf525fd4d891590653a003c7ba9aad747ee25a7ade24400f7b213549ceecd8946ed9c79cfdda10975c5df501e888d0d8e23c0975e322116436bdafc6dd54ddf23924e3d92b7f1abac200ccabbefde8dc8c5fe30a4fd1f2b373a4ad61fc486b6658e7f1a52c712ec2f24ec25058fbbc442aa5e3f43657904f5f41c90da29a97dd51fc4107603b9ead1a213bfef8eefcbbd42443084f5265638d2388213c983e2a102026c4b6aff565bf7cab657a416fb91f9f43a7b8de6808643d3d582b8be7c2d9d54c9df7e1990129668311c8d38c91b9413eb4813352bbcedbdc3568873e76948b07af8df7d236b0f87e4d31d301afdcb680274975b931bb95e7388e0b12a4e7e68edb543a72d3133c717b094b250d3d44b664c634ad44373434be222f00214a255ef2fe8b6491af0c889faa5e4b2c86dc222d566478aa09526103bb2b1d8732305ecb23d901d64f3d261ac9d384005bf319975a9a5be7e7fa10e535fcae7c65d7dbb2b28c8503ac37abaaf0e88c2eab5804c5604b63f8b85247014c18ca43e03a9c5bae14bbad9db22add50ce0f474e621251ed8b16d6230ec1810c4ff32b1420e35277fa785638d9079b1bad77a470cb73fed7c48b3e857b8386d6e4b4f3d6ae7a3f865bb1a72590fe11afc8082028bda3176e321ce9c79ef5be713bacd920792321132690a7f27997e9f3b7875caf459072bb83e36d7f9c9d1b7274b0cfff59486b2f545a670f5c48988c3a88397bed43303bd561304af516b711df4cc66c1ff17bb8aabaaf4a0831e97ff6488952d5382bcaadd225f1589d9badd6e394a0d49cb41b4309ff0640b16ad995c20dfcfab6569ee3d4dddad8b9f78b82fe6452bbc7f228b3a1af87ebc1ca7fe2712c5fc052b9d7f29b0125e2817996c97dfb0773f4019f70e3c055ae5330891cf0ad80eaaf807dbf79f16a4c7908322ec0496b323b3ed10846d9d6efba807ff42b7f8bf82b322469adecfae63b04e38613d08b62719f7006867e8d48ccdc819329de99baa2b09617aa10e9ee9da0ac46a55a1c6ac503520de0370a039cedac6ef680fd6481727479891eca7b9bd38132e1977dd60a4622b1e8a2ea2b02175ce22ed06e4201004a975dbfa44db5742373fc620fc88b3a12d4d68b97ce06df8a9e710507abd372ae0a66898b273d9970bd6ddc145a84c6239ce4831d6fa6ce6eae85bf4b21fce529d575c494ee783f75ec3aa9f38bd60b9010b7e7194c53c342b1903ba8091f8d27d5f8d9e4bbaae3fa8004bb52bdb250453c844b0dae812bd8e2f503d72aa04b66171bed13b6b10f5ca7a423dddeb5d3597e96c92f916742dcb72e1c3c85c996d82def2dd4e7d5ef7d2d70905767abddbea96d5a23a6902bec70b4be289027d1ebd4fe3fd0d44a19f44cd60918351650c452c448c214ccee6fbb8ef4bc2fbcb28f69e30345cc85a83ca09a0ba1e1b6f96dedd0c2f7d117b680f9d65263f0d5e20badf06e1d6db1d9fc10d6057ee881885bfb3f824fa25f643c2b94241fb2dff96d2ebd9e298c8c781a3777927e2acde7993fb1590222103151f8191c21a4cc4049060a6420bb8a19431f7e8419938d2b39833c8521dd860479fe26b59736bb11e0f24101dc300364a28f77fd5a9a84d738e28542e215a429d9420956908be97dfe186175a3aa4a2f01bb7696d773dfbc8e7017212dc4218ba41eb4a01d943554b62d5b71a1e988f2c5da1b80d70377f2497add771995b254d1ee5acf51a92183cf5aaa923ca51f27f56a6bbc311d92c741ce9554ed2405d435e5f956f3c8b593103e442f953b1dfe1c2f05f926f76d8dbbd543baf3004c049d68202604cc13da621bd9caa833d6fa3d94c962b4d48f46e8912b7db6ea49336c25ee6fbf2198189f060b2971ed430cabe285b08fe4b632064e66c8a1c67a38e711b775f6009d4161235d7cd49ef69264328f96f32cebeef132a8f48f22d3e7fb71f0ecc61a93d7c39743e1d3d651a9787560357e2271cde5b77dd9cfe30f8d0314947ea92e0d33e19e6b10691faf15e6461e1eb115520c19e29b7fe54a79b9dd877ac2b7d45808920434ab10a5049778dfc8a82bf39fc5656d1575bdf5adcba45615c48af6919ec84154c133c479acd5d5aaad8d03fa66bf53a5b840bed0f809ea6d43e7d268f8df5dbba80b9e33617bd909d735a99b0f12a70774c0fc7df9b64a4c417ef08e46bbab0317a1c8efc9320ef9778dafa9d284cf75fd70395fc36af252f2f2dca67a1ae7d0fc5201033e80422f06a5d5715d6a644fce3e3edbb2c739d641df4b97459bea51ac95266fb6d9811d5956acf90a2f31e5554eeb55778c3a85f387c80ef69ce2a0c66241fbcff7d2766ed548a3efd203199283323b8ed50c9a7fe75d1cdffca355a7665b5b2ac47aa613a97616a77293f76e337a51000d006340c27d559b122347bc3b6f63bcd85b0b94554400928ccf89568996aa7e959e955fdfe7057fb8a76ff1a6c05a505a1b53705f0ecec9804d8436d7d8ed53eedf2c3b397680f87f21c948638aedd2b3808045b6c68ef768f77fe96d2c2ad8802f7a266b6afe513d6e18a95d49ef43d4d1cb2345f5e2d7c198221dac531dc0b88ddd4a21ae33792c2e62b2a29061542dd6af840f85a4e849b03cbe2057d53924799923cf5b69829caf93e4095b3cf8e2cd32fd394dd9521bdea445ace12a0c1ef9a721256a875b2608fc8e8924e6930b569c39c8170ef788c85f57b0ab7568f5e64236906e6042f6dd2c8b80c63ee6705abd29639e90232d626bf66de094433c7cf09d1346b877cad00fcc0c290db5339d97576cae6c47cdba18d6df0e565f2ec848d2aee91bc329cfb05c2cda3f23f3f5d3138250b5eb3735813ed4b54e5d64ef9afc9e6c42af68eb5eed5686edd49a0dfddd508b829adb1ba1ae93dd44cb592e4238190fcf20fb9da38f8e72c4a2b749d8a61a0b3063bf53e3d59e0a159399e995561ad694aa19155956e126fff396623a6b4e1c15f2cdd1e7a37072896a3f9a199656787d84450559475d54b950132d51cfcc6a6b7b29a42354e18755f2432e0eb1edc79394fd1ef6450e9bab5d1a177135d1ce3c0b2b9b056dc8e8e751855e488f156e9229de59c4b158b4e9f5aa24ede70b01cccba745ab6ac95c790620479c9d75fae32b0e7f0f011ddc976dc559d5474a0c51e7a9b0265db862a099efb8901e1f7ba508296e807a18dbde4e31a5371e1a52d9eec74362348f686914308e75bb719f30b18e8cdde79a30e013d80b024373b413b5435f599168a787fad5fe4ec05ba52694be22d7dc1ef6991c2764c2987c19a25cf085f32c2539f059414ca8b78d1f8be80b2f448995f85a70aeed5af465e8a014f89d4b312ecf79eed2c39e73e1ce149414961a4a2e5e453cebbfdfcf5de56fe67bc4eec774872c3a808d53bc39cbbca9e9414d809ed0cb29c40f5253a7d09f542c203ba2992c5c64eaf86293e30448683a8e4ea8fe293d142734e25714b956dbd91a17e5092eed0e6f4447bc437484697a3b2ab5c606545cd35245d6ea4e4dff0ab2c4bbe248e8b6676d7bfbb1d16877efa53eaf819ff5abef8cf259362e722ed089c531268d43d33473dbc78d7b95cfccf3cee2fbcd4fd96fedb8d95901c35d14fa834ac82f731c90c8a8158a2b2cde85522c66bb755dbb986c55bb6ec7edf44fd6f9b6eb7556c7e57036718198ddcb2ba0e12007655ce44f14602b08420bc21e8c6d193fe456bf5f49eaf861a79808ff578ba2b81ba313fccfa1eefe6469f0afb644ad27722a9e6a2df8f9df2c066b841e537d39382ae48358336ec86a2e7bfccd17ec8bb36364135a656c2a3b7ab86a86761cc9991ff3c62563b0aff8f715392231bf1b87947caf40cb38d0923e9be133627539c27f013bc0131426aff0ad0d9e8f0b3d1bf9978be204329e7ee24a1d00f8d3578ea503ced8a24ccaeddd9413f512069868f07b09371c07c7c8585188953a1ee61083edf8215be7c95a463c14785e973f74d46f210c8b2dd33d2cd1dc23fba0265f9c3975660ff221dc12d58eacb0e4c85b0f4d74288b753614cf1663d0511191c9c3886c1d8e51c35a86a40e8ed47089707a8d72c5cfd1ca38f4994ffb7308491ff72eca618d5dad755cdb6759e8f34a3f1678114a8ffc9425f92712869362a4c18f51032dc574128188f6f0784a79b629916b312c0fc08e535339ab4157ade5e62312516d4fca55ca4f7256b6b7a4eb4288f1b66499447fc48c0cab536c5f1d60c37f3c8e10281d3f79b960d0fad6fd66fd008e8f7d4ddfe258daef5b1f2edb0845bda7dd36ab023dd20f6a59a391ffb3f290fb306b855112551822629d1030d67d17b0ec8f30c11ea4326ba07a434cd41ef33240dd9f5c4ec3c1773e2d259d93d1a8c166e2767c203c3783a1dfdee90f1503a6f061c0c48a54027bcc5c3183be07ffd96682c1a3a842a09f2801779fd49df7fc48e51ccc58295398dd71cf3ed84aea7a2b9e29d28e950894d2453c37bd3b87f773771788d953e22e94c0a469a7fbaee56705fec3811a48fe0c3c7ed7fa8974c13a9e470def4db496d29951df130ee18091571703991671c6185a96913ba5825b3b66b072edd24fc9e1586fc08f5684c0575398a8e8b43cc2ef0194d147ff2ead3488f05523abfdd8b44d330e274b8058c2fd46b80e5e55a70648aae13f6c59180c4a60e67df63d95e1766c2b1ea6b9b55fe01b7e48278e3a5321b898c4522c587b2560c3ffba8665ce15b406cbd559b44555044e4cfcd15f07496b41972b5c8ac69980f45e6b5a377c74366d8e12e3dc483d2baea21e68f78dd3f59a743a1137f66e4a8afcf9ca35da47e78723c29619572fae7613953ecbf775b04413476bf606597167ff5f722c90736c9bd4f7b1ed076599f49bafe18ede7889ff78f470d770dc3c1293987d184f1ece489a82f692508b62a194945c436b4222c25aa081a650632250f733656d3a21a4b6896a6fe4e8981326cec93aa9b2d4a2afd70868ce5053e7bda20fc7c25552a5566099025b73a99a71de1a9b75232e035da0937dac68828b990b480996feb42d900551bec767d7a02a36f04cf34c8662aeb30f5d1e4ea360df0b54d3e2a7b23f195b438fbb68a443a03cb91a565fa4121b03cb63e8319335e6a726eb2c7e3525738654d23ac0719cbec76dd6b3db0e74ea601e0e1348ce8e3e03ba40ca959e03cb178beafdc62630682e2e656bb01e93bca516f4d7f7f78bfd3ad50c7df81c124415bb09d2d97cd592a336e3140c6f5c7cb0d89da24fc82a23489d2aaeeb0ffc470777ced65a3280e4553438a61ac6bda2e5927e3e776c58bacbe72c39b43b81fa0c441bac447935b0e600c737b3765862f21162e25b0021ed79b1f7ce69563e4aab86edcfd44e1769d7ea0ed3ffd32aa0dfd55a3cfabab78abe93b06e0e750d166b82130f03808624b07c0e22f19545693588adf92d184a8dfd85ba2e4bbc47f10537d0b472e64c48944717c3e43b8486188af1c44359fa674b3991cfa393b33967842425e5784b4345fccef275291664e0e06cdf85215819b50403b7294739929119d46df4634cd6"}, 0x1010) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='wchan\x00') ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000000)) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000000c0)={0x6ad, {{0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40}}}, 0x88) 06:11:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="390000001300030069000000a2e407edab0080580a00000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) recvmmsg(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f00000001c0)=""/83, 0x53}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r2, &(0x7f0000000080)="dd", 0x1, 0x0, 0x0, 0x3d1) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0xfef3, 0x0, 0x0, 0x0, 0xfffffffffffffdcc}}], 0x400000000000490, 0x6, 0x0) 06:11:41 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:41 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d555e954d4ac80424860000f1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000500)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0/file0\x00', 0x127, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x92) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000800aa3512e94e1142d1040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) [ 1859.791018] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1859.831106] SELinux: policydb magic number 0x1c7cff8c does not match expected magic number 0xf97cff8c 06:11:41 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:41 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73749f67c409"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000500)={0x18, 0x0, 0x7, {0x4}}, 0x18) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000340)) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) [ 1859.842036] SELinux: failed to load policy [ 1859.848105] SELinux: policydb version -69562852 does not match my version range 15-31 [ 1859.857456] team0: Device ip6gre0 is of different type [ 1859.877509] SELinux: failed to load policy 06:11:41 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x1fe) r3 = getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000c80)=0xfffffffffffffe95) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f00000002c0)='omfs\x00', 0x1000000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r3) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x224c, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 06:11:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) setsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000040)="cfd4a56c9692413e1857372f6c03ee6c1ff96d06200859a4ee585b0a6c158992e5201ae6646ddecad981e7afb4fda7f153cde4308da87112568c4e93cca6a3ba1cb69ea7d4b7254c8e0a01f7", 0x4c) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000100)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000280)) recvfrom$packet(r2, &(0x7f00000000c0)=""/43, 0x2b, 0x2, &(0x7f0000000240)={0x11, 0x1a, r4, 0x1, 0x80}, 0x14) setsockopt$inet_int(r3, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) [ 1859.885893] SELinux: policydb magic number 0x1c7cff8c does not match expected magic number 0xf97cff8c [ 1859.908871] SELinux: failed to load policy [ 1859.913750] team0: Device ip6gre0 is of different type [ 1859.921003] SELinux: policydb version -69562852 does not match my version range 15-31 [ 1859.931899] SELinux: failed to load policy 06:11:41 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1859.971793] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:41 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:41 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:41 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73ebdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000500)='./file0/file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000700)="2e942e126958c149ae85a0e49a6dd466b314958b1b7f287c3aeb87be388119d11d8566607672034cdb2f6619c64b74fbc4134f8c618cf85c8461a0466264facc63b384ea888743ef7776224af7405447abd095f7507d93cb7a4d1360d5e4d25131934b076385728bce20975f86b63c24a290ce5319dc54d767299cb10bfd5b336438f0143d45f6af18d180f75b0295d953b3fb6fa8318352eb0394a400424cdb5ebd6dd198d0bb2be41ebbf81b0ba77c1463b4bf3c8f49e32895fcfd4f7f64210a0e68606ffb25b49bf44e0bec1ca4f5aa82", 0xd2, 0xd99}, {&(0x7f0000000800)="59f895da309c899879deb863f427d899a722653fa0cbd31c2feb4a8e620329fedb2825a2a2af0e66f2cf878abd4279ffcd83e67325de5cda874dce31909ac05aaaca7e0a83f466ef453c1b6eea388b8d6d999662867dba5a2bb547bd136dc54ff738a2a9a123e131e784aee38a802005d8f4b6bfee1958489f329f68fa6772d779f7139886c2dcae19512e81eef019fa1a12123e31df4e1d14b4677eecd4e9a9f1efc970606c5883a76938ece97cc2a310052f28d429abbe38f42aff96356e8db76083c62e12a3b09e4757a826d0198dbaa044334fe610262aad0910db436160eec32d9663d1cf95b2dbf27831b041c5f40b24e836b97ebc1a", 0xf9, 0x3}], 0x200041, &(0x7f0000000900)={[{@data_ordered='data=ordered'}, {@discard='discard'}, {@commit={'commit', 0x3d, 0x7}}, {@acl='acl'}, {@nosuiddir='nosuiddir'}], [{@subj_role={'subj_role', 0x3d, 'U-'}}, {@fsuuid={'fsuuid', 0x3d, {[0x75, 0x77, 0x34, 0x39, 0x3f, 0x66, 0x38, 0x35], 0x2d, [0x37, 0x66, 0x35, 0x33], 0x2d, [0x7f, 0x0, 0x31, 0x62], 0x2d, [0x37, 0x64, 0x7d, 0x77], 0x2d, [0x65, 0x62, 0x76, 0x67, 0x77, 0x66, 0x38, 0x75]}}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@fowner_gt={'fowner>', r0}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fsname={'fsname', 0x3d, 'GPL&\''}}, {@obj_user={'obj_user', 0x3d, 'mime_typesecuritycgroup&.vmnet1md5sum'}}, {@dont_hash='dont_hash'}, {@euid_eq={'euid', 0x3d, r0}}]}) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:11:41 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001080000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:41 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0xa64, 0xe, 0x0, 0xffffffffffffffff}) ppoll(&(0x7f0000000180)=[{r1, 0x2}], 0x1, 0x0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000040)='system_u:object_r:cpu_online_t:s0\x00', 0x22) 06:11:41 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1860.243474] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:41 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1860.557331] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:42 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:42 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1860.885515] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1860.931387] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:42 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:42 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0xffffffffffffffff, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x100000b, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) flistxattr(r1, &(0x7f0000000180)=""/1, 0x1) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x0, 0x3, [0x5, 0x8, 0x3]}, &(0x7f0000000140)=0xe) 06:11:42 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='B\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010026bd7000fddbdf2509000000080005002f000000080004000000000014000200080007000100008008000d00000000000800050004000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c0000001400110100000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="2400020086682ec5f0cb90b8c6ceb5f9f4fbe347af9a8916c2d135e43fb7450614e76bccd37243f5ae9b0f36655622bad19135152f652cf5b5b7142bb54a4c2d12c778524b47fec0300896a869b8e3764d857d2b9ee6b729e7c92f90d609dfb34c29ce7a0085867ea31ea293da7554e2f3d86403d57830c2f9661c7a91b9bb7456b79da959156b5532bdd397a5cc504eab9700a8623832743a0a79588627a12cf431c1bd407c38527c127f115013818a8a48c2f1ff6725ea30d2d8c0b092e40a9d7371335233659b1e20c230f5925fb3bd8674eeae468f7ce5"], 0x2c}}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000280)={0x1, 'ip6tnl0\x00', 0x4}, 0x18) [ 1861.172601] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1861.197639] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:11:42 executing program 4: open(&(0x7f00000000c0)='./file1\x00', 0x101000, 0x48) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x8000) lseek(r0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x4) [ 1861.231486] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:11:42 executing program 2: r0 = socket(0x10, 0x803, 0x0) unshare(0x8000400) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x4e23, @empty}}) [ 1863.960294] IPVS: ftp: loaded support on port[0] = 21 [ 1864.272497] IPVS: ftp: loaded support on port[0] = 21 [ 1864.325702] chnl_net:caif_netlink_parms(): no params data found [ 1864.398281] bridge0: port 1(bridge_slave_0) entered blocking state [ 1864.405107] bridge0: port 1(bridge_slave_0) entered disabled state [ 1864.414220] IPVS: ftp: loaded support on port[0] = 21 [ 1864.420754] device bridge_slave_0 entered promiscuous mode [ 1864.437698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1864.444118] bridge0: port 2(bridge_slave_1) entered disabled state [ 1864.453785] device bridge_slave_1 entered promiscuous mode [ 1864.538740] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1864.558934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1864.589197] chnl_net:caif_netlink_parms(): no params data found [ 1864.622680] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1864.629962] team0: Port device team_slave_0 added [ 1864.636693] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1864.644524] team0: Port device team_slave_1 added [ 1864.651135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1864.658919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1864.743460] bridge0: port 1(bridge_slave_0) entered blocking state [ 1864.749890] bridge0: port 1(bridge_slave_0) entered disabled state [ 1864.757527] device bridge_slave_0 entered promiscuous mode [ 1864.804540] device hsr_slave_0 entered promiscuous mode [ 1864.841566] device hsr_slave_1 entered promiscuous mode [ 1864.901957] bridge0: port 2(bridge_slave_1) entered blocking state [ 1864.908435] bridge0: port 2(bridge_slave_1) entered disabled state [ 1864.916018] device bridge_slave_1 entered promiscuous mode [ 1864.928052] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1864.939590] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1864.970864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1864.979970] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1864.988210] chnl_net:caif_netlink_parms(): no params data found [ 1865.027773] bridge0: port 2(bridge_slave_1) entered blocking state [ 1865.034216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1865.040839] bridge0: port 1(bridge_slave_0) entered blocking state [ 1865.047199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1865.067931] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1865.075916] team0: Port device team_slave_0 added [ 1865.091346] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1865.098651] team0: Port device team_slave_1 added [ 1865.104235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1865.111674] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1865.202796] device hsr_slave_0 entered promiscuous mode [ 1865.240392] device hsr_slave_1 entered promiscuous mode [ 1865.294435] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1865.301678] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1865.308375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1865.318525] bridge0: port 1(bridge_slave_0) entered disabled state [ 1865.325615] device bridge_slave_0 entered promiscuous mode [ 1865.336581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1865.343191] bridge0: port 2(bridge_slave_1) entered disabled state [ 1865.351382] device bridge_slave_1 entered promiscuous mode [ 1865.380801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1865.388574] bridge0: port 1(bridge_slave_0) entered disabled state [ 1865.396274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1865.412607] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1865.429278] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1865.459345] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1865.467370] team0: Port device team_slave_0 added [ 1865.477708] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1865.486330] team0: Port device team_slave_1 added [ 1865.494945] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1865.505360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1865.528850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1865.593992] device hsr_slave_0 entered promiscuous mode [ 1865.630444] device hsr_slave_1 entered promiscuous mode [ 1865.671079] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1865.678765] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1865.695592] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1865.713854] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1865.721356] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1865.729207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1865.736714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1865.746808] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1865.753047] 8021q: adding VLAN 0 to HW filter on device team0 [ 1865.768469] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1865.779152] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1865.791232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1865.798982] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1865.806966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1865.813348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1865.821165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1865.828834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1865.836855] bridge0: port 2(bridge_slave_1) entered blocking state [ 1865.843249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1865.852648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1865.867411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1865.878460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1865.891783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1865.897834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1865.909444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1865.918047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1865.927428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1865.936164] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1865.945581] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1865.957340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1865.967259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1865.975349] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1865.990838] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1865.999048] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1866.006079] 8021q: adding VLAN 0 to HW filter on device team0 [ 1866.013612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1866.024801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1866.031999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1866.038828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1866.046593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1866.062879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1866.075226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1866.083444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1866.095472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1866.103043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1866.111372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1866.118906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1866.125311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1866.135668] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1866.142269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1866.151663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1866.159429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1866.167054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1866.174932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1866.182821] bridge0: port 2(bridge_slave_1) entered blocking state [ 1866.189172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1866.205995] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1866.216122] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1866.226098] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1866.234853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1866.250789] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1866.257150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1866.274023] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1866.285884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1866.293381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1866.302313] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1866.309832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1866.324298] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1866.331318] 8021q: adding VLAN 0 to HW filter on device team0 [ 1866.341693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1866.349697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1866.357597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1866.372802] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1866.379832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1866.387459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1866.396068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1866.404629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1866.411051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1866.419675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1866.427961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1866.445168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1866.453717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1866.463543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1866.476127] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1866.485738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1866.493010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1866.501635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1866.509317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1866.515775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1866.523079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1866.532989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1866.541689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1866.565264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1866.575291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1866.599419] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1866.612008] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1866.626656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1866.637092] kauditd_printk_skb: 560 callbacks suppressed [ 1866.637107] audit: type=1326 audit(1564467107.927:242195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1866.637719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1866.660316] audit: type=1326 audit(1564467107.937:242196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1866.678852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1866.715863] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1866.728181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1866.748358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1866.760830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1866.778102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1866.795252] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1866.801945] audit: type=1326 audit(1564467107.997:242197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1866.827611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1866.834379] audit: type=1326 audit(1564467107.997:242198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x459829 code=0x50000 [ 1866.841824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1866.861823] audit: type=1326 audit(1564467107.997:242199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1866.868196] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1866.892854] audit: type=1326 audit(1564467107.997:242200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1866.925436] audit: type=1326 audit(1564467107.997:242201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1866.926957] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1866.963188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1866.983404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1866.985784] audit: type=1326 audit(1564467108.007:242202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1866.999226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1867.022779] audit: type=1326 audit(1564467108.007:242203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1867.049535] audit: type=1326 audit(1564467108.007:242204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29569 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1867.087038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 06:11:48 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) r5 = getpid() perf_event_open(0x0, r5, 0x3, 0xffffffffffffffff, 0x200000000) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r7, 0x3, 0x0) [ 1867.094778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1867.103990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1867.114322] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1867.121435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1867.151035] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1867.163881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1867.298802] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1867.550924] device bridge_slave_1 left promiscuous mode [ 1867.556508] bridge0: port 2(bridge_slave_1) entered disabled state [ 1867.611327] device bridge_slave_0 left promiscuous mode [ 1867.617158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1867.652161] device bridge_slave_1 left promiscuous mode [ 1867.657837] bridge0: port 2(bridge_slave_1) entered disabled state [ 1867.711287] device bridge_slave_0 left promiscuous mode [ 1867.716973] bridge0: port 1(bridge_slave_0) entered disabled state 06:11:49 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001080000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:49 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400000200000000000000ff0f0000037baf500869157b000900ff1d40cb252ef51af08f00000000020636d21ef700a3460000000000000000"], 0x1}}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) r2 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000380)={{0x3, 0x2, 0x6, 0x5}, 'syz0\x00', 0x9}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = accept4$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast2}, &(0x7f0000000240)=0x10, 0x80800) r6 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000280)={0x5, 0x9, 0x4, 0x800, 0xffffffffffffffff}) ppoll(&(0x7f00000002c0)=[{r1, 0x8661}, {r2, 0x4000}, {r3, 0x200}, {r4, 0x1520}, {r5, 0x200}, {r6, 0x8098}, {r7, 0x1001}], 0x7, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={0x2}, 0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x79fd, 0x0) r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40086607, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:11:49 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80011) close(r0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x400, 0x1) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) r3 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f0000000140)) 06:11:49 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:49 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x1ff) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="3000410b000000c358bbf4cfc5310ce0ba130b9300000000000000000000210000a2f8031ceb129669ad7ff26b79d7d614af73a3e5e7b70f8cb165e102000000503d6f8f9b19becaf7ba8691ee01df00de09e78ff85de0a42ef1737323455cb300c20f344a0084cc235516b80228131b25ad1a1c94d6e09b493b7fb6cc52aaf39cd664717352f37813b2cbe506b02c1059e45bbe7baa58f1bd791042a73e1030d0c8d7454f190b392689ad2bab4ce11142d643a3bda473149752e178e7ab5e803a688c", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') lstat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x3) 06:11:49 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1867.771997] device bridge_slave_1 left promiscuous mode [ 1867.778905] bridge0: port 2(bridge_slave_1) entered disabled state [ 1867.836593] device bridge_slave_0 left promiscuous mode [ 1867.846464] bridge0: port 1(bridge_slave_0) entered disabled state 06:11:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f00000000c0)=0x9) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x80000001, 0x400000) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) 06:11:49 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x10000) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x2, 0x4) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000080)) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@v1={0x2, "51e2df9fd1"}, 0x6, 0x1) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) get_robust_list(r1, &(0x7f0000000300)=&(0x7f00000002c0)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000280)}, &(0x7f0000000340)=0x18) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x7, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default]}) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000400)=0x7fffffff, &(0x7f0000000440)=0x2) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000480)=0x4, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3ff) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) fsetxattr$security_ima(r0, &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@sha1={0x1, "7d07566c3fd95673282ccf34f4c866869532ac8f"}, 0x15, 0x2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000540)) syz_extract_tcp_res$synack(&(0x7f0000000580), 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0xd) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) kcmp(r1, r1, 0x7, r0, r0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000600)={0x9, 0xbd, 0x80, 0xff, 0x5}) recvmmsg(r0, &(0x7f0000002380)=[{{&(0x7f0000000640)=@ax25={{0x3, @rose}, [@netrom, @remote, @rose, @null, @null, @null, @rose, @bcast]}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000006c0)=""/202, 0xca}, {&(0x7f00000007c0)=""/28, 0x1c}, {&(0x7f0000000800)=""/146, 0x92}, {&(0x7f00000008c0)=""/38, 0x26}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/224, 0xe0}, {&(0x7f0000001a00)=""/253, 0xfd}], 0x7, &(0x7f0000001b80)=""/208, 0xd0}, 0x8}, {{&(0x7f0000001c80)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001d00)=""/249, 0xf9}], 0x1, &(0x7f0000001e40)=""/28, 0x1c}, 0x578}, {{&(0x7f0000001e80)=@caif, 0x80, &(0x7f0000002280)=[{&(0x7f0000001f00)=""/18, 0x12}, {&(0x7f0000001f40)=""/23, 0x17}, {&(0x7f0000001f80)=""/146, 0x92}, {&(0x7f0000002040)=""/226, 0xe2}, {&(0x7f0000002140)=""/135, 0x87}, {&(0x7f0000002200)=""/116, 0x74}], 0x6, &(0x7f0000002300)=""/94, 0x5e}, 0x9}], 0x3, 0x40, &(0x7f0000002440)={0x0, 0x989680}) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000002480)=""/4096) pwrite64(r0, &(0x7f0000003480)="c011ecf2d54843cce803fc6b5d87216bee402bdb09bd3df0ff77004de482b9a54e390a7b8f7af7b254daf02844603d57e849d4e26a765c0b7c59b9dc6be92d5d5fa9337d87a9ec9dd90e081c8c9e46d57de4c5f6e1558353a50eb16b846736dad39c1691d7a22d43f2d193655f805894fac3ef95549ad892906d", 0x7a, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000003500)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000003600)={0x0, 0x7, 0x1}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000003780)={0x28, 0x0, &(0x7f0000003640)=[@increfs_done={0x40106308, 0x1}, @increfs={0x40046304, 0x1}, @dead_binder_done], 0xdc, 0x0, &(0x7f0000003680)="6167df0a3acdbcd88944fcbe7b018a5f063a8191e0e918a5d6851c15731c63d17bb7ef961e4f12f5ef7dd5670f6ce2c34da38df0d3958bfa0321838b4b565a2490741121ff74139f8dcd56bdba89881fb4bf266ccb9fc42000af9e1eab263e1d3165195756f5143e812232a979f15bebe439f93eb8c884ada16166be5ad916fa41bac76a45c1b8706b3b87ae31bb05b60a3b22e8b9edb8206b37575f9f9994f5b215563a391e0d25b7476e753800b713c5dbf08eb9ea47faae5c4f637386b9f75ec3d7615391e40883c4e10ce654587336082833ca5d1e49a370f145"}) ioctl$RTC_WIE_OFF(r0, 0x7010) write$P9_RSYMLINK(r0, &(0x7f00000037c0)={0x14, 0x11, 0x1, {0x8, 0x1, 0x7}}, 0x14) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 06:11:49 executing program 2: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200)=0xfffffffffffffffc, 0x4) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xe68, 0x500) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000002c0)={0x0, 0x0, @ioapic}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x3) 06:11:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv6_delroute={0x1c, 0x19, 0xd21, 0x0, 0x0, {0xa, 0x30}}, 0x1c}}, 0x0) 06:11:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000280)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x67, @multicast1, 0x4e21, 0x3, 'nq\x00', 0x4, 0x4, 0x35}, {@remote, 0x4e22, 0x0, 0x0, 0x9, 0x9}}, 0x44) [ 1868.111160] IPVS: set_ctl: invalid protocol: 103 224.0.0.1:20001 [ 1868.273873] device hsr_slave_1 left promiscuous mode [ 1868.316132] device hsr_slave_0 left promiscuous mode [ 1868.374181] team0 (unregistering): Port device team_slave_1 removed [ 1868.396080] team0 (unregistering): Port device team_slave_0 removed [ 1868.418349] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1868.484733] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1868.608597] bond0 (unregistering): Released all slaves [ 1868.693579] device hsr_slave_1 left promiscuous mode [ 1868.735274] device hsr_slave_0 left promiscuous mode [ 1868.774816] team0 (unregistering): Port device team_slave_1 removed [ 1868.786546] team0 (unregistering): Port device team_slave_0 removed [ 1868.797071] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1868.835147] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1868.919304] bond0 (unregistering): Released all slaves [ 1869.002170] device hsr_slave_1 left promiscuous mode [ 1869.043480] device hsr_slave_0 left promiscuous mode [ 1869.083429] team0 (unregistering): Port device team_slave_1 removed [ 1869.097465] team0 (unregistering): Port device team_slave_0 removed [ 1869.106971] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1869.154824] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1869.218497] bond0 (unregistering): Released all slaves 06:11:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="85fc010000000000e9000000000000009510000000000072"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) [ 1869.298116] erspan0: Invalid MTU 17664 requested, hw max 1500 06:11:50 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000100001080000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:50 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:50 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=']) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1, 0x2a0000) connect$caif(r1, &(0x7f0000000180)=@rfm={0x25, 0x0, "b3e03963c6c93f8b563fc43c3264a39a"}, 0x18) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) tkill(r0, 0x3d) capget(&(0x7f0000000000)={0x20080522, r0}, &(0x7f0000000080)={0x80000001, 0x2, 0x7, 0x2, 0x1, 0x1}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x1, 0x0, 0x0, 0x0, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)="5edb4e8df9f5c74729cb8eb7df429e8cc9ee97d2fbecc12439d064026c1a524d4f63f693da57b86fcebbde60626e6d1308665c5665") ptrace$cont(0x9, r0, 0x0, 0x0) [ 1869.505628] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1873.050184] IPVS: ftp: loaded support on port[0] = 21 [ 1873.385191] chnl_net:caif_netlink_parms(): no params data found [ 1873.431473] bridge0: port 1(bridge_slave_0) entered blocking state [ 1873.437975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1873.451302] device bridge_slave_0 entered promiscuous mode [ 1873.458257] bridge0: port 2(bridge_slave_1) entered blocking state [ 1873.468945] bridge0: port 2(bridge_slave_1) entered disabled state [ 1873.476206] device bridge_slave_1 entered promiscuous mode [ 1873.505587] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1873.514871] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1873.535893] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1873.543272] team0: Port device team_slave_0 added [ 1873.548700] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1873.556035] team0: Port device team_slave_1 added [ 1873.561386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1873.568599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1873.632479] device hsr_slave_0 entered promiscuous mode [ 1873.670382] device hsr_slave_1 entered promiscuous mode [ 1873.715931] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1873.723407] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1873.738478] bridge0: port 2(bridge_slave_1) entered blocking state [ 1873.744925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1873.751672] bridge0: port 1(bridge_slave_0) entered blocking state [ 1873.759464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1873.799557] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1873.810339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1873.819091] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1873.836304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1873.843729] bridge0: port 1(bridge_slave_0) entered disabled state [ 1873.853750] bridge0: port 2(bridge_slave_1) entered disabled state [ 1873.863239] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1873.869307] 8021q: adding VLAN 0 to HW filter on device team0 [ 1873.881361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1873.889005] bridge0: port 1(bridge_slave_0) entered blocking state [ 1873.895419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1873.906149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1873.913794] bridge0: port 2(bridge_slave_1) entered blocking state [ 1873.920191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1873.936611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1873.945659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1873.960735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1873.975400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1873.983327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1873.998207] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1874.004750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1874.018280] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1874.028140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1874.370547] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1874.717777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29646 comm=syz-executor.0 [ 1874.744134] kauditd_printk_skb: 623 callbacks suppressed [ 1874.744143] audit: type=1326 audit(1564467116.037:242828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1874.782051] audit: type=1326 audit(1564467116.037:242829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.818248] audit: type=1326 audit(1564467116.037:242830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.845856] audit: type=1326 audit(1564467116.037:242831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.870812] audit: type=1326 audit(1564467116.037:242832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.899991] audit: type=1326 audit(1564467116.037:242833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.924886] audit: type=1326 audit(1564467116.047:242834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.924907] audit: type=1326 audit(1564467116.047:242835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.924927] audit: type=1326 audit(1564467116.047:242836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1874.924946] audit: type=1326 audit(1564467116.047:242837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29644 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 06:11:56 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) r5 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ioctl$FS_IOC_GETFSLABEL(r5, 0x81009431, &(0x7f0000000700)) ptrace$cont(0x18, r7, 0x3, 0x0) 06:11:56 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=']) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) r2 = socket$unix(0x1, 0x400000000000005, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={{0x0, 0x2710}}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000100)={0x0, 0x2}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r5 = semget(0x3, 0x7, 0x400) semctl$GETALL(r5, 0x0, 0xd, &(0x7f0000000180)=""/97) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'batadv0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="96"]}) r6 = dup2(r0, r4) dup3(r6, r1, 0x0) 06:11:56 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:56 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:11:56 executing program 2: r0 = socket$inet(0x10, 0x4000000000003, 0x6) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x80) open(&(0x7f0000000180)='./file0\x00', 0x4ee470207af615b2, 0x30) getpeername$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000140)=0x6e) sendmsg(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 06:11:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000040)=""/15, 0xf}, {&(0x7f0000000080)=""/36, 0x24}, {&(0x7f0000000140)=""/123, 0x7b}, {&(0x7f0000000600)=""/91, 0x5b}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f00000000c0)}], 0x6, 0x0) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r2, 0x1, "1496fc", "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"}}, 0x110) 06:11:56 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000700)='./file0\x00', 0x1000000000000008) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:11:56 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(r0, 0x9) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000000)=0xb09) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000801) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000780)=0x80) sendmmsg$nfc_llcp(r0, &(0x7f00000005c0)=[{&(0x7f00000000c0)={0x27, 0x1, 0x2, 0x3, 0x98d3, 0x3, "83afeceb218dd9e8036320a6ae5a940c87bb049da55046c2bab7513ca22e5c5d9235ec6162df0cde5f74619e97a0bd7b6fcf43b8831bdaade3ed19216f41e8", 0x18}, 0x60, &(0x7f0000000040)=[{&(0x7f0000000140)="4e083d7fa41d455bb431a743382f696b1f801371671741b7ce0dd56cf21cb18869fdbf608a733fcdefabd7f4492c8cb6cdb506ac73b250330b851afde46f2301ac2584861ca80c69c3812f12cfaccee874dcc20c656c3d72", 0x58}, {&(0x7f00000002c0)="23767bc82e112564682ad88c197d219791fe83cbaaca2f8617ac8bd41b7dcef7ef39c4a3caeea67a809470827a4c3355d14a44569bdf686910bd1171870e82f71a908052699bddcac40a0547bfd6da3c6ad0838b4dbbb2ebd4fce20f43eb36b4338e1423585eef3e446340b6e42614b61decd3f0a126d327a236def9e549056ca48d57b7a57e017b885028bfe3aea6448c1d1eb4846541ac18b77ec80e312722c5e7f8c750364906d8b25306cacaad35774132e5ccbaba49e5ebeda1e0fad45cb7a7c7a21d2c8953edd0acb839a9ab52adbf11ec33ce9edf8c1274622ffad3c97905", 0xe2}], 0x2, &(0x7f00000003c0)={0x10, 0x11b}, 0x10, 0x4000000}, {&(0x7f0000000200)={0x27, 0x1, 0x2, 0x0, 0xf7, 0x8d, "6914ddf273a8a57d9f25a279627ef459ceb7b04b63e2a49a0c8b5e8c1e864dd1663f9c088243a5e77defa426e8273a3a0cdd4828207ed4facd217e19f406b8", 0x19}, 0x60, &(0x7f0000000540)=[{&(0x7f0000000480)="1a92290f7b13e166cd4af34f4955ea9a9f48affefd15d5ec21d3f144b4e0fa554770d8896e1a598395cb7b0c41b9d88692fc84c35df0b14d61c25761bd941540f0ad886123298daca918581d72d448", 0x4f}, {&(0x7f0000000500)="746afd92d794dfb4b173d46270", 0xd}], 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="38000000000000009f01b600000000006106fbf27b7161e9837abe826e03dfefd4dfbce47633b9cef6e5513a8f3448b75ac4a30000000000"], 0x38, 0xc004}], 0x2, 0x200000c0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, 0x0) syz_genetlink_get_family_id$SEG6(0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000006c0), &(0x7f0000000700)=0x8) 06:11:56 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1875.255202] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1875.280474] device bridge_slave_1 left promiscuous mode [ 1875.351154] bridge0: port 2(bridge_slave_1) entered disabled state 06:11:56 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64=r1, @ANYRESDEC=r1], @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cfd62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd2600090e5e83222a4fc1f4e5b8783af78ccdc56bddd8a515046ddf2333b37343067c6a9da051dd82abe2312e3266a8acc62599c2f5a1e5d8f7334aa1ec93ca1d40b821fe4b20b4a6ed7897b1f40602b5b2277665cae218d8ff456651507c3a072557bdf1cd67cfd58b08b1a5ef1b806f4bcb979e9b606456d39fea15cb6918798e4dc3154d6110aeff5420f13d053c1c81b1a90a4d1f85db14"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x3031022, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r5, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x200000000000000e, &(0x7f0000004fe8)=[{0x9, 0xfffffffffffffffa, 0x48b8000000, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) r8 = shmget(0x1, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(r8, 0xe, &(0x7f0000000500)=""/161) ptrace$cont(0x18, r7, 0x3, 0x0) 06:11:56 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000002340)=0x54) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, r3}, 0x32) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) dup2(r2, r1) [ 1875.431127] device bridge_slave_0 left promiscuous mode [ 1875.437063] bridge0: port 1(bridge_slave_0) entered disabled state 06:11:56 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000440)=@ipx, 0x17, 0x0, 0x100000174}}], 0x117, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local, 0x100000000, 0x2, 0xff, 0x6, 0x8, 0x2}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2, 0x0) fchmod(r1, 0x80) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="c141128995732307e4387442cb9f600758cecf44f41563894180809abaa49a9fa51a27f7890fce65e328edcf859aab318a17668e9a63d40705a3fb71bec9f5c2912d0cecf29b469823f893e6b49d7536092f9e9241a9ccb1108cd37b37ac9a191e4dcfcde3111965fcb3", @ANYRES16=r3, @ANYBLOB="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"], 0x288}}, 0x880) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x3, 0x6, 0x10001}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7f}}, [0x1, 0x1, 0x7, 0x6, 0x0, 0x5, 0xff, 0x1324, 0xffffffff, 0x2, 0x8, 0x9ef, 0x6ded028a, 0x8, 0x9]}, &(0x7f0000000240)=0x100) 06:12:05 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200000, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x7, {0x0, 0x0, 0x6, 0x6}}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept$ax25(r2, &(0x7f0000000240)={{}, [@bcast, @netrom, @default, @default, @null, @null, @null, @rose]}, &(0x7f0000000180)=0x65) ioctl$TIOCSETD(r0, 0x5411, &(0x7f0000000140)) [ 1884.462541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1884.479228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1884.487896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1884.498943] audit: type=1326 audit(1564467125.527:243429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1884.499235] bridge0: port 1(bridge_slave_0) entered blocking state [ 1884.530161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1884.550337] audit: type=1326 audit(1564467125.597:243430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1884.579619] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1884.605004] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1884.622513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1884.632974] audit: type=1326 audit(1564467125.597:243431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x459829 code=0x50000 [ 1884.664005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1884.671852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1884.679025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1884.687809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1884.700209] audit: type=1326 audit(1564467125.597:243432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1884.706221] bridge0: port 2(bridge_slave_1) entered blocking state [ 1884.731319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1884.750119] audit: type=1326 audit(1564467125.597:243433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1884.756829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1884.791518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1884.807016] audit: type=1326 audit(1564467125.627:243434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1884.838119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1884.849299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1884.862423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1884.873582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1884.884203] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1884.894892] audit: type=1326 audit(1564467125.627:243435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1884.926676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1884.937883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1884.951201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1884.963213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1884.980712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1884.988403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1885.004116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1885.017441] audit: type=1326 audit(1564467125.627:243436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29701 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1885.049466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1885.057795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1885.072574] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1885.079110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1885.122608] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1885.141174] 8021q: adding VLAN 0 to HW filter on device batadv0 06:12:06 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:06 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=']) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f00000049c0)="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") recvmmsg(r0, &(0x7f0000004380)=[{{&(0x7f0000000100)=@nl, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/18, 0x12}], 0x1, &(0x7f0000000480)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000300)=""/85, 0x55}, {&(0x7f0000000280)=""/21, 0x15}, {&(0x7f0000001480)=""/245, 0xf5}, {&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000400)=""/7, 0x7}, {&(0x7f0000001580)=""/184, 0xb8}], 0x6, &(0x7f00000016c0)=""/165, 0xa5}, 0x10001}, {{&(0x7f0000001780)=@xdp, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000001800)=""/138, 0x8a}, {&(0x7f00000018c0)=""/198, 0xc6}, {&(0x7f00000019c0)=""/186, 0xba}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/224, 0xe0}, {&(0x7f0000002b80)=""/52, 0x34}, {&(0x7f0000002bc0)=""/84, 0x54}, {&(0x7f0000002c40)=""/112, 0x70}, {&(0x7f0000002cc0)=""/247, 0xf7}], 0x9, &(0x7f0000002e80)=""/164, 0xa4}, 0x3}, {{&(0x7f0000002f40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000002fc0)=""/11, 0xb}, {&(0x7f0000003000)=""/113, 0x71}, {&(0x7f0000003080)=""/151, 0x97}, {&(0x7f0000003140)=""/12, 0xc}], 0x4, &(0x7f00000031c0)=""/46, 0x2e}, 0xff}, {{&(0x7f0000003200)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000003340)=[{&(0x7f0000003280)=""/150, 0x96}], 0x1, &(0x7f0000003380)=""/32, 0x20}, 0x3}, {{&(0x7f00000033c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003440)=""/73, 0x49}], 0x1, &(0x7f0000003500)=""/162, 0xa2}, 0x1f}, {{&(0x7f00000035c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000003880)=[{0xfffffffffffffffe}, {&(0x7f0000003640)=""/200, 0xc8}, {&(0x7f0000003740)=""/172, 0xac}, {&(0x7f0000003800)=""/83, 0x53}], 0x4, &(0x7f00000038c0)=""/150, 0x96}, 0x7fff}, {{&(0x7f0000003980)=@x25={0x9, @remote}, 0x80, &(0x7f0000003b00)=[{&(0x7f0000003a00)=""/255, 0xff}], 0x1, &(0x7f0000003b40)=""/113, 0x71}, 0x8}, {{&(0x7f0000003bc0)=@alg, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003c40)=""/142, 0x8e}, {&(0x7f0000003d00)=""/47, 0x2f}, {&(0x7f0000003d40)=""/1, 0x1}, {&(0x7f0000003d80)=""/101, 0x65}, {&(0x7f0000003e00)=""/152, 0x98}, {&(0x7f0000003ec0)=""/140, 0x8c}], 0x6}, 0x10000000000000}, {{&(0x7f0000004000)=@xdp, 0x80, &(0x7f0000004280)=[{&(0x7f0000004080)=""/72, 0x48}, {&(0x7f0000004100)=""/210, 0xd2}, {&(0x7f0000004200)=""/90, 0x5a}], 0x3, &(0x7f00000042c0)=""/150, 0x96}, 0xfffffffffffffe00}], 0xa, 0x0, &(0x7f0000004600)={0x77359400}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) write(r1, &(0x7f0000004700)="dc315079ef048e28ab45ffa35b28ad378513eaf1f815ff33e4758c865936471737372fd6209f8447bc39f1d8dfe00ff9d0cb63de506b4b8cdc97d4cadf34e9292a707c68058acac33b1c0e68d536cf33245eea85f9d2dab7be25a96caeffc92625849f877cbc98d3641e2386ec56d62c0bae64cd855a7a7f6cd33bf96c62a96b333616257ec282659beaea03bde49bff00f0b358e2d991f600222312c4b59cf7a11463ac95f01caa5d7818406b43fd3f7b2e0fe4ca45c6b2ae701d75d561110126a7b650f618", 0xc6) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005080)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="e14d831f006f8b934df0174a1d530f977311cd9c044813689e583b9b03b48a879d3d2039914263dd6d9df76a8a96121c0a817c02", 0x34}], 0x1}}], 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000004640)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000004680)={0x0, 0x800, 0x3}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000004800)={0x0, {0x3, 0x1}}) mount(0x0, &(0x7f0000004840)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 06:12:06 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xe38, 0x11, 0x0, 0x27) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) [ 1885.495033] SELinux: unknown mount option 06:12:06 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1885.558761] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xe38, 0x11, 0x0, 0x27) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) 06:12:07 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) removexattr(0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r5, 0x3, 0x0) 06:12:07 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1886.207268] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1886.242951] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:07 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000240)=""/92) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) r4 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r4) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x90) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000180)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x1ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000140)='westwood\x00', 0x9) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 1886.279691] SELinux: unknown mount option 06:12:07 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES64=r1, @ANYRESDEC=r1], @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cfd62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd2600090e5e83222a4fc1f4e5b8783af78ccdc56bddd8a515046ddf2333b37343067c6a9da051dd82abe2312e3266a8acc62599c2f5a1e5d8f7334aa1ec93ca1d40b821fe4b20b4a6ed7897b1f40602b5b2277665cae218d8ff456651507c3a072557bdf1cd67cfd58b08b1a5ef1b806f4bcb979e9b606456d39fea15cb6918798e4dc3154d6110aeff5420f13d053c1c81b1a90a4d1f85db14"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x3031022, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r5, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x200000000000000e, &(0x7f0000004fe8)=[{0x9, 0xfffffffffffffffa, 0x48b8000000, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) r8 = shmget(0x1, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(r8, 0xe, &(0x7f0000000500)=""/161) ptrace$cont(0x18, r7, 0x3, 0x0) [ 1886.397289] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1886.414570] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:07 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1886.638038] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1886.795501] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1888.491280] device bridge_slave_1 left promiscuous mode [ 1888.496777] bridge0: port 2(bridge_slave_1) entered disabled state [ 1888.560756] device bridge_slave_0 left promiscuous mode [ 1888.566231] bridge0: port 1(bridge_slave_0) entered disabled state [ 1888.622439] device bridge_slave_1 left promiscuous mode [ 1888.627920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1888.661118] device bridge_slave_0 left promiscuous mode [ 1888.666582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1888.812956] device hsr_slave_1 left promiscuous mode [ 1888.854505] device hsr_slave_0 left promiscuous mode [ 1888.894900] team0 (unregistering): Port device team_slave_1 removed [ 1888.904674] team0 (unregistering): Port device team_slave_0 removed [ 1888.914494] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1888.963475] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1889.025266] bond0 (unregistering): Released all slaves [ 1889.111942] device hsr_slave_1 left promiscuous mode [ 1889.172883] device hsr_slave_0 left promiscuous mode [ 1889.224693] team0 (unregistering): Port device team_slave_1 removed [ 1889.235409] team0 (unregistering): Port device team_slave_0 removed [ 1889.246116] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1889.285344] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1889.345692] bond0 (unregistering): Released all slaves [ 1892.300284] IPVS: ftp: loaded support on port[0] = 21 [ 1892.689364] chnl_net:caif_netlink_parms(): no params data found [ 1892.720226] IPVS: ftp: loaded support on port[0] = 21 [ 1892.732926] bridge0: port 1(bridge_slave_0) entered blocking state [ 1892.739336] bridge0: port 1(bridge_slave_0) entered disabled state [ 1892.747826] device bridge_slave_0 entered promiscuous mode [ 1892.757384] bridge0: port 2(bridge_slave_1) entered blocking state [ 1892.763927] bridge0: port 2(bridge_slave_1) entered disabled state [ 1892.771201] device bridge_slave_1 entered promiscuous mode [ 1892.802637] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1892.815125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1892.842233] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1892.849278] team0: Port device team_slave_0 added [ 1892.857498] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1892.864696] team0: Port device team_slave_1 added [ 1892.869977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1892.884862] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1892.944351] device hsr_slave_0 entered promiscuous mode [ 1892.980465] device hsr_slave_1 entered promiscuous mode [ 1893.020850] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1893.032048] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1893.087882] chnl_net:caif_netlink_parms(): no params data found [ 1893.112526] bridge0: port 2(bridge_slave_1) entered blocking state [ 1893.118926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1893.125623] bridge0: port 1(bridge_slave_0) entered blocking state [ 1893.132166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1893.166298] bridge0: port 1(bridge_slave_0) entered blocking state [ 1893.172828] bridge0: port 1(bridge_slave_0) entered disabled state [ 1893.179730] device bridge_slave_0 entered promiscuous mode [ 1893.188187] bridge0: port 2(bridge_slave_1) entered blocking state [ 1893.194682] bridge0: port 2(bridge_slave_1) entered disabled state [ 1893.201595] device bridge_slave_1 entered promiscuous mode [ 1893.224868] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1893.234475] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1893.257005] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1893.264351] team0: Port device team_slave_0 added [ 1893.274967] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1893.282103] team0: Port device team_slave_1 added [ 1893.287582] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1893.295042] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1893.312229] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1893.318309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1893.383902] device hsr_slave_0 entered promiscuous mode [ 1893.420577] device hsr_slave_1 entered promiscuous mode [ 1893.462235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1893.471589] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1893.479429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1893.486590] bridge0: port 1(bridge_slave_0) entered disabled state [ 1893.493588] bridge0: port 2(bridge_slave_1) entered disabled state [ 1893.503586] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1893.514081] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1893.520363] 8021q: adding VLAN 0 to HW filter on device team0 [ 1893.537557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1893.545607] bridge0: port 1(bridge_slave_0) entered blocking state [ 1893.551996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1893.561574] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1893.572294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1893.579928] bridge0: port 2(bridge_slave_1) entered blocking state [ 1893.586312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1893.608947] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1893.618764] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1893.629504] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1893.636751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1893.644763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1893.652615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1893.660585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1893.668700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1893.675744] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1893.684830] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1893.702336] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1893.715125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1893.754921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1893.765670] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1893.774956] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1893.781557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1893.788438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1893.798944] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1893.805354] 8021q: adding VLAN 0 to HW filter on device team0 [ 1893.818024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1893.825803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1893.833891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1893.841945] bridge0: port 1(bridge_slave_0) entered blocking state [ 1893.848492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1893.856524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1893.866038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1893.873517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1893.881757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1893.889682] bridge0: port 2(bridge_slave_1) entered blocking state [ 1893.896115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1893.907336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1893.914853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1893.925907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1893.936707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1893.948810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1893.958799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1893.969388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1893.982162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1893.995931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1894.009862] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1894.017947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1894.026318] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1894.041726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1894.051462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1894.058308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1894.066452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1894.073764] kauditd_printk_skb: 489 callbacks suppressed [ 1894.073772] audit: type=1326 audit(1564467135.357:243926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1894.110682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1894.118300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1894.133046] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1894.139090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1894.151222] audit: type=1326 audit(1564467135.367:243927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1894.186537] audit: type=1326 audit(1564467135.367:243928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1894.193795] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1894.216043] audit: type=1326 audit(1564467135.367:243929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x459829 code=0x50000 [ 1894.225346] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1894.249692] audit: type=1326 audit(1564467135.367:243930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1894.275446] audit: type=1326 audit(1564467135.367:243931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1894.301142] audit: type=1326 audit(1564467135.367:243932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1894.325967] audit: type=1326 audit(1564467135.367:243933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 06:12:15 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:15 executing program 4: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000002c0)=@add_del={0x2, &(0x7f0000000200)='dummy0\x00'}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x80c00, 0x0) accept4$nfc_llcp(r1, &(0x7f0000000380), &(0x7f0000000400)=0x60, 0x80000) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x40000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="3002e7d002c5fc3a37feed7f0d83f0d8ab", @ANYRES16=r3, @ANYBLOB="04032abd7000fcdbdf250d0000001c000200040004000800020081000000080002000100000004000400"], 0x30}, 0x1, 0x0, 0x0, 0x1647b9b4042561b4}, 0x20008000) bind$rose(r2, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r5, &(0x7f00000000c0)="274926243f9e89f3b483223234a68cdfe9fa44ec65fc4a97275835dd2057d8c2adb5a59e975b3d9d34a2e1835bb447a652becf05cba612dd7b833a582b0b8ab0797c878cf1f5c9f5937394b5f27a1118", &(0x7f0000000140)=""/27}, 0x18) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000340)=0x321) ioprio_set$uid(0x2, r6, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000440), &(0x7f0000000040)=0x4) 06:12:15 executing program 2: open(0x0, 0x0, 0x1) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x400000000) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)=0x10001) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) fchownat(r1, &(0x7f00000001c0)='./bus\x00', r3, r4, 0x1800) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000440)) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x5, 0x3cca, 0x6}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000580)={r5, @in={{0x2, 0x4e24, @remote}}, 0x32c8000000, 0x6, 0x283d7165, 0xfffffffffffffff8, 0x1}, &(0x7f0000000640)=0x98) 06:12:15 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB="6d6f64653d303030303006c9c22d9c23c7e2f58e30794629303030303025303030303030303030342c6d6f64653d3030303030303030303030", @ANYRESDEC=r0, @ANYBLOB='\ruid\x00', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000700)='./file0/file0\x00', 0x122) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) renameat2(r3, &(0x7f0000000500)='./file0\x00', r4, &(0x7f0000000580)='./file0/file0\x00', 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) removexattr(0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000008f00a52cd4e038234ec3000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r7, 0x3, 0x0) 06:12:15 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1894.351444] audit: type=1326 audit(1564467135.367:243934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1894.376340] audit: type=1326 audit(1564467135.367:243935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29786 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1894.441763] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1894.502017] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:15 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:15 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:15 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1894.787594] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1894.857280] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:16 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:16 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) recvfrom$packet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:12:16 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00400000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:12:16 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:16 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1895.228683] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1895.370703] device bridge_slave_1 left promiscuous mode [ 1895.377927] bridge0: port 2(bridge_slave_1) entered disabled state 06:12:16 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:16 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0xffffffffffffffff, 0x0, 0x3, 0x3f) [ 1895.491394] device bridge_slave_0 left promiscuous mode [ 1895.498504] bridge0: port 1(bridge_slave_0) entered disabled state 06:12:16 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r5, 0x40106614, &(0x7f00000000c0)) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:12:17 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1895.756089] device hsr_slave_1 left promiscuous mode [ 1895.815451] device hsr_slave_0 left promiscuous mode [ 1895.854693] team0 (unregistering): Port device team_slave_1 removed [ 1895.883263] team0 (unregistering): Port device team_slave_0 removed 06:12:17 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f00000001c0)=0x1f) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'ifb0\x00'}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2001880}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040000}, 0x20008000) r2 = socket(0x22, 0x2, 0x4) ioctl$IMGETVERSION(r2, 0x80044944, &(0x7f0000000100)) [ 1895.922237] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1895.987181] bond0 (unregistering): Releasing backup interface bond_slave_0 06:12:17 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x8000, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80, 0x0) lsetxattr$security_smack_entry(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='security.SMACK64EXEC\x00', &(0x7f0000000240)='keyring\x00', 0x8, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0xd9c8) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000280)={0x401, 0x1ff}, 0x2) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x20000, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x5004, 0x0) [ 1896.231994] bond0 (unregistering): Released all slaves [ 1896.338152] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1898.980184] IPVS: ftp: loaded support on port[0] = 21 [ 1899.353063] IPVS: ftp: loaded support on port[0] = 21 [ 1899.360932] chnl_net:caif_netlink_parms(): no params data found [ 1899.437072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1899.443915] bridge0: port 1(bridge_slave_0) entered disabled state [ 1899.451235] device bridge_slave_0 entered promiscuous mode [ 1899.462579] bridge0: port 2(bridge_slave_1) entered blocking state [ 1899.469458] bridge0: port 2(bridge_slave_1) entered disabled state [ 1899.476479] device bridge_slave_1 entered promiscuous mode [ 1899.499216] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1899.508691] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1899.532928] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1899.540520] team0: Port device team_slave_0 added [ 1899.546102] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1899.553671] team0: Port device team_slave_1 added [ 1899.559314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1899.567011] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1899.652433] device hsr_slave_0 entered promiscuous mode [ 1899.700497] device hsr_slave_1 entered promiscuous mode [ 1899.771662] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1899.794406] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1899.812296] chnl_net:caif_netlink_parms(): no params data found [ 1899.852302] bridge0: port 2(bridge_slave_1) entered blocking state [ 1899.858697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1899.865352] bridge0: port 1(bridge_slave_0) entered blocking state [ 1899.871732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1899.905773] bridge0: port 1(bridge_slave_0) entered blocking state [ 1899.912256] bridge0: port 1(bridge_slave_0) entered disabled state [ 1899.919090] device bridge_slave_0 entered promiscuous mode [ 1899.926568] bridge0: port 2(bridge_slave_1) entered blocking state [ 1899.933050] bridge0: port 2(bridge_slave_1) entered disabled state [ 1899.939934] device bridge_slave_1 entered promiscuous mode [ 1899.963799] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1899.977098] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1900.006151] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1900.013435] team0: Port device team_slave_0 added [ 1900.019072] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1900.027057] team0: Port device team_slave_1 added [ 1900.077104] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1900.086293] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1900.132330] device hsr_slave_0 entered promiscuous mode [ 1900.180491] device hsr_slave_1 entered promiscuous mode [ 1900.227105] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1900.234586] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1900.248868] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1900.256980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1900.267993] bridge0: port 2(bridge_slave_1) entered blocking state [ 1900.274396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1900.281101] bridge0: port 1(bridge_slave_0) entered blocking state [ 1900.287438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1900.297063] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1900.313996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1900.321903] bridge0: port 1(bridge_slave_0) entered disabled state [ 1900.328553] bridge0: port 2(bridge_slave_1) entered disabled state [ 1900.336190] bridge0: port 1(bridge_slave_0) entered disabled state [ 1900.343059] bridge0: port 2(bridge_slave_1) entered disabled state [ 1900.351521] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1900.361005] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1900.367075] 8021q: adding VLAN 0 to HW filter on device team0 [ 1900.386083] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1900.396871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1900.408111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1900.416424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1900.424194] bridge0: port 1(bridge_slave_0) entered blocking state [ 1900.430579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1900.437834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1900.446068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1900.453810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1900.460209] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1900.468910] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1900.482419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1900.495382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1900.503477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1900.513223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1900.523160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1900.531993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1900.539652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1900.547582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1900.555203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1900.565758] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1900.574517] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1900.581990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1900.589431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1900.600469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1900.611481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1900.618987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1900.628687] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1900.634888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1900.658320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1900.668189] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1900.678174] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1900.689505] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1900.700478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1900.707357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1900.717435] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1900.724444] 8021q: adding VLAN 0 to HW filter on device team0 [ 1900.736815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1900.744829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1900.755850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1900.767321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1900.778514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1900.786347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1900.792761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1900.799802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1900.808281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1900.816119] bridge0: port 2(bridge_slave_1) entered blocking state [ 1900.822509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1900.832098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1900.848982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1900.859494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1900.866852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1900.877061] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1900.888366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1900.895320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1900.903603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1900.911647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1900.919446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1900.927606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1900.936801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1900.947918] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1900.957767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1900.965261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1900.973646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1900.981470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1900.991337] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1900.997355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1901.013335] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1901.023634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1901.140461] device bridge_slave_1 left promiscuous mode [ 1901.145954] bridge0: port 2(bridge_slave_1) entered disabled state [ 1901.200976] device bridge_slave_0 left promiscuous mode [ 1901.208870] bridge0: port 1(bridge_slave_0) entered disabled state [ 1901.249995] kauditd_printk_skb: 560 callbacks suppressed [ 1901.250009] audit: type=1326 audit(1564467142.537:244496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1901.280677] audit: type=1326 audit(1564467142.547:244497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.306524] audit: type=1326 audit(1564467142.547:244498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.332352] audit: type=1326 audit(1564467142.547:244499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.357951] audit: type=1326 audit(1564467142.547:244500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.390739] audit: type=1326 audit(1564467142.547:244501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.415621] device bridge_slave_1 left promiscuous mode [ 1901.421596] bridge0: port 2(bridge_slave_1) entered disabled state [ 1901.428552] audit: type=1326 audit(1564467142.547:244502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.459071] audit: type=1326 audit(1564467142.547:244503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.484444] audit: type=1326 audit(1564467142.547:244504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.509452] audit: type=1326 audit(1564467142.547:244505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1901.556478] device bridge_slave_0 left promiscuous mode [ 1901.570705] bridge0: port 1(bridge_slave_0) entered disabled state [ 1901.813040] device hsr_slave_1 left promiscuous mode [ 1901.875207] device hsr_slave_0 left promiscuous mode [ 1901.936248] team0 (unregistering): Port device team_slave_1 removed [ 1901.957074] team0 (unregistering): Port device team_slave_0 removed [ 1901.978188] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1902.033399] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1902.107298] bond0 (unregistering): Released all slaves [ 1902.203028] device hsr_slave_1 left promiscuous mode [ 1902.244614] device hsr_slave_0 left promiscuous mode [ 1902.283198] team0 (unregistering): Port device team_slave_1 removed [ 1902.294048] team0 (unregistering): Port device team_slave_0 removed [ 1902.303517] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1902.353632] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1902.418423] bond0 (unregistering): Released all slaves 06:12:23 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94c"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:23 executing program 4: socket$inet6(0xa, 0x2, 0x41e6) 06:12:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x44, 0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="020f00050300000047b4a97faceb019076c7fd135cbaed07e25659fe0ac17176dbcecfe1c658ebce57197cb7c4a6eb35e200e0a0f7c128b3c82528b41cc01388bd64611ce23b87c04387baaacc039fb245cde4025a9c21f7cca15950935a16a246d61f3c14b2d8c4430cbed0134e254fe167a466d4f2a21bfd7c85ed87c8f5de304dc9f5ecd50aae5351406a4fc00f2602d4c52bad50719e3895d083e82a8d0c43852afd67dd0df51ba016eb4ccf8103ed459aa58769c670c08a7f702d8537cb2fc4859f6aaf16225035651958"], 0x10}}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f00000002c0), 0x44f) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) unshare(0x40401fc) r4 = getpgid(0x0) read(r2, &(0x7f0000000200)=""/168, 0xa8) r5 = mq_open(&(0x7f0000000300)='\x04\x00\x00\x00\x92\r\x00\x00\x10\x00.\x16\xe8\xc2p\x12v\xc5\x92\xbf\xbd\xca\x19\x1bw|E\xb7m\xd2', 0x6eb3ebbbcc0884f2, 0x0, 0x0) mq_notify(r5, &(0x7f00000001c0)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f00000110c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000100), 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mq_notify(r5, &(0x7f0000002940)={0x0, 0x3f, 0x4, @tid=r4}) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000006c0)={&(0x7f0000000600), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r6, 0x902, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40004) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) 06:12:23 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0xffffffffffffffff, 0x0, 0x3, 0x3f) 06:12:23 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cfb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) r5 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$nfs4(&(0x7f0000000340)='nfs4\x00', &(0x7f0000000500)='./file0\x00', 0x400, 0x6, &(0x7f0000000940)=[{&(0x7f0000000700)="2c05365c9f7970e98ab2279107a11859f3bbc6206a30e1dc84b88aca04d39cb0d1f9c7b6df4e192fdbafdfed3f491b907f23662fdef06d4d19df52671fa2280978f72173926c601c0a255400aa688ef151e32d438c5d4396c98dfd7a2e875362e787dbeaf3b62577ae9550b6108cca72e72ecfa57cfa7ceaeafcce514125ceb58fed2a797f132605f79319ab707eae45c30095d2011058c084243a905e25af693619285c81566984adf93f396aaffae2ae8c", 0xb2, 0x9}, {&(0x7f0000000d80)="2a3d36844aa70ae5a646889e86c7c5b42bdd93c74436fb18d091b69e55cc9329997b0822a8c732c68ab99ef0f946493c46899282251b22fda928c0ea636832a071d0d38d5f57588f1c285d281b66af534cb6b692a53e1f36096dfa6721cbfe33cbeb13be6917bb31063991d9d3c7ee38176452e19dc35f5bc235b221d212afa11bdc03ef652d23538ac635e1d4361e83160272902f96e45aa10d8c6a14e8abd1c4c053bce5ef1e37f951697c20156fcfee5b91d3181da3fac750b08ad9a870ab3478c8c5a06f690298513fceac7f7b43c295f63c1ffa06d8d1fe450f7b33356d9fc385326dafacb850fdabc2b0973f359e2fe37233ae7032f846c47f49385e12cda4a44cda28410ba2a2180ea7d987fc39673c1601173a848b99f9a4cf4a48af64e8f33697b6b97fa6cd4d9da45731bffa966c84afbcccae56a618a16546b5a75ea0bb194a3e159c60c02d2e6ef2ceaaee041cac887ce493128e5882275388e9874a05d4a7d064d2874da493feabce316c28a56f369526fda5791ab366da481160132a95868376375414814b8c18f53651604644733cbb3463b4efe0a84401c123b8d548eee2c3e990fdac06dbfd725df855c8f5d53fe2d9fe1abc9a5dfc99285ab8606570c8ee9dc27e2ffea409841f8b21b712e030ee8d68c72f2f3bf9995a952ab499642972fefa4590b26f983d5bc2a06eedc05e0190e5938a09054760cd32195e6ac59695f80ee3397ba4c0e7f46384b530164d106fda471f128b91c384ca8ba962e4b7a728ae04180ccad442dcc8105871e4dd7aba1479ce5df665dc55fa8af4913318f3e5d7b2286e0be9f3aee6980a6b142ceca25504773c2ebcfaf8e82489675392628ada9a2cde49ec07b3c61b12490aa2e835643decfa6092d568ac754a4d36685bb0b7446a14f9af178f9bf2964fb0a8801f5f15fee4b3beb8660724eda59bcbccd75dc0dd0a4657984e78d94b7b860d18cc568a65cdd2d9313d480c13310d9170e81390f48f614c35b08dad9afd28cf24b1d274a0021054aa9ffc8f111c3f038478549ea803665a7db05d08bbe4304883130b87b0a49b1b6a021b165c54dcde96fae14e10ab1e75164f29c4ec768769905d48be6e1323146c1b6c2b49559f8050a8c11915cb9206d58519c1c7c85ceb8f7926f41494400042e29f4d42c6219195cab7c03b7ef5369a7a85ddfc2740a44beb2c9b3171a669fcc1538ae4e59455378f456e131e15b5b9335f253a8a7e8e17ee23d33ffb28929b6c9cb951aaffc3228f02b1db90519251cffe18f9fa0a0216b157cfe6d05aae57752f560ce08ec545e1e08d436dd78169a76b23d17622805fde66b543045dcf4020987dadf24cebe0a01afb1e6379a00a9e66ed7c49c6338e16622d435a69a95d95c4b74220809e0678c554bf2c1a068bfbff42d38459fb38e82d437e5148681ba0693350aac7f3321311b88e8ba20d786257e30b3293bfb894159de86ea8b89d710889295c3e760653dc78bd131da734f73d243d2a868e0eb86ff14951c52b616ab0ce5a2cf2cfe98abeb6a7842d7e5b04820d3b022422217a5e42c941c55604cd94e348c2bdd69c59cf6617d5318e5d5f4509bbfb32a4c512d764819eb0d83a83bf08871f4226b6c6f33ce00ad06b6e647cf42b36877a7d3608d10ed2f62de84c5af2aa2c12fde8ed647f3df1b94e5d3d0d3ac1200d7b679be658c9722ad17a51cbf48b2409850a397992938cf16582063baac6b894342144dd06f57ef64e09b713b03bb2b122e3455acd423c0a8038f8885a07f2c901be668ec43973ebd36d9220ede86f5025d296a90a4ec5a8e0b69379b4afd7b8dfc0899e77856065d34bc16f6b1418c403a8cb240a2c4abadd692a1ea287522c6227d9c77c7acd67c84730864e417d2e0b07625718f5afab42dbbe736cb38a7576e3f5116e5b429f9780771bdf6218e1bb1d02c96eeee8b7dca52d918059d02c4e34e4183d7a3bea9da9ca8b8f5e5b7c834c862bed2f13a5865e534487d1e40ad19fdcba07d0200b124d0eb2bebb4cc71c4435f7434f040891a86d2a561aead15ee9148995f0e45ab60fb1c8f21f5575440aac09fa77df28e305da76067f09b220732e0cb88ebc1e8cd21ec08d54c67bb6c323f5b9974611471e07d00cab46b5c8d43b14409d9deb61f6674e943b95b80fe39ff3d23210f5547ad9b6f1630befaf03394cec0eab94e8004f1027a6fbc2987fda84bcdaff016f71b1afebb4db4c521a0bf9686596f417732de261c308f133dbed2e87a994d4f2c447735ad29a7866f334a6d5693d17c6e244f2c3167a7ea78af5ad9ffafd5018fad75a2611f5d89a4f32a0b2dc96a1554daeb7badd984733a2105dd55097e31e95e7eec9b9e5e98a3bbc77743ef53e06f00e229fb3c4b3f45c5e93618cfe9e6617cf1bedc1df6fe897a278c185155a0c5e3c517219d8c16db7b87aa06a2272b81655ba83ee52f93a57e2118a9928b76267c4e2fd26c13069e6676becc35e278cf14f13ecc3dc40f9edcbf4048b8d74f99478fa7a39bd439db638ba523157eb499f04a110b448101fabcaf7bd445de16fa646ce41166c90fae87ccbdf78ff1117ef3cf9d7df3b2fe3dc5de1793bd14d0a278462eb9e66fe309874d83ba46f172c0ffc88e9538d09af9969b267fb94684185e4345cca23bf4bfd9c3ef49a111dce5a5cf8a19ace5a3f31286c33005fd19bd969426f3fd5f98065743dccfc97740a806c503f0d09fa6f0c698dd7a3b75f2a4f1c352f46e7f0f0ec93d46c24e9371ac5647ad52a283a97e96dcdeea42b951ede33ae7d06a29b8ceb601166aa3cf1003aefbdaa434527f552d0f5f4dc55c01c82a2e419de6ad546c082cf409e3eae16b6ac4bb4e23193d045a16e3c0dce71759aa30dce398af9852fe50f4408941e1d66becf15650a1b2cb23fcdab368b0dfafa67f6c1652a8d1bccb4c46e9c6c40e7491c4d4d4bc98d0429f535599c978ce336b0c94e9e5bf1f307d11778c04c186c11f7910d31532fd26badb476d990d10d945e90c37f0b9ced4f8d3be578f0e9e31b3cd59867bad2c38449894da02ffa1e1d6b849f9c5d66da1ab5e5473201cf434c8955f74a8b28138c5fdca263f0aee73862cd1347fe3dd65c3bf0366c77aa2371c27608c9be4ee32493683ea93cb01a5fb7279150a8d0c48c960dc7ecf4438ff6385ac073de3ceabe8b12eefd4b913faef2aa9b428a79c906afa5468cbf735503716b9efec8f4110238f70e35dd449f25d84cff799525f02ed803fb3aab358944b691cfaea8739028a8a6945963a07c5ab730e9ed2777d3e42ce038cea8442450b5ebe4145f64e4fddd3f5d9654cfa8ab2c1a730f7b32736b94e2f8b8c4247e324a9d8c2bde55dfbefcd6a2063546ace40c72cacb74f1e50b25ffe6cdc4da7111366e450c8f2b47b7464b80425a608f29e97eeb05f8b4bb3f5029024cb146ea5a164264dacb414237fb2f2118800cf6c7af74f35e48bbc187659b81127a1dbee3c14b21a051aed63f0fa2ebcbd4b93007a61e402c890a4b8063870350c70a0b775858c25faae801edf8c90e27bd8f1df938a899966c5fa25ffb580f85715612acfe31b7a53df98533938649feebe9c27139a1b185efb9e1a4d7a41cf86df70a03a0ae7628b32d0f5dfbc7a726cfca13bcf334977249355ef1390f50d14b63db6c1862742f151cc9a4da21bc8e8ec4c7c634ceca4fe9a62567cd1edd9c446a8555f7e1fca4a34c7714dad0efc62939bf214018d717246384c5ce40de372553ac6bb421d8d4e7a1a425d9d13672dbbed5d908f8d4709aabf8fc7cb5e8ed8341a9ac7736c9b592fcdeb175a9c599d9957d9b2365e0bfccbf48144f73ef6e31ec1eee58bca5478d1b266f3cdb7412e387b21c7484cb2d3d3efd647bf41bdcb5b8d46ddd3f86fbff4c8e9509b028334be52776fbf7f420c68402b7d240fc10f601dca64e30f325bf7feb023b9ebb0034588e74791278b6e21356c024caf2c1a80f5b85e8416b70d4d3de750d154e58a88756c12b31fe1ff878b9a66bc3b49c6a5fc04c16b4a775af34f4ea04280c9b638b11cd17b3a5fea8de22794920ad7b01e4c83831d2cd9344fba85d5fdb54bae1e3905ea1f65a92c9937a5017d50b9bfbb37e75b30fc7808ab58c2d6b639a41d7a1ae649c9d0fff4cbb86d005129fdeb6ff0e8ac4ed0c33d47ea8d63cda4b3cbc2bedd6c7ea4645e7066773946d628abd57c7c738b090bf15ac7d44eaf27a25b4ded12a6123881a3972274c6e22a838ec5499e98bb9915b5885f643affb36753c45e1beebc9447eb0bb8cdebe0bfdda79353f3db95fd2c06109bcfde6f3587c1cedc88b1a418e3ce08006509dbcb0361df33c4fc09bb3ca64b95365631096c77bd91702a3296ef47a1f5441fd10661562b4feae19ed91a907fa65b2707aea722c8758f8f4af4a14d55293f04313ae7df1753710ffce58e3f82d11b6ff931e9965c45601d9e358bd4c26a080027bd3c2b2ebe7300d181e0ebfd9f17618bffcda650e6f72aa4b8211b5e9a6c63cbc34e5a5b30ec6c710cc241c165f60f2c2a02da37dc643598f3df6dafae676f51a7690a74281e4b7c48eea915f1b414483348cc47c7908e010c7b5239a714c85c9299f786149854c39f86fbbdd97001ea49584f7c12da2e15f292b06518272f997e9bab6e6f259f4b57ed77a8e6c018884a5d66ff6d063a39a1f9e7faa1d0b71d56289693adc2148c0891b5707ef432c12ce94bdd010b0d48bc8f009611dcf5a7eec4b7f5047f4422a246d4108b55ef22544b1fb892afaa60e0e572d09b138f26c8ae173082ea628e7d40a93c054cf8eff13e3d680e9b12278843af74eee3680f254c7a8c1493e4344532c902a9bad9651d37c4909ac12610c371786797f5d3acc5b663a255b862752c03146a9d4abee48589871b680257a6d0e74033f8fa981a03da2126bb6f816272381f1835845514ad5577437a023da1256587d0cb032174f1f303f43f22c18a790516aafc7dcaf1f0b004126c6e5235b39442a41ae9d12bd834b84064cf290ed93feaaaf27be4c45d4a5e5a3bcb9433bfb66dde201006fea0e622e36be09133459344afdef08fdebfa16673a653d45d0dac28e7e545e66d54bbbe857b99b6a66e62175ffa5cdcb91f42890610e32be86a8d428cee7736aefffbde73bc7e45978cf6f60e907972c4ae9a6cf3b9449e8b624b58b9a11f28b3e3531d613cfaa4dd642e9f34ab4524616bacfa1bfc3ed68b139ce4ce46c98befc66353048b7c600f2b53e11eb2befd7243e87ee921e4f3571669683d99917be9dc6490da9c780f4d25006a215f58f3ca03aa366686d8fdb6ee46fa791035ac0240c87425b68ae3bf92016316f82c8f2132a853faeb69d779ab9463a11750399e305b0b44fed8df5ef80565b89a2a15fb2eb27c94a4aa682cde36df990251dd9c3d57ce86788747dd2258dc5f8244584a476d3dfa73f9e19dae97dcebc4974d1268a7377b1c0b1773d4096a0267f7203fb59427d16fa9afa9491ed72f7719e65b44baa0e83ba03e83d5e236394cf6ff70fc56eb4b79e6a7e78164e1a7df5786d8ed452e1ab5ddd0971d27bbd7add3d045ad2f301e6c3a43515c64b4a111a0fd13262391fe8b406178d1e7ad701425ebd02ad62bf5a425ed40e4ae248c3231e5b6106b1901d3847370a7cfa56d8a92717d2809dcaf75aeaf8790d4755914b76819067e264b0a7b0d42f9b759a423e99ac94a05690ef6ec9ba7210a68fb0ccbc944d7964ab9a34ddef38cbffef0ebd644bf17b7667357567fa", 0x1000, 0x6}, {&(0x7f0000000540)="419d54fd937f4360cda54fd4f051d67667ae1a4ab3898a6386d42ba399752b3b95a4d4b6", 0x24, 0x80000001}, {&(0x7f0000000580)="9598f894dd27cc993d96e30cb1816ad74ec3912f8747dd49ca098a878d933c9c9ab6bee3395a314ecb3cfe3ee3", 0x2d, 0x7fff}, {&(0x7f00000007c0)="f3a572c1b29fd8ac614c0986f26468a43c8d46e8a2aee43460fa11d943124f15bb4bba812d0a1c363c4af0dee5a0c55bf39b2d1b738cc0624748be75ad4dbcc0949d863e9cd6a37eaacc505a4f694408d5ed246620fe5bc0079468ca34664d0456b09aa1a7c03a62019209e4918d3b6009a2", 0x72, 0x14da}, {&(0x7f0000000840)="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", 0xfd, 0x202000000000}], 0x80000, &(0x7f0000000a00)='trusted.overlay.redirect\x00') openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800e600000000020000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000a40)={0x0}, &(0x7f0000000a80)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000ac0)={0x6, 0x10, 0x820b, 0x8, 0x2, 0x0, 0x5f, 0x2, r7}, 0x20) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r8, 0x3, 0x0) 06:12:23 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1902.472291] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:23 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x800000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x5f, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}}, r1}}, 0x109) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101002, 0x0) dup(r0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x0, 0xfffffffffffffbff, 0x1, 0x9, 0x3, 0x7, 0x0, 0x6, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000002c0)={r3, 0x6e, "776125667762fbe25f1885ee8085cd76be610fdf13d968acd5901e1c65697819fbe44bd980f60fefd65e4af38b73cacac7f4e9dd7eedd9f526c4d89f1097698fcd30160ef0128bbb71d098b08d13e17795b8e6b12ee5bf9f2685099a2295d89f301d5264e2bc6fb8a05cf41327fc"}, &(0x7f0000000180)=0x76) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) 06:12:23 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94c"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:24 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) [ 1902.667294] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:24 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @initdev}}, 0x1e) prctl$PR_SVE_SET_VL(0x32, 0xd63e) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xd0b9, 0x2) ioctl$RTC_AIE_OFF(r1, 0x7002) 06:12:24 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0xffffffffffffffff, 0x0, 0x3, 0x3f) 06:12:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/190, 0xbe}, {0x0}, {0x0}], 0x3, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) timer_settime(r2, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f0000000000)=0x6) dup2(r3, r0) tkill(r1, 0x15) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/validatetrans\x00', 0x1, 0x0) 06:12:24 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94c"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:24 executing program 4: acct(&(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x2, 0x400001f}) [ 1902.882881] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe2(&(0x7f0000000040), 0x84000) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000000)={0x1, 0x0, [{0x0, 0x0, 0x81}]}) [ 1906.190238] IPVS: ftp: loaded support on port[0] = 21 [ 1906.501796] IPVS: ftp: loaded support on port[0] = 21 [ 1906.547313] chnl_net:caif_netlink_parms(): no params data found [ 1906.604089] IPVS: ftp: loaded support on port[0] = 21 [ 1906.629275] bridge0: port 1(bridge_slave_0) entered blocking state [ 1906.635830] bridge0: port 1(bridge_slave_0) entered disabled state [ 1906.643126] device bridge_slave_0 entered promiscuous mode [ 1906.657793] bridge0: port 2(bridge_slave_1) entered blocking state [ 1906.664343] bridge0: port 2(bridge_slave_1) entered disabled state [ 1906.671713] device bridge_slave_1 entered promiscuous mode [ 1906.714421] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1906.734611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1906.807743] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1906.816114] team0: Port device team_slave_0 added [ 1906.825232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1906.832633] team0: Port device team_slave_1 added [ 1906.838158] chnl_net:caif_netlink_parms(): no params data found [ 1906.852519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1906.879797] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1906.994093] chnl_net:caif_netlink_parms(): no params data found [ 1907.042800] device hsr_slave_0 entered promiscuous mode [ 1907.080476] device hsr_slave_1 entered promiscuous mode [ 1907.120755] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1907.127507] bridge0: port 1(bridge_slave_0) entered blocking state [ 1907.134086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1907.141202] device bridge_slave_0 entered promiscuous mode [ 1907.159284] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1907.167482] bridge0: port 2(bridge_slave_1) entered blocking state [ 1907.174033] bridge0: port 2(bridge_slave_1) entered disabled state [ 1907.181477] device bridge_slave_1 entered promiscuous mode [ 1907.224483] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1907.246018] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1907.255080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1907.261492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1907.268082] bridge0: port 1(bridge_slave_0) entered blocking state [ 1907.274486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1907.303752] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1907.311454] team0: Port device team_slave_0 added [ 1907.326984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1907.335293] team0: Port device team_slave_1 added [ 1907.340812] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1907.348255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1907.355945] bridge0: port 1(bridge_slave_0) entered blocking state [ 1907.362719] bridge0: port 1(bridge_slave_0) entered disabled state [ 1907.369618] device bridge_slave_0 entered promiscuous mode [ 1907.435147] device hsr_slave_0 entered promiscuous mode [ 1907.490564] device hsr_slave_1 entered promiscuous mode [ 1907.531775] bridge0: port 2(bridge_slave_1) entered blocking state [ 1907.538168] bridge0: port 2(bridge_slave_1) entered disabled state [ 1907.548096] device bridge_slave_1 entered promiscuous mode [ 1907.566890] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1907.585356] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1907.594837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1907.614398] bridge0: port 1(bridge_slave_0) entered disabled state [ 1907.621418] bridge0: port 2(bridge_slave_1) entered disabled state [ 1907.631354] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1907.661774] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1907.668979] team0: Port device team_slave_0 added [ 1907.674741] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1907.684273] team0: Port device team_slave_1 added [ 1907.701278] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1907.708571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1907.737043] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1907.783540] device hsr_slave_0 entered promiscuous mode [ 1907.820466] device hsr_slave_1 entered promiscuous mode [ 1907.860755] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1907.873177] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1907.884194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1907.898048] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1907.919177] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1907.930410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1907.937210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1907.948322] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1907.958163] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1907.964407] 8021q: adding VLAN 0 to HW filter on device team0 [ 1907.990918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1907.998564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1908.007321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1908.015267] bridge0: port 1(bridge_slave_0) entered blocking state [ 1908.021659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1908.035611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1908.049057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1908.062838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1908.071014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1908.078535] bridge0: port 2(bridge_slave_1) entered blocking state [ 1908.084911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1908.095231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1908.105805] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1908.112177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1908.124552] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1908.134543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1908.142915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1908.149822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1908.156894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1908.175476] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1908.181735] 8021q: adding VLAN 0 to HW filter on device team0 [ 1908.188715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1908.203589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1908.211296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1908.218896] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1908.229224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1908.242683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1908.251441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1908.259743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1908.268131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1908.275842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1908.283705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1908.291520] bridge0: port 1(bridge_slave_0) entered blocking state [ 1908.297848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1908.307703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1908.319563] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1908.326596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1908.334100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1908.341633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1908.351855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1908.366055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1908.376072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1908.384003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1908.391772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1908.399430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1908.407956] bridge0: port 2(bridge_slave_1) entered blocking state [ 1908.414337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1908.423763] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1908.432464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1908.440893] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1908.446918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1908.457255] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1908.463441] 8021q: adding VLAN 0 to HW filter on device team0 [ 1908.473762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1908.480981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1908.487788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1908.497240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1908.509778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1908.518100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1908.526411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1908.534425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1908.542374] bridge0: port 1(bridge_slave_0) entered blocking state [ 1908.548719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1908.556109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1908.573200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1908.585280] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1908.592363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1908.600335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1908.609352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1908.619801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1908.627681] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1908.635685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1908.643673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1908.651966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1908.658310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1908.665590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1908.675122] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1908.688418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1908.698094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1908.707637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1908.717079] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1908.727982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1908.737198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1908.745146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1908.757928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1908.766381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1908.774102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1908.782296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1908.790772] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1908.799338] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1908.815976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1908.829908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1908.845970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1908.855989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1908.863806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1908.872459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1908.879449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1908.889100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1908.898712] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1908.910355] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1908.916377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1908.924678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1908.933227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1908.944291] device bridge_slave_1 left promiscuous mode [ 1908.949804] bridge0: port 2(bridge_slave_1) entered disabled state [ 1909.001224] device bridge_slave_0 left promiscuous mode [ 1909.006753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1909.052232] device bridge_slave_1 left promiscuous mode [ 1909.057704] bridge0: port 2(bridge_slave_1) entered disabled state [ 1909.074686] kauditd_printk_skb: 1934 callbacks suppressed [ 1909.074695] audit: type=1326 audit(1564467150.367:246440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1909.111687] device bridge_slave_0 left promiscuous mode [ 1909.118351] bridge0: port 1(bridge_slave_0) entered disabled state [ 1909.132596] audit: type=1326 audit(1564467150.367:246441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.157726] audit: type=1326 audit(1564467150.367:246442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.183620] audit: type=1326 audit(1564467150.367:246443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.208749] audit: type=1326 audit(1564467150.367:246444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.234999] audit: type=1326 audit(1564467150.377:246445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.260601] audit: type=1326 audit(1564467150.377:246446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.285451] audit: type=1326 audit(1564467150.377:246447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.310862] audit: type=1326 audit(1564467150.377:246448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.335653] audit: type=1326 audit(1564467150.377:246449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29933 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1909.512856] device hsr_slave_1 left promiscuous mode [ 1909.554747] device hsr_slave_0 left promiscuous mode [ 1909.614324] team0 (unregistering): Port device team_slave_1 removed [ 1909.626822] team0 (unregistering): Port device team_slave_0 removed [ 1909.639294] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1909.677213] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1909.815118] bond0 (unregistering): Released all slaves [ 1909.903277] device hsr_slave_1 left promiscuous mode [ 1909.973207] device hsr_slave_0 left promiscuous mode [ 1910.013404] team0 (unregistering): Port device team_slave_1 removed [ 1910.025185] team0 (unregistering): Port device team_slave_0 removed [ 1910.034957] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1910.076240] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1910.159170] bond0 (unregistering): Released all slaves [ 1910.205793] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1910.212151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1910.232244] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1910.238984] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:31 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000580)={&(0x7f0000000340), 0xc, &(0x7f0000000540)={&(0x7f0000000700)={0xc0, r5, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x400}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xcbb}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r7, 0x3, 0x0) 06:12:31 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x0, 0x3f) 06:12:31 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0xffffffffffffffff, 0x0, 0x3, 0x3f) 06:12:31 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8, 0x400000) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x9, 0x4) r1 = socket$kcm(0x10, 0x1, 0x10) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb90402480b00010010000000000000140e0006001500cd5edc2976d153b40000", 0x2e}], 0x1}, 0x0) [ 1910.255131] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1910.272071] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 06:12:31 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x2305e2b7) write$FUSE_CREATE_OPEN(r0, &(0x7f0000001340)={0xa0, 0x0, 0x2, {{0x800000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}}, 0xa0) [ 1910.315668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1910.352742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1910.397943] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1910.462794] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:32 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:32 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x0, 0x3f) 06:12:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8c"], 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="1a000200cb00"]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:12:32 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000340)={0x4, 0x9, 0x7ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) [ 1911.539577] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1911.705951] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:33 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cb"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x3f, &(0x7f0000000000)) 06:12:33 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) socket$inet_udp(0x2, 0x2, 0x0) readahead(0xffffffffffffffff, 0x6, 0x9) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r1, 0x409, 0xa) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:12:33 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:33 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x0, 0x3f) 06:12:33 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cb"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:33 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, 0x0) [ 1911.914076] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:33 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x0) 06:12:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000040)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) 06:12:33 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cb"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:33 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xc3, &(0x7f0000000000)=0x0) io_destroy(r0) [ 1912.188431] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1914.950505] device bridge_slave_1 left promiscuous mode [ 1914.955995] bridge0: port 2(bridge_slave_1) entered disabled state [ 1915.011013] device bridge_slave_0 left promiscuous mode [ 1915.016514] bridge0: port 1(bridge_slave_0) entered disabled state [ 1915.071817] device bridge_slave_1 left promiscuous mode [ 1915.077302] bridge0: port 2(bridge_slave_1) entered disabled state [ 1915.121289] device bridge_slave_0 left promiscuous mode [ 1915.126760] bridge0: port 1(bridge_slave_0) entered disabled state [ 1915.172089] device bridge_slave_1 left promiscuous mode [ 1915.177536] bridge0: port 2(bridge_slave_1) entered disabled state [ 1915.241048] device bridge_slave_0 left promiscuous mode [ 1915.246516] bridge0: port 1(bridge_slave_0) entered disabled state [ 1915.473070] device hsr_slave_1 left promiscuous mode [ 1915.512725] device hsr_slave_0 left promiscuous mode [ 1915.564628] team0 (unregistering): Port device team_slave_1 removed [ 1915.574457] team0 (unregistering): Port device team_slave_0 removed [ 1915.583976] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1915.623850] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1915.684866] bond0 (unregistering): Released all slaves [ 1915.772206] device hsr_slave_1 left promiscuous mode [ 1915.812987] device hsr_slave_0 left promiscuous mode [ 1915.853474] team0 (unregistering): Port device team_slave_1 removed [ 1915.865795] team0 (unregistering): Port device team_slave_0 removed [ 1915.875486] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1915.924572] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1915.994604] bond0 (unregistering): Released all slaves [ 1916.072662] device hsr_slave_1 left promiscuous mode [ 1916.114229] device hsr_slave_0 left promiscuous mode [ 1916.154502] team0 (unregistering): Port device team_slave_1 removed [ 1916.164172] team0 (unregistering): Port device team_slave_0 removed [ 1916.173741] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1916.213542] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1916.275327] bond0 (unregistering): Released all slaves [ 1920.070251] IPVS: ftp: loaded support on port[0] = 21 [ 1920.465476] chnl_net:caif_netlink_parms(): no params data found [ 1920.490291] IPVS: ftp: loaded support on port[0] = 21 [ 1920.516077] bridge0: port 1(bridge_slave_0) entered blocking state [ 1920.522583] bridge0: port 1(bridge_slave_0) entered disabled state [ 1920.529472] device bridge_slave_0 entered promiscuous mode [ 1920.543243] bridge0: port 2(bridge_slave_1) entered blocking state [ 1920.549656] bridge0: port 2(bridge_slave_1) entered disabled state [ 1920.557049] device bridge_slave_1 entered promiscuous mode [ 1920.582689] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1920.593694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1920.618922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1920.626062] team0: Port device team_slave_0 added [ 1920.631821] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1920.639026] team0: Port device team_slave_1 added [ 1920.644558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1920.655546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1920.692772] IPVS: ftp: loaded support on port[0] = 21 [ 1920.733546] device hsr_slave_0 entered promiscuous mode [ 1920.770406] device hsr_slave_1 entered promiscuous mode [ 1920.823367] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1920.838486] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1920.917695] chnl_net:caif_netlink_parms(): no params data found [ 1920.945706] bridge0: port 2(bridge_slave_1) entered blocking state [ 1920.952208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1920.958853] bridge0: port 1(bridge_slave_0) entered blocking state [ 1920.965262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1921.002725] bridge0: port 1(bridge_slave_0) entered blocking state [ 1921.009168] bridge0: port 1(bridge_slave_0) entered disabled state [ 1921.016787] device bridge_slave_0 entered promiscuous mode [ 1921.024531] bridge0: port 2(bridge_slave_1) entered blocking state [ 1921.031169] bridge0: port 2(bridge_slave_1) entered disabled state [ 1921.038348] device bridge_slave_1 entered promiscuous mode [ 1921.060776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1921.073329] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1921.104923] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1921.113533] team0: Port device team_slave_0 added [ 1921.135742] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1921.143573] team0: Port device team_slave_1 added [ 1921.168695] chnl_net:caif_netlink_parms(): no params data found [ 1921.179376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1921.186814] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1921.262538] device hsr_slave_0 entered promiscuous mode [ 1921.300388] device hsr_slave_1 entered promiscuous mode [ 1921.356174] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1921.364329] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1921.383296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1921.389730] bridge0: port 1(bridge_slave_0) entered disabled state [ 1921.399266] device bridge_slave_0 entered promiscuous mode [ 1921.406338] bridge0: port 2(bridge_slave_1) entered blocking state [ 1921.413127] bridge0: port 2(bridge_slave_1) entered disabled state [ 1921.420572] device bridge_slave_1 entered promiscuous mode [ 1921.447457] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1921.459307] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1921.477030] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1921.483254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1921.501103] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1921.507801] bridge0: port 2(bridge_slave_1) entered blocking state [ 1921.514169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1921.520854] bridge0: port 1(bridge_slave_0) entered blocking state [ 1921.527246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1921.536244] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1921.543531] team0: Port device team_slave_0 added [ 1921.549518] bridge0: port 1(bridge_slave_0) entered disabled state [ 1921.556296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1921.563418] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1921.573354] bridge0: port 1(bridge_slave_0) entered disabled state [ 1921.580202] bridge0: port 2(bridge_slave_1) entered disabled state [ 1921.589711] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1921.596724] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1921.604028] team0: Port device team_slave_1 added [ 1921.609085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1921.616101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1921.626858] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1921.634897] 8021q: adding VLAN 0 to HW filter on device team0 [ 1921.642271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1921.662101] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1921.678533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1921.695615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1921.703776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1921.711442] bridge0: port 1(bridge_slave_0) entered blocking state [ 1921.717778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1921.725777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1921.773727] device hsr_slave_0 entered promiscuous mode [ 1921.831979] device hsr_slave_1 entered promiscuous mode [ 1921.870641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1921.878469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1921.886350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1921.892941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1921.902523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1921.912728] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1921.920111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1921.929823] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1921.946877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1921.956788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1921.968253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1921.977124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1921.985247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1921.994078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1922.002333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1922.009872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1922.017639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1922.030698] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1922.039213] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1922.048057] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1922.056395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1922.064249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1922.074375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1922.084850] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1922.092894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1922.101721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1922.114238] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1922.120545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1922.133298] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1922.142980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1922.149942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1922.158913] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1922.165410] 8021q: adding VLAN 0 to HW filter on device team0 [ 1922.175576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1922.187474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1922.195593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1922.203655] bridge0: port 1(bridge_slave_0) entered blocking state [ 1922.210072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1922.220521] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1922.232861] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1922.244155] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1922.251370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1922.259457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1922.272448] bridge0: port 2(bridge_slave_1) entered blocking state [ 1922.278805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1922.292583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1922.301809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1922.316575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1922.326336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1922.340625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1922.348411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1922.359229] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1922.365754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1922.374053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1922.383778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1922.397052] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1922.404911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1922.413320] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1922.422767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1922.430762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1922.437791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1922.447763] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1922.454578] 8021q: adding VLAN 0 to HW filter on device team0 [ 1922.464494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1922.478462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1922.489403] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1922.496624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1922.507504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1922.516158] bridge0: port 1(bridge_slave_0) entered blocking state [ 1922.522747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1922.529836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1922.538176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1922.545742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1922.553397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1922.563834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1922.573182] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1922.579254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1922.588548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1922.597256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1922.605095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1922.613494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1922.619843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1922.633455] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1922.641664] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1922.649173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1922.659928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1922.669709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1922.686791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1922.695529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1922.704616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1922.716401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1922.726845] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1922.751785] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1922.759958] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1922.770203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1922.777953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1922.788890] kauditd_printk_skb: 752 callbacks suppressed [ 1922.788899] audit: type=1326 audit(1564467164.077:247202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1922.822201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1922.834319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1922.841679] audit: type=1326 audit(1564467164.087:247203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1922.860567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1922.867437] audit: type=1326 audit(1564467164.087:247204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1922.904679] audit: type=1326 audit(1564467164.087:247205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1922.938240] audit: type=1326 audit(1564467164.087:247206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1922.938276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1922.969885] audit: type=1326 audit(1564467164.087:247207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1922.995540] audit: type=1326 audit(1564467164.087:247208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459829 code=0x50000 [ 1923.010087] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1923.031264] audit: type=1326 audit(1564467164.137:247209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1923.031838] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1923.063807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1923.065873] audit: type=1326 audit(1564467164.137:247210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x459829 code=0x50000 [ 1923.097807] audit: type=1326 audit(1564467164.137:247211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=30041 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x50000 [ 1923.097908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1923.131551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1923.148508] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 06:12:44 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r6, 0x3, 0x0) 06:12:44 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x0) 06:12:44 executing program 4: 06:12:44 executing program 2: [ 1923.157856] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1923.169413] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1923.279012] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1923.472809] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:44 executing program 4: 06:12:44 executing program 2: 06:12:44 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x40080, 0x0) sendto(r3, &(0x7f0000000500)="1c7fb3ffe7cdecbe92ba2d5676204326a9e86aabc21cd7fc250f0592193e4dcd146d50cd139672", 0x27, 0x4000, &(0x7f0000000540)=@generic={0x11, "95756d24d459bc5c11d68c3c5a4e80a2b5f8ea7c19eb3c6dd42006cd1d0c9e667228c9cd9ece9db84c1238f525b238c6d0153b63e5fd9df78d2c362ca6eb895966de117aa659c5a3e9c3cb06c6813426500227916b1f93d9e11308e380d6f73ebd8c5ce3e155b3545634c24650cb5816d3def9e0606ef15cd282323a7eac"}, 0x80) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, 0x0) write$FUSE_BMAP(r5, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) ptrace$cont(0x18, r7, 0x3, 0x0) 06:12:44 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:44 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x0) 06:12:45 executing program 2: [ 1923.867712] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1923.924383] erspan0: Invalid MTU 17664 requested, hw max 1500 [ 1924.026555] erspan0: Invalid MTU 17664 requested, hw max 1500 06:12:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,', @ANYRESDEC, @ANYBLOB=',uid=', @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a09"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:45 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000005, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff02}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 06:12:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000340)='net/snmp\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r1, r2, 0x0, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) 06:12:45 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='bpf\x00', 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000000007,mode=00000000000000000000010', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC=r0, @ANYBLOB="2cff62625f726f6c653d552d2c6d61a94cdb26385ff1ab73cbdd266a099a24f241"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0/file0\x00', 0xe, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000003c0)={0x1, {0xffffffff, 0x4, 0x1f, 0x7, 0x2}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000450000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ptrace$cont(0x18, 0x0, 0x3, 0x3f) 06:12:45 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@ipx, 0x80, 0x0}, 0x0) [ 1924.152310] kasan: CONFIG_KASAN_INLINE enabled [ 1924.169948] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1924.185627] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1924.191979] Modules linked in: [ 1924.195175] CPU: 1 PID: 30092 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 1924.202271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1924.211618] task: ffff8880a8b0a240 task.stack: ffff8880966e0000 [ 1924.217671] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0 [ 1924.222761] RSP: 0018:ffff8880966e7738 EFLAGS: 00010206 [ 1924.228114] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000803e000 [ 1924.235374] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018 [ 1924.242650] RBP: ffff8880966e7880 R08: 0000000000000001 R09: ffff8880a8b0aae0 [ 1924.249913] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888077673c00 [ 1924.257174] R13: ffff88805d158f60 R14: ffff88805d158f50 R15: ffff8880966e7998 [ 1924.264438] FS: 00007fb42018e700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 1924.272669] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1924.278540] CR2: 000000c424d2af00 CR3: 00000000756da000 CR4: 00000000001406e0 [ 1924.285802] Call Trace: [ 1924.288393] ? release_sock+0x14a/0x1b0 [ 1924.292369] ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0 [ 1924.298250] ? __local_bh_enable_ip+0x99/0x1a0 [ 1924.302843] ? trace_hardirqs_on_caller+0x400/0x590 [ 1924.307858] ? release_sock+0x14a/0x1b0 [ 1924.311825] ? trace_hardirqs_on+0xd/0x10 [ 1924.315963] ? __local_bh_enable_ip+0x99/0x1a0 [ 1924.320538] ? _raw_spin_unlock_bh+0x31/0x40 [ 1924.324946] rxrpc_new_client_call+0x8f7/0x1420 [ 1924.329614] ? rxrpc_do_sendmsg+0x91a/0x1103 [ 1924.334021] rxrpc_do_sendmsg+0x91a/0x1103 [ 1924.338254] ? rxrpc_kernel_send_data+0x470/0x470 [ 1924.343101] ? __local_bh_enable_ip+0x99/0x1a0 [ 1924.347680] rxrpc_sendmsg+0x48a/0x650 [ 1924.351564] ? security_socket_sendmsg+0x89/0xb0 [ 1924.356333] ? rxrpc_sock_destructor+0x130/0x130 [ 1924.361083] sock_sendmsg+0xce/0x110 [ 1924.364786] ___sys_sendmsg+0x349/0x840 [ 1924.368746] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 1924.373495] ? __fget+0x210/0x370 [ 1924.376957] ? lock_downgrade+0x6e0/0x6e0 [ 1924.381111] ? __fget+0x237/0x370 [ 1924.384554] ? __fget_light+0x172/0x1f0 [ 1924.388552] ? __fdget+0x1b/0x20 [ 1924.391913] ? sockfd_lookup_light+0xb4/0x160 [ 1924.396416] __sys_sendmmsg+0x152/0x3a0 [ 1924.400382] ? SyS_sendmsg+0x50/0x50 [ 1924.404090] ? kasan_check_read+0x11/0x20 [ 1924.408223] ? _copy_to_user+0x87/0xd0 [ 1924.412106] ? put_timespec64+0xb4/0x100 [ 1924.416159] ? nsecs_to_jiffies+0x30/0x30 [ 1924.420298] ? SyS_clock_gettime+0xf8/0x180 [ 1924.424611] SyS_sendmmsg+0x35/0x60 [ 1924.428241] ? __sys_sendmmsg+0x3a0/0x3a0 [ 1924.432389] do_syscall_64+0x1e8/0x640 [ 1924.436267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1924.441119] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1924.446298] RIP: 0033:0x459829 [ 1924.449491] RSP: 002b:00007fb42018dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1924.457190] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 1924.464452] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000003 [ 1924.471711] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1924.478968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb42018e6d4 [ 1924.486225] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff 06:12:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000dd000000000000007301430000000000950000000000000099386119bf9fe702164f75f1e8233350f0e3c1fec0daa9484911bb72288d80ac058dea615ecc6741ea39270cde82f2ed074b8e4f356753eff7f6a54a145071fc9436170acd348e94906bad0b0a0edec81f0169f89a0373dc82f848ba192a8a1a3bc3dea4889fa9b2dd86b4bdf99d28efc787a3d9f30183f024ed9806428ca519c7f400f7c89215344b43698f33ed8a606dea50eae09010e6c70b5184a8"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 1924.493490] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 [ 1924.513471] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff8880966e7738 [ 1924.523818] kobject: 'mesh' (ffff88808c217c00): kobject_uevent_env [ 1924.537394] kobject: 'mesh' (ffff88808c217c00): kobject_uevent_env: filter function caused the event to drop! [ 1924.563467] device bridge_slave_1 left promiscuous mode [ 1924.576856] bridge0: port 2(bridge_slave_1) entered disabled state [ 1924.641195] kobject: 'brport' (ffff88804bf4af10): kobject_uevent_env [ 1924.648910] kobject: 'brport' (ffff88804bf4af10): kobject_uevent_env: filter function caused the event to drop! [ 1924.673331] device bridge_slave_0 left promiscuous mode [ 1924.685882] bridge0: port 1(bridge_slave_0) entered disabled state [ 1924.720095] kobject: 'brport' (ffff88804bf4af10): kobject_cleanup, parent (null) [ 1924.728549] kobject: 'brport' (ffff88804bf4af10): calling ktype release [ 1924.735352] kobject: 'brport': free name [ 1924.750897] kobject: 'brport' (ffff88809fb41390): kobject_uevent_env [ 1924.757423] kobject: 'brport' (ffff88809fb41390): kobject_uevent_env: filter function caused the event to drop! [ 1924.790561] kobject: 'brif' (ffff888076514080): kobject_cleanup, parent ffff88804eca8870 [ 1924.798843] kobject: 'brif' (ffff888076514080): auto cleanup kobject_del [ 1924.823437] kobject: 'brif' (ffff888076514080): calling ktype release [ 1924.830056] kobject: 'brport' (ffff88809fb41390): kobject_cleanup, parent (null) [ 1924.830061] kobject: 'brport' (ffff88809fb41390): calling ktype release [ 1924.830076] kobject: 'brport': free name [ 1924.877178] kobject: (ffff888076514080): dynamic_kobj_release [ 1924.891008] kobject: 'brif': free name [ 1924.943701] kobject: 'vlan0' (ffff88809ed00180): kobject_uevent_env [ 1924.953444] kobject: 'vlan0' (ffff88809ed00180): kobject_uevent_env: attempted to send uevent without kset! [ 1924.966130] kasan: CONFIG_KASAN_INLINE enabled [ 1924.972234] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1924.979761] kobject: 'mesh' (ffff88808c217c00): kobject_cleanup, parent (null) [ 1924.992604] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 1924.998861] Modules linked in: [ 1925.002069] CPU: 0 PID: 30103 Comm: syz-executor.3 Tainted: G D 4.14.134 #30 [ 1925.010380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1925.019738] task: ffff88809cd34040 task.stack: ffff888096660000 [ 1925.025808] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0 [ 1925.030085] ---[ end trace 4872efc833bb56ed ]--- [ 1925.030915] RSP: 0018:ffff888096667738 EFLAGS: 00010206 [ 1925.035666] Kernel panic - not syncing: Fatal exception [ 1925.046376] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90008641000 [ 1925.053644] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018 [ 1925.060914] RBP: ffff888096667880 R08: 0000000000000000 R09: 0000000000000000 [ 1925.068192] R10: 0000000000000000 R11: ffff88809cd34040 R12: ffff8880a5a6fc00 [ 1925.075509] R13: ffff88805d158f60 R14: ffff888077673d60 R15: ffff888096667998 [ 1925.084875] FS: 00007fb42012b700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1925.093108] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1925.098993] CR2: 00007fb42012adb8 CR3: 00000000756da000 CR4: 00000000001406f0 [ 1925.106264] Call Trace: [ 1925.108857] ? rxrpc_new_client_call+0x3bd/0x1420 [ 1925.113714] ? mutex_trylock+0x1c0/0x1c0 [ 1925.117784] ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0 [ 1925.123677] ? lock_downgrade+0x6e0/0x6e0 [ 1925.127829] ? release_sock+0x14a/0x1b0 [ 1925.131808] ? trace_hardirqs_on+0xd/0x10 [ 1925.135966] ? __local_bh_enable_ip+0x99/0x1a0 [ 1925.140550] ? _raw_spin_unlock_bh+0x31/0x40 [ 1925.144967] rxrpc_new_client_call+0x8f7/0x1420 [ 1925.149643] ? rxrpc_do_sendmsg+0x91a/0x1103 [ 1925.154061] rxrpc_do_sendmsg+0x91a/0x1103 [ 1925.158311] ? rxrpc_sendmsg+0x60/0x650 [ 1925.162287] ? rxrpc_kernel_send_data+0x470/0x470 [ 1925.167152] ? __local_bh_enable_ip+0x99/0x1a0 [ 1925.171738] rxrpc_sendmsg+0x48a/0x650 [ 1925.175635] ? security_socket_sendmsg+0x89/0xb0 [ 1925.180409] ? rxrpc_sock_destructor+0x130/0x130 [ 1925.185185] sock_sendmsg+0xce/0x110 [ 1925.188933] ___sys_sendmsg+0x349/0x840 [ 1925.193019] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 1925.197867] ? avc_has_extended_perms+0x8ec/0xe40 [ 1925.202720] ? lock_downgrade+0x6e0/0x6e0 [ 1925.206875] ? __fget+0x237/0x370 [ 1925.210327] ? __fget_light+0x172/0x1f0 [ 1925.214317] ? __fdget+0x1b/0x20 [ 1925.217681] ? sockfd_lookup_light+0xb4/0x160 [ 1925.222169] __sys_sendmmsg+0x152/0x3a0 [ 1925.226148] ? SyS_sendmsg+0x50/0x50 [ 1925.229864] ? kasan_check_read+0x11/0x20 [ 1925.234013] ? _copy_to_user+0x87/0xd0 [ 1925.237901] ? put_timespec64+0xb4/0x100 [ 1925.241958] ? nsecs_to_jiffies+0x30/0x30 [ 1925.246106] ? SyS_clock_gettime+0xf8/0x180 [ 1925.250427] SyS_sendmmsg+0x35/0x60 [ 1925.254049] ? __sys_sendmmsg+0x3a0/0x3a0 [ 1925.258192] do_syscall_64+0x1e8/0x640 [ 1925.262071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1925.266998] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1925.272175] RIP: 0033:0x459829 [ 1925.275353] RSP: 002b:00007fb42012ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1925.283063] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 1925.290324] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000003 [ 1925.297583] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 1925.305015] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb42012b6d4 [ 1925.312278] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff [ 1925.319542] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 [ 1925.338940] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff888096667738 [ 1925.346485] Kernel Offset: disabled [ 1925.350104] Rebooting in 86400 seconds..