Warning: Permanently added '10.128.0.206' (ECDSA) to the list of known hosts. 2020/02/21 22:15:28 fuzzer started 2020/02/21 22:15:30 dialing manager at 10.128.0.105:45159 2020/02/21 22:15:30 syscalls: 2955 2020/02/21 22:15:30 code coverage: enabled 2020/02/21 22:15:30 comparison tracing: enabled 2020/02/21 22:15:30 extra coverage: enabled 2020/02/21 22:15:30 setuid sandbox: enabled 2020/02/21 22:15:30 namespace sandbox: enabled 2020/02/21 22:15:30 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/21 22:15:30 fault injection: enabled 2020/02/21 22:15:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/21 22:15:30 net packet injection: enabled 2020/02/21 22:15:30 net device setup: enabled 2020/02/21 22:15:30 concurrency sanitizer: enabled 2020/02/21 22:15:30 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 63.707214][ T7973] KCSAN: could not find function: 'poll_schedule_timeout' [ 64.438135][ T7973] KCSAN: could not find function: '_find_next_bit' 2020/02/21 22:15:35 adding functions to KCSAN blacklist: 'ext4_free_inodes_count' 'ktime_get_seconds' 'copy_process' '__ext4_new_inode' '__splice_from_pipe' 'add_timer' 'wbt_done' 'blk_mq_dispatch_rq_list' 'shmem_file_read_iter' 'kauditd_thread' 'audit_log_start' 'mod_timer' 'blk_mq_get_request' 'echo_char' 'tick_nohz_idle_stop_tick' 'xas_clear_mark' 'sixpack_receive_buf' 'commit_echoes' 'do_nanosleep' 'ep_poll' '__process_echoes' 'tick_sched_do_timer' 'blk_mq_sched_dispatch_requests' 'poll_schedule_timeout' 'generic_write_end' 'find_get_pages_range_tag' 'run_timer_softirq' 'ext4_has_free_clusters' '_find_next_bit' 'vfs_unlink' 22:17:11 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x70e000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x713e, 0x0, 0x10001, 0x100}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) lstat(0x0, &(0x7f0000000b00)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x10, 0x0) write$P9_RRENAME(r4, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) ioprio_set$pid(0x0, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = memfd_create(&(0x7f000003e000)='\'', 0x0) r7 = dup2(0xffffffffffffffff, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000400)={r8}, &(0x7f0000000080)=0x8) fallocate(r5, 0x0, 0x40000000, 0x10000101) 22:17:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/41, 0x29}], 0x1}, 0x0) [ 161.296631][ T7978] IPVS: ftp: loaded support on port[0] = 21 [ 161.395259][ T7978] chnl_net:caif_netlink_parms(): no params data found [ 161.477889][ T7978] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.500419][ T7978] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.508137][ T7978] device bridge_slave_0 entered promiscuous mode [ 161.532400][ T7978] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.535501][ T7982] IPVS: ftp: loaded support on port[0] = 21 [ 161.539558][ T7978] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.555410][ T7978] device bridge_slave_1 entered promiscuous mode [ 161.581303][ T7978] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.592808][ T7978] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.617749][ T7978] team0: Port device team_slave_0 added [ 161.626686][ T7978] team0: Port device team_slave_1 added [ 161.644665][ T7978] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 161.651700][ T7978] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.678428][ T7978] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 22:17:12 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 161.691002][ T7978] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 161.697955][ T7978] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 161.725023][ T7978] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 161.832235][ T7978] device hsr_slave_0 entered promiscuous mode [ 161.870587][ T7978] device hsr_slave_1 entered promiscuous mode 22:17:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0x4, 0x0, 0x4, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) [ 161.936563][ T7986] IPVS: ftp: loaded support on port[0] = 21 [ 161.947106][ T7982] chnl_net:caif_netlink_parms(): no params data found [ 162.097475][ T7982] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.105453][ T7982] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.113696][ T7982] device bridge_slave_0 entered promiscuous mode [ 162.120909][ T7978] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 162.173394][ T7978] netdevsim netdevsim0 netdevsim1: renamed from eth1 22:17:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x198}, 0x67) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r1, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) [ 162.234559][ T7978] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 162.302827][ T7982] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.309890][ T7982] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.331086][ T7982] device bridge_slave_1 entered promiscuous mode [ 162.345461][ T7986] chnl_net:caif_netlink_parms(): no params data found [ 162.362973][ T7978] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 162.438675][ T7993] IPVS: ftp: loaded support on port[0] = 21 [ 162.440103][ T7996] IPVS: ftp: loaded support on port[0] = 21 [ 162.445827][ T7982] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.501791][ T7982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:17:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffbd}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@deltaction={0x14, 0x31, 0x11}, 0x14}}, 0x0) [ 162.577161][ T7986] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.587257][ T7986] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.595349][ T7986] device bridge_slave_0 entered promiscuous mode [ 162.612959][ T7982] team0: Port device team_slave_0 added [ 162.633691][ T7986] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.642786][ T7986] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.651131][ T7986] device bridge_slave_1 entered promiscuous mode [ 162.672429][ T7982] team0: Port device team_slave_1 added [ 162.730432][ T7986] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.741935][ T7986] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.756299][ T7993] chnl_net:caif_netlink_parms(): no params data found [ 162.773213][ T7982] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 162.780476][ T7982] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.806519][ T7982] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 162.853354][ T7978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.855283][ T8004] IPVS: ftp: loaded support on port[0] = 21 [ 162.862707][ T7982] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 162.873920][ T7982] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.900024][ T7982] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 162.919726][ T7996] chnl_net:caif_netlink_parms(): no params data found [ 162.933461][ T7986] team0: Port device team_slave_0 added [ 162.992617][ T7982] device hsr_slave_0 entered promiscuous mode [ 163.030694][ T7982] device hsr_slave_1 entered promiscuous mode [ 163.070362][ T7982] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.077936][ T7982] Cannot create hsr debugfs directory [ 163.089316][ T7986] team0: Port device team_slave_1 added [ 163.115455][ T7986] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.122481][ T7986] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.148620][ T7986] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.162124][ T7986] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.169252][ T7986] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.195122][ T7986] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 163.223543][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.231728][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.259119][ T7978] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.282635][ T7993] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.289718][ T7993] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.297819][ T7993] device bridge_slave_0 entered promiscuous mode [ 163.308750][ T7993] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.315893][ T7993] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.323458][ T7993] device bridge_slave_1 entered promiscuous mode [ 163.341412][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.350030][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.358846][ T3633] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.365920][ T3633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.377834][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.442584][ T7986] device hsr_slave_0 entered promiscuous mode [ 163.480611][ T7986] device hsr_slave_1 entered promiscuous mode [ 163.530402][ T7986] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.538661][ T7986] Cannot create hsr debugfs directory [ 163.561474][ T7996] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.568528][ T7996] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.576630][ T7996] device bridge_slave_0 entered promiscuous mode [ 163.590417][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.599172][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.607671][ T3633] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.614709][ T3633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.622472][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.650346][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.659164][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.668911][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.677601][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.685996][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.694593][ T7996] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.702231][ T7996] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.709891][ T7996] device bridge_slave_1 entered promiscuous mode [ 163.728980][ T7993] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.752003][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.760647][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.769049][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.777397][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.785972][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.796461][ T8004] chnl_net:caif_netlink_parms(): no params data found [ 163.807084][ T7996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.817540][ T7993] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.844685][ T7996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.858569][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.877303][ T7982] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 163.955639][ T7982] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 163.994400][ T7982] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 164.056511][ T7982] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 164.112867][ T7993] team0: Port device team_slave_0 added [ 164.140777][ T7996] team0: Port device team_slave_0 added [ 164.147137][ T7993] team0: Port device team_slave_1 added [ 164.169465][ T7996] team0: Port device team_slave_1 added [ 164.175469][ T7986] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 164.243575][ T7986] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 164.303057][ T7986] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 164.346305][ T7986] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 164.419991][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.429613][ T8004] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.437707][ T8004] device bridge_slave_0 entered promiscuous mode [ 164.445413][ T7993] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.454124][ T7993] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.480193][ T7993] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.493602][ T7993] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.500605][ T7993] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.526692][ T7993] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.538307][ T7996] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.545376][ T7996] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.571476][ T7996] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.591770][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.599525][ T8004] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.607533][ T8004] device bridge_slave_1 entered promiscuous mode [ 164.626133][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 164.633959][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.642001][ T7996] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.648943][ T7996] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.674999][ T7996] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.702328][ T8004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.718773][ T8004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.734285][ T7978] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.792161][ T7996] device hsr_slave_0 entered promiscuous mode [ 164.830763][ T7996] device hsr_slave_1 entered promiscuous mode [ 164.870543][ T7996] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.878121][ T7996] Cannot create hsr debugfs directory [ 164.952679][ T7993] device hsr_slave_0 entered promiscuous mode [ 165.010685][ T7993] device hsr_slave_1 entered promiscuous mode [ 165.070347][ T7993] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.077951][ T7993] Cannot create hsr debugfs directory [ 165.107313][ T8004] team0: Port device team_slave_0 added [ 165.117073][ T8004] team0: Port device team_slave_1 added [ 165.133214][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.141781][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.193533][ T8004] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.200606][ T8004] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.226789][ T8004] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.255365][ T8004] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.262410][ T8004] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.288630][ T8004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.299627][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.308343][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.317395][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.325184][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.342202][ T7978] device veth0_vlan entered promiscuous mode [ 165.358671][ T7986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.398208][ T7993] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 165.464542][ T7978] device veth1_vlan entered promiscuous mode [ 165.532793][ T8004] device hsr_slave_0 entered promiscuous mode [ 165.570909][ T8004] device hsr_slave_1 entered promiscuous mode [ 165.610833][ T8004] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.618415][ T8004] Cannot create hsr debugfs directory [ 165.624634][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 165.634524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.643776][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.651923][ T7993] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 165.718730][ T7986] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.735806][ T7993] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 165.804847][ T7996] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 165.881979][ T7993] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 165.941303][ T7982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.948376][ T7996] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 165.992451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.005962][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.014425][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.021468][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.029267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.038270][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.046739][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.053793][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.061807][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.071176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.099926][ T7996] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 166.142593][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 166.153167][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.161895][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.174813][ T7978] device veth0_macvtap entered promiscuous mode [ 166.187180][ T7996] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 166.242079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 166.250894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.259512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.268705][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.283764][ T7978] device veth1_macvtap entered promiscuous mode [ 166.297313][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.306592][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.315618][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.350701][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.358549][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.366892][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.375345][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.383936][ T8004] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 166.434694][ T8004] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 166.474757][ T7982] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.486396][ T7978] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 166.498341][ T8004] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 166.543781][ T8004] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 166.612711][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.621712][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.630112][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.639459][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.675721][ T7978] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 166.690840][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.698364][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.708147][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.716906][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.727814][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.734892][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.742629][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.751203][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.760071][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.776023][ T7986] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.794541][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.803468][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.812483][ T8001] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.819516][ T8001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.850350][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.859349][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.869375][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.878199][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.887053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.910340][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.919003][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.943413][ T7993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.959586][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.975636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.984694][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.993482][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.023388][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.033890][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.047057][ T7986] device veth0_vlan entered promiscuous mode [ 167.060220][ T7982] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.071389][ T7982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.086214][ T7993] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.095770][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.103649][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.111923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.120818][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.129096][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.136924][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.168485][ T8004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.184494][ T7986] device veth1_vlan entered promiscuous mode [ 167.195851][ T7996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.212081][ T8004] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.234616][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 167.244531][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.252720][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.260397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 167.267821][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.275831][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.284444][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.292768][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.299785][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.307743][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.316376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.324784][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.331837][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.339787][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.348536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.357086][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.364206][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.372350][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.381527][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.389430][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.408797][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.418018][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.427697][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.436776][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.445688][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.461454][ T7982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.471124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.479763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.491243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.498938][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.518933][ T7996] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.540129][ T7986] device veth0_macvtap entered promiscuous mode [ 167.556891][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.567602][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.576216][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.583276][ T7994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.593525][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.602497][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.611613][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.619856][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.628350][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.636868][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.645274][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.675820][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.684767][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 167.695776][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.705011][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.713967][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.722364][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.729486][ T7994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.737384][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.745826][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.754541][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.763173][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.771565][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.779273][ T7994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.787254][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.795885][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.820747][ T7986] device veth1_macvtap entered promiscuous mode [ 167.838230][ T7982] device veth0_vlan entered promiscuous mode [ 167.846055][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.856782][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.864673][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.873342][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.882427][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.891357][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.900582][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.908773][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.918248][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.926172][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.940454][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 167.947861][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.969996][ T7982] device veth1_vlan entered promiscuous mode [ 167.984162][ T8004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.994501][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 168.002759][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.011548][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.019659][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.028442][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.037767][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.046268][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.055051][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.069952][ T7986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.080707][ T7986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.092399][ T7986] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 168.114387][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.131805][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 168.139867][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.164690][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.180992][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.189580][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.202864][ T7986] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.220701][ T7986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.233226][ T7986] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 168.261433][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.271280][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.280729][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.289033][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.298134][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.306781][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.331556][ T7996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.361043][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.369582][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.389662][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.400568][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 168.414216][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.433698][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.458114][ T7993] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.478273][ T7982] device veth0_macvtap entered promiscuous mode [ 168.495041][ T7982] device veth1_macvtap entered promiscuous mode 22:17:19 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x70e000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x713e, 0x0, 0x10001, 0x100}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) lstat(0x0, &(0x7f0000000b00)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x10, 0x0) write$P9_RRENAME(r4, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) ioprio_set$pid(0x0, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = memfd_create(&(0x7f000003e000)='\'', 0x0) r7 = dup2(0xffffffffffffffff, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000400)={r8}, &(0x7f0000000080)=0x8) fallocate(r5, 0x0, 0x40000000, 0x10000101) [ 168.510582][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 168.518843][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.526314][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 168.526330][ T26] audit: type=1800 audit(1582323439.022:31): pid=8047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16519 res=0 [ 168.557211][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 168.565581][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 168.575794][ T26] audit: type=1800 audit(1582323439.022:32): pid=8052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16519 res=0 [ 168.595923][ T26] audit: type=1800 audit(1582323439.022:33): pid=8056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16519 res=0 [ 168.627924][ T7996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.668452][ T8004] device veth0_vlan entered promiscuous mode [ 168.695728][ T7982] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.717096][ T7982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.727675][ T7982] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.738493][ T7982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.749867][ T7982] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 168.758357][ C1] hrtimer: interrupt took 26712 ns [ 168.760812][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.774859][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.783709][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.795212][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.804052][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.815394][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.845132][ T8004] device veth1_vlan entered promiscuous mode [ 168.868135][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.878239][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.901183][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.909725][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.922386][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.933322][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.943272][ T7993] device veth0_vlan entered promiscuous mode 22:17:19 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x70e000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x713e, 0x0, 0x10001, 0x100}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) lstat(0x0, &(0x7f0000000b00)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x10, 0x0) write$P9_RRENAME(r4, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) ioprio_set$pid(0x0, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = memfd_create(&(0x7f000003e000)='\'', 0x0) r7 = dup2(0xffffffffffffffff, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000400)={r8}, &(0x7f0000000080)=0x8) fallocate(r5, 0x0, 0x40000000, 0x10000101) [ 168.967827][ T7982] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.990821][ T7982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.004054][ T7982] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.014636][ T7982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.026043][ T7982] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.060408][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.072842][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 169.095564][ T7993] device veth1_vlan entered promiscuous mode [ 169.110889][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 169.119799][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.133316][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.157512][ T8004] device veth0_macvtap entered promiscuous mode [ 169.170681][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 169.180078][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 169.192069][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.203782][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.233252][ T8004] device veth1_macvtap entered promiscuous mode [ 169.299303][ T7996] device veth0_vlan entered promiscuous mode [ 169.312922][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.335389][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.343843][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.353294][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.361898][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.373121][ T7993] device veth0_macvtap entered promiscuous mode 22:17:19 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x70e000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x713e, 0x0, 0x10001, 0x100}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) lstat(0x0, &(0x7f0000000b00)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x10, 0x0) write$P9_RRENAME(r4, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) ioprio_set$pid(0x0, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = memfd_create(&(0x7f000003e000)='\'', 0x0) r7 = dup2(0xffffffffffffffff, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000400)={r8}, &(0x7f0000000080)=0x8) fallocate(r5, 0x0, 0x40000000, 0x10000101) [ 169.396096][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.413439][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.432895][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 169.463950][ T7993] device veth1_macvtap entered promiscuous mode [ 169.482800][ T8004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.502231][ T8004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.519032][ T8004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.529784][ T8004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.540093][ T8004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.550619][ T8004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.561842][ T8004] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 169.584852][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.606456][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 169.615526][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.626168][ T7996] device veth1_vlan entered promiscuous mode [ 169.635558][ T8004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.650194][ T8004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.660101][ T8004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.671556][ T8004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.681414][ T8004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.692136][ T8004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.703607][ T8004] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.728278][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.743046][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.756922][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.776433][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.793345][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.805660][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.817860][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 22:17:20 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x70e000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x713e, 0x0, 0x10001, 0x100}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) lstat(0x0, &(0x7f0000000b00)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x10, 0x0) write$P9_RRENAME(r4, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) ioprio_set$pid(0x0, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = memfd_create(&(0x7f000003e000)='\'', 0x0) r7 = dup2(0xffffffffffffffff, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000400)={r8}, &(0x7f0000000080)=0x8) fallocate(r5, 0x0, 0x40000000, 0x10000101) [ 169.832934][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.862226][ T7993] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 169.869752][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 169.886834][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 169.896627][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.906206][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 169.918326][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 169.926994][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.987248][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.009665][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.027263][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.042864][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.053097][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.067180][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.078913][ T7993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.092717][ T7993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.105214][ T7993] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.129669][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 22:17:20 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x70e000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x713e, 0x0, 0x10001, 0x100}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) lstat(0x0, &(0x7f0000000b00)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x10, 0x0) write$P9_RRENAME(r4, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) ioprio_set$pid(0x0, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = memfd_create(&(0x7f000003e000)='\'', 0x0) r7 = dup2(0xffffffffffffffff, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000400)={r8}, &(0x7f0000000080)=0x8) fallocate(r5, 0x0, 0x40000000, 0x10000101) [ 170.153441][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.178288][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.188075][ T3633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.210429][ T7996] device veth0_macvtap entered promiscuous mode [ 170.274159][ T7996] device veth1_macvtap entered promiscuous mode 22:17:20 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 170.332970][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.353254][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.364805][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.387523][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.398948][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.409537][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.419412][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.443480][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.454475][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.464935][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.476961][ T7996] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.491972][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 170.500207][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 22:17:21 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x70e000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x713e, 0x0, 0x10001, 0x100}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) lstat(0x0, &(0x7f0000000b00)) r4 = open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x10, 0x0) write$P9_RRENAME(r4, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x6010) ioprio_set$pid(0x0, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r6 = memfd_create(&(0x7f000003e000)='\'', 0x0) r7 = dup2(0xffffffffffffffff, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000400)={r8}, &(0x7f0000000080)=0x8) fallocate(r5, 0x0, 0x40000000, 0x10000101) [ 170.539763][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.549616][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.572197][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.586828][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.597069][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.610126][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.640367][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.650957][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.670167][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.681228][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.691330][ T7996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.702165][ T7996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.716615][ T7996] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.733423][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.759712][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:17:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/41, 0x29}], 0x1}, 0x0) 22:17:21 executing program 0: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0x4, 0x0, 0x4, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 22:17:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x198}, 0x67) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r1, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) 22:17:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/41, 0x29}], 0x1}, 0x0) 22:17:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffbd}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@deltaction={0x14, 0x31, 0x11}, 0x14}}, 0x0) 22:17:22 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0x4, 0x0, 0x4, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 22:17:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0x4, 0x0, 0x4, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 22:17:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffbd}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@deltaction={0x14, 0x31, 0x11}, 0x14}}, 0x0) 22:17:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/41, 0x29}], 0x1}, 0x0) 22:17:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x198}, 0x67) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r1, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) 22:17:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x198}, 0x67) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r1, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) 22:17:23 executing program 3: r0 = socket$kcm(0x10, 0x100000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000016008105e00f80e045e4b37c4cb33fab463c16306910b0cf4da33a36819896bb8d76ecdb4cb92e0a0002", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, &(0x7f000000dcc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x136}, 0x0) 22:17:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffbd}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@deltaction={0x14, 0x31, 0x11}, 0x14}}, 0x0) 22:17:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x198}, 0x67) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r1, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) 22:17:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x198}, 0x67) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r1, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) 22:17:23 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 22:17:23 executing program 0: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:23 executing program 5: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:23 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:23 executing program 3: r0 = socket$kcm(0x10, 0x100000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000016008105e00f80e045e4b37c4cb33fab463c16306910b0cf4da33a36819896bb8d76ecdb4cb92e0a0002", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, &(0x7f000000dcc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x136}, 0x0) 22:17:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x198}, 0x67) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r1, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) 22:17:23 executing program 3: r0 = socket$kcm(0x10, 0x100000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000016008105e00f80e045e4b37c4cb33fab463c16306910b0cf4da33a36819896bb8d76ecdb4cb92e0a0002", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, &(0x7f000000dcc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x136}, 0x0) 22:17:23 executing program 1: r0 = socket$kcm(0x10, 0x100000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000016008105e00f80e045e4b37c4cb33fab463c16306910b0cf4da33a36819896bb8d76ecdb4cb92e0a0002", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, &(0x7f000000dcc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x136}, 0x0) 22:17:24 executing program 0: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:24 executing program 2: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:24 executing program 3: r0 = socket$kcm(0x10, 0x100000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000016008105e00f80e045e4b37c4cb33fab463c16306910b0cf4da33a36819896bb8d76ecdb4cb92e0a0002", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, &(0x7f000000dcc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x136}, 0x0) 22:17:24 executing program 1: r0 = socket$kcm(0x10, 0x100000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000016008105e00f80e045e4b37c4cb33fab463c16306910b0cf4da33a36819896bb8d76ecdb4cb92e0a0002", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, &(0x7f000000dcc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x136}, 0x0) 22:17:24 executing program 5: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:24 executing program 1: r0 = socket$kcm(0x10, 0x100000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000016008105e00f80e045e4b37c4cb33fab463c16306910b0cf4da33a36819896bb8d76ecdb4cb92e0a0002", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg$kcm(r0, &(0x7f000000dcc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x136}, 0x0) 22:17:24 executing program 3: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:24 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='auxv\x00') openat$cgroup_ro(r0, &(0x7f0000000b00)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={@remote, @dev={0xfe, 0x80, [], 0xe}, @empty, 0xf0, 0x400, 0x4, 0x100, 0x5, 0x1000020}) ftruncate(0xffffffffffffffff, 0x800799c) r3 = memfd_create(0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r3, 0x0) r4 = memfd_create(&(0x7f0000000000), 0x0) ftruncate(r4, 0x800799c) memfd_create(&(0x7f0000000100)='{%wlan0em1cpuset\'eth1#\x8a}vmnet1eth0keyring\\system@GPL\x00', 0x2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r4, 0x0) getuid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x6000000000010, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) accept$alg(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 22:17:24 executing program 1: pipe2(&(0x7f0000000100), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x100, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xd0, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc0, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x1}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x5}}]}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x20, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0xffff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80, 0x7}}]}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe51, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x100}, 0x1, 0x0, 0x0, 0x4004}, 0x0) 22:17:25 executing program 1: pipe2(&(0x7f0000000100), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x100, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xd0, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc0, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x1}, @IFLA_VLAN_INGRESS_QOS={0x10, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x5}}]}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x20, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0xffff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80, 0x7}}]}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe51, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x100}, 0x1, 0x0, 0x0, 0x4004}, 0x0) [ 174.963338][ T8293] ================================================================== [ 174.971492][ T8293] BUG: KCSAN: data-race in page_counter_try_charge / page_counter_try_charge [ 174.980259][ T8293] [ 174.982594][ T8293] write to 0xffff88821b672150 of 8 bytes by task 8292 on cpu 1: [ 174.990227][ T8293] page_counter_try_charge+0x7e/0x170 [ 174.995610][ T8293] try_charge+0x185/0xbf0 [ 174.999947][ T8293] mem_cgroup_try_charge+0xd2/0x260 [ 175.005155][ T8293] mem_cgroup_try_charge_delay+0x3a/0x80 [ 175.010788][ T8293] shmem_getpage_gfp+0x3bf/0x1390 [ 175.015813][ T8293] shmem_fault+0x114/0x470 [ 175.020241][ T8293] __do_fault+0xae/0x1f0 [ 175.024493][ T8293] __handle_mm_fault+0x270d/0x2e00 [ 175.029611][ T8293] handle_mm_fault+0x21b/0x530 [ 175.034382][ T8293] __get_user_pages+0x485/0x1130 [ 175.039324][ T8293] populate_vma_page_range+0xe6/0x100 [ 175.044700][ T8293] __mm_populate+0x168/0x2a0 [ 175.049297][ T8293] vm_mmap_pgoff+0x181/0x190 [ 175.053891][ T8293] ksys_mmap_pgoff+0x2d8/0x420 [ 175.058658][ T8293] __x64_sys_mmap+0x2e/0x40 [ 175.063163][ T8293] do_syscall_64+0xcc/0x3a0 [ 175.067677][ T8293] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 175.073583][ T8293] [ 175.075935][ T8293] read to 0xffff88821b672150 of 8 bytes by task 8293 on cpu 0: [ 175.083525][ T8293] page_counter_try_charge+0x58/0x170 [ 175.088909][ T8293] try_charge+0x185/0xbf0 [ 175.093255][ T8293] mem_cgroup_try_charge+0xd2/0x260 [ 175.098472][ T8293] mem_cgroup_try_charge_delay+0x3a/0x80 [ 175.104120][ T8293] shmem_getpage_gfp+0x3bf/0x1390 [ 175.109153][ T8293] shmem_fault+0x114/0x470 [ 175.113582][ T8293] __do_fault+0xae/0x1f0 [ 175.117840][ T8293] __handle_mm_fault+0x270d/0x2e00 [ 175.122968][ T8293] handle_mm_fault+0x21b/0x530 [ 175.127754][ T8293] __get_user_pages+0x485/0x1130 [ 175.132800][ T8293] populate_vma_page_range+0xe6/0x100 [ 175.138184][ T8293] __mm_populate+0x168/0x2a0 [ 175.142783][ T8293] vm_mmap_pgoff+0x181/0x190 [ 175.147376][ T8293] ksys_mmap_pgoff+0x2d8/0x420 [ 175.152170][ T8293] __x64_sys_mmap+0x2e/0x40 [ 175.156680][ T8293] do_syscall_64+0xcc/0x3a0 [ 175.161192][ T8293] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 175.167076][ T8293] [ 175.169402][ T8293] Reported by Kernel Concurrency Sanitizer on: [ 175.175653][ T8293] CPU: 0 PID: 8293 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 175.184263][ T8293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.194320][ T8293] ================================================================== [ 175.202387][ T8293] Kernel panic - not syncing: panic_on_warn set ... [ 175.208987][ T8293] CPU: 0 PID: 8293 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 175.217572][ T8293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.227633][ T8293] Call Trace: [ 175.230940][ T8293] dump_stack+0x11d/0x181 [ 175.235285][ T8293] panic+0x210/0x640 [ 175.239320][ T8293] ? vprintk_func+0x8d/0x140 [ 175.243922][ T8293] kcsan_report.cold+0xc/0x1a [ 175.248615][ T8293] kcsan_setup_watchpoint+0x307/0x400 [ 175.254006][ T8293] __tsan_read8+0xc6/0x100 [ 175.258429][ T8293] page_counter_try_charge+0x58/0x170 [ 175.263806][ T8293] try_charge+0x185/0xbf0 [ 175.268165][ T8293] mem_cgroup_try_charge+0xd2/0x260 [ 175.273391][ T8293] mem_cgroup_try_charge_delay+0x3a/0x80 [ 175.279043][ T8293] shmem_getpage_gfp+0x3bf/0x1390 [ 175.284092][ T8293] shmem_fault+0x114/0x470 [ 175.288517][ T8293] ? preempt_schedule+0x30/0x40 [ 175.293378][ T8293] ? preempt_schedule_common+0x37/0x90 [ 175.298852][ T8293] __do_fault+0xae/0x1f0 [ 175.303117][ T8293] __handle_mm_fault+0x270d/0x2e00 [ 175.308263][ T8293] handle_mm_fault+0x21b/0x530 [ 175.313044][ T8293] __get_user_pages+0x485/0x1130 [ 175.318009][ T8293] populate_vma_page_range+0xe6/0x100 [ 175.323399][ T8293] __mm_populate+0x168/0x2a0 [ 175.328010][ T8293] vm_mmap_pgoff+0x181/0x190 [ 175.332619][ T8293] ksys_mmap_pgoff+0x2d8/0x420 [ 175.337399][ T8293] __x64_sys_mmap+0x2e/0x40 [ 175.341923][ T8293] do_syscall_64+0xcc/0x3a0 [ 175.346445][ T8293] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 175.352345][ T8293] RIP: 0033:0x45c429 [ 175.356251][ T8293] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.375934][ T8293] RSP: 002b:00007fdb4e1d1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 175.384390][ T8293] RAX: ffffffffffffffda RBX: 00007fdb4e1d26d4 RCX: 000000000045c429 [ 175.392377][ T8293] RDX: 000000000000a601 RSI: 0000000000400000 RDI: 0000000020200000 [ 175.400409][ T8293] RBP: 000000000076bf20 R08: 0000000000000008 R09: 0000000000000000 [ 175.408421][ T8293] R10: 0000000000002012 R11: 0000000000000246 R12: 00000000ffffffff [ 175.416390][ T8293] R13: 0000000000000737 R14: 00000000004c9b3f R15: 000000000076bf2c [ 175.425608][ T8293] Kernel Offset: disabled [ 175.429976][ T8293] Rebooting in 86400 seconds..