2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:31:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8981, &(0x7f0000000280)={'ip6tnl0\x00', 0x0}) 05:31:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_TIOCINQ(r0, 0xc0189436, 0x0) 05:31:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:43 executing program 3: socket(0x25, 0x1, 0x7) 05:31:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) [ 612.509688][T32339] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:31:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 05:31:43 executing program 0: select(0x40, &(0x7f0000000000)={0x7}, &(0x7f0000000040)={0x5}, 0x0, &(0x7f00000000c0)) 05:31:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000001c80)={&(0x7f0000000000), 0x5f5e0ff, &(0x7f0000001c40)={&(0x7f0000000280)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}}}, [@NL80211_ATTR_NAN_FUNC={0x8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_INFO={0xffffffffffffffe9}]}, @NL80211_ATTR_NAN_FUNC={0x4}]}, 0x28}}, 0x0) 05:31:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:31:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:44 executing program 3: ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 05:31:44 executing program 5: io_setup(0x66cd, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, 0x0) 05:31:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:44 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0205647, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73950917"}, 0x0, 0x0, @userptr}) [ 612.716191][T32365] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:31:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8943, &(0x7f0000000280)={'ip6tnl0\x00', 0x0}) 05:31:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:44 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r2, @ANYBLOB='@'], 0x3c}}, 0x0) 05:31:44 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 05:31:44 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, 0x0) 05:31:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000700)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000180)='P', 0x1}, {&(0x7f0000000200)="a4", 0x1}, {&(0x7f00000002c0)='$', 0x1}], 0x3}, 0x0) 05:31:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:44 executing program 3: capset(&(0x7f0000002100)={0x20071026}, 0x0) 05:31:44 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r2, @ANYBLOB='@'], 0x3c}}, 0x0) 05:31:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:44 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000002100)=[{}], 0x1, 0x0, &(0x7f0000002140), 0x8) 05:31:44 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000002fc0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8010500d, &(0x7f00000000c0)) 05:31:44 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r2, @ANYBLOB='@'], 0x3c}}, 0x0) 05:31:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:44 executing program 5: sysfs$2(0x2, 0xcc000000, 0x0) 05:31:44 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0xd000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5000) 05:31:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:44 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0205649, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73950917"}, 0x0, 0x0, @userptr}) 05:31:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:31:44 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 05:31:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_TIOCINQ(r0, 0x5460, 0x0) 05:31:44 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe) 05:31:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:31:44 executing program 3: set_mempolicy(0x1, &(0x7f00000000c0)=0x7, 0x44d) 05:31:47 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 05:31:47 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xa, 0xffffffffffffffff, 0x0) 05:31:47 executing program 5: select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) 05:31:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="1f"], 0x184}}, 0x0) 05:31:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 05:31:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:31:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 05:31:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x4230}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:48 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 05:31:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x4230}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:50 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) write$char_usb(r0, 0x0, 0x0) 05:31:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x2, 0x0, &(0x7f0000000040)={0x0, 0x0}) 05:31:50 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f00000000c0)=""/189, 0x32, 0xbd, 0x6}, 0x20) 05:31:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x4230}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:50 executing program 3: 05:31:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) 05:31:50 executing program 3: 05:31:50 executing program 5: 05:31:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:31:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:53 executing program 3: 05:31:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) 05:31:53 executing program 5: 05:31:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:31:53 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x0) 05:31:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:31:53 executing program 5: 05:31:53 executing program 3: 05:31:53 executing program 5: 05:31:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3], 0x3c}}, 0x0) [ 622.543069][T32668] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:31:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:56 executing program 3: 05:31:56 executing program 2: 05:31:56 executing program 5: 05:31:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3], 0x3c}}, 0x0) 05:31:56 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:56 executing program 5: 05:31:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3], 0x3c}}, 0x0) 05:31:56 executing program 2: 05:31:56 executing program 3: [ 625.393318][T32691] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:31:56 executing program 5: 05:31:56 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 625.461450][T32701] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:31:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x7) 05:31:59 executing program 3: 05:31:59 executing program 2: 05:31:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) 05:31:59 executing program 5: 05:31:59 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:31:59 executing program 2: 05:31:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) 05:31:59 executing program 5: 05:31:59 executing program 2: 05:31:59 executing program 3: [ 628.432053][T32732] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:31:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32=r3, @ANYBLOB], 0x3c}}, 0x0) [ 628.541472][T32746] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 628.620026][T32755] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x7) 05:32:02 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:02 executing program 2: 05:32:02 executing program 5: 05:32:02 executing program 3: 05:32:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:02 executing program 3: 05:32:02 executing program 2: 05:32:02 executing program 5: 05:32:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYBLOB='@'], 0x3c}}, 0x0) [ 631.479868][ T306] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:02 executing program 3: 05:32:02 executing program 2: [ 631.593266][ T319] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:03 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x7) 05:32:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:05 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:05 executing program 5: 05:32:05 executing program 3: 05:32:05 executing program 2: 05:32:05 executing program 3: 05:32:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:05 executing program 2: 05:32:05 executing program 5: [ 634.520301][ T347] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:05 executing program 3: epoll_create1(0x0) syz_genetlink_get_family_id$netlbl_mgmt(0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) 05:32:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x30, 0x0, 0x300) 05:32:06 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x10000000) [ 634.629953][ T357] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:08 executing program 3: setrlimit(0x7, &(0x7f0000000200)) socket$inet_tcp(0x2, 0x1, 0x0) 05:32:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x7) 05:32:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x0, 0x683}, 0x40) 05:32:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:08 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:08 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='8', 0x1, 0xfffffffffffffffb) 05:32:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x8, &(0x7f0000000000)="a449f5ba", 0x4) 05:32:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c0000000000000000", @ANYRES32, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1c}, 0x40) 05:32:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4b, 0x0, 0x300) [ 637.629998][ T394] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x6, 0x0, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x8b, &(0x7f00000000c0)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:32:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0x5452, 0x400000) 05:32:09 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000400), 0x0, 0x0) [ 637.736129][ T410] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x1, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}}}}) 05:32:11 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:11 executing program 5: clone(0x200800, 0x0, 0x0, 0x0, 0x0) 05:32:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f00000002c0)=@framed={{}, [@exit]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x8b, &(0x7f00000000c0)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:32:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, 0x0, 0x0, 0x7) 05:32:12 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @initdev}, &(0x7f00000002c0)=0x10) exit_group(0x1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="040000000000000000000b00000008000b0006000000060028000300000008000600", @ANYRES32, @ANYBLOB="74661600e4f725130da84ce4fcbb5955b7fdb77da1a873e2442cd30f3d0e3cf0677100f226dcbb59bcf57d78252f47ac4f7f658e957cc9145ef4a2985e0a8b71947b342a"], 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x4004010) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x55002101}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="00002bbd7000fedbdf250200000008002b000400000004f47f5d4e7c47c0ac5fbd698e18a222deb49116352eb2354772bbbe61e04b562da7e94a85df3b6b2aa05cd0f1d3f4f10931a73720dc6ec88feb3d278e4694b03ef3265c2b67e13dd4e8bb88f16fe5dc45db45ce0cda463cc07d7cd71ce93ef4bf76505e081cf3b32ed28bccc36ddf47092fa83ec0d9c3b4e3cc9b1de48737ded5a9d9928f6bf6619d2277595add6d889689845024c7e9a4f6614785e78d2a0824c233acb6afffd9ce59e48eb089"], 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x800) syz_emit_ethernet(0xac, &(0x7f00000008c0)=ANY=[@ANYBLOB="ffffff00fffff674049167a686dd60a4f00800763a00033c0000000000000000000000000000ff020000000000000000000000000001810090780001000712f7e3bb9c627841e41e86c2d679bca26292e4e9f337493d2f8fc0f1e4933f13c821857c05dfe2cbe163c368da8f1a120b7ebc4892734f9429423fa648727580e11ff864ea173e04e30bcfb5d56458ca03000000e1980600b254b78e7406597d96152a6d39675399549f5d99a0438521a751f70740ae8be20c53a4bef2b4aeda3d8372c212177d65690c94f137550999b4d47e14a4f3127a53beb711017b25dca5c33506907392b7ba194fa568640faafe2da4d5d0a85976854ebd17e91f37c4cfcff0f0475a4105a9b0bae2a8cba7ac8b48ca56404406dd2434d27e2549b583a36d23880e6b2d9446c44c640be70aa23cd181c6cfcacda020475e34c069461452a8db"], 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000780)={{0x0, @empty, 0x4e21, 0x1000, 'ovf\x00', 0x10, 0xffff0008, 0x76}, {@private=0xa010102, 0x4e20, 0x2, 0x17d94dad, 0x725979f1, 0x8001}}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2400c05d}, 0x0) r2 = socket(0x2, 0x803, 0xff) syz_emit_ethernet(0x9e, &(0x7f0000000800)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "42bf00", 0x68, 0x3a, 0x0, @local={0xfe, 0x80, [0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7c, {0x0, 0x6, "7f112d", 0x8001, 0x29, 0x1, @mcast1, @remote, [@dstopts={0x0, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3a], [@enc_lim, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x10, 0x0, [@mcast2]}]}}}}}}}, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2a, 0x2) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000300)={0x0, 0x7f}, 0x8) dup2(r0, r3) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:32:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[], 0x78}}, 0x0) 05:32:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:32:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@flowinfo={{0x14}}, @hopopts={{0x18}}], 0x30}, 0x0) 05:32:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)='\b', 0xfffffdef, 0x1f4, 0x0, 0x0) 05:32:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) [ 641.612729][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 641.619830][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.355702][ T455] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 642.420867][ T455] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 643.065101][ T455] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.073985][ T455] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.082817][ T455] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.092117][ T455] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 643.290387][ T455] syz-executor.5 (455) used greatest stack depth: 9800 bytes left 05:32:15 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, 0x0, 0x0, 0x7) 05:32:15 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r0, 0x0, 0x0, 0x0}, 0x30) 05:32:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @initdev}, &(0x7f00000002c0)=0x10) exit_group(0x1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="040000000000000000000b00000008000b0006000000060028000300000008000600", @ANYRES32, @ANYBLOB="74661600e4f725130da84ce4fcbb5955b7fdb77da1a873e2442cd30f3d0e3cf0677100f226dcbb59bcf57d78252f47ac4f7f658e957cc9145ef4a2985e0a8b71947b342a"], 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x4004010) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x55002101}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="00002bbd7000fedbdf250200000008002b000400000004f47f5d4e7c47c0ac5fbd698e18a222deb49116352eb2354772bbbe61e04b562da7e94a85df3b6b2aa05cd0f1d3f4f10931a73720dc6ec88feb3d278e4694b03ef3265c2b67e13dd4e8bb88f16fe5dc45db45ce0cda463cc07d7cd71ce93ef4bf76505e081cf3b32ed28bccc36ddf47092fa83ec0d9c3b4e3cc9b1de48737ded5a9d9928f6bf6619d2277595add6d889689845024c7e9a4f6614785e78d2a0824c233acb6afffd9ce59e48eb089"], 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x800) syz_emit_ethernet(0xac, &(0x7f00000008c0)=ANY=[@ANYBLOB="ffffff00fffff674049167a686dd60a4f00800763a00033c0000000000000000000000000000ff020000000000000000000000000001810090780001000712f7e3bb9c627841e41e86c2d679bca26292e4e9f337493d2f8fc0f1e4933f13c821857c05dfe2cbe163c368da8f1a120b7ebc4892734f9429423fa648727580e11ff864ea173e04e30bcfb5d56458ca03000000e1980600b254b78e7406597d96152a6d39675399549f5d99a0438521a751f70740ae8be20c53a4bef2b4aeda3d8372c212177d65690c94f137550999b4d47e14a4f3127a53beb711017b25dca5c33506907392b7ba194fa568640faafe2da4d5d0a85976854ebd17e91f37c4cfcff0f0475a4105a9b0bae2a8cba7ac8b48ca56404406dd2434d27e2549b583a36d23880e6b2d9446c44c640be70aa23cd181c6cfcacda020475e34c069461452a8db"], 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000780)={{0x0, @empty, 0x4e21, 0x1000, 'ovf\x00', 0x10, 0xffff0008, 0x76}, {@private=0xa010102, 0x4e20, 0x2, 0x17d94dad, 0x725979f1, 0x8001}}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2400c05d}, 0x0) r2 = socket(0x2, 0x803, 0xff) syz_emit_ethernet(0x9e, &(0x7f0000000800)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "42bf00", 0x68, 0x3a, 0x0, @local={0xfe, 0x80, [0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7c, {0x0, 0x6, "7f112d", 0x8001, 0x29, 0x1, @mcast1, @remote, [@dstopts={0x0, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3a], [@enc_lim, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x10, 0x0, [@mcast2]}]}}}}}}}, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2a, 0x2) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000300)={0x0, 0x7f}, 0x8) dup2(r0, r3) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:32:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "239636da5964bb27"}) 05:32:15 executing program 2: getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) 05:32:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @initdev}, &(0x7f00000002c0)=0x10) exit_group(0x1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="040000000000000000000b00000008000b0006000000060028000300000008000600", @ANYRES32, @ANYBLOB="74661600e4f725130da84ce4fcbb5955b7fdb77da1a873e2442cd30f3d0e3cf0677100f226dcbb59bcf57d78252f47ac4f7f658e957cc9145ef4a2985e0a8b71947b342a"], 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x4004010) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x55002101}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="00002bbd7000fedbdf250200000008002b000400000004f47f5d4e7c47c0ac5fbd698e18a222deb49116352eb2354772bbbe61e04b562da7e94a85df3b6b2aa05cd0f1d3f4f10931a73720dc6ec88feb3d278e4694b03ef3265c2b67e13dd4e8bb88f16fe5dc45db45ce0cda463cc07d7cd71ce93ef4bf76505e081cf3b32ed28bccc36ddf47092fa83ec0d9c3b4e3cc9b1de48737ded5a9d9928f6bf6619d2277595add6d889689845024c7e9a4f6614785e78d2a0824c233acb6afffd9ce59e48eb089"], 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x800) syz_emit_ethernet(0xac, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000780)={{0x0, @empty, 0x4e21, 0x1000, 'ovf\x00', 0x10, 0xffff0008, 0x76}, {@private=0xa010102, 0x4e20, 0x2, 0x17d94dad, 0x725979f1, 0x8001}}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2400c05d}, 0x0) r2 = socket(0x2, 0x803, 0xff) syz_emit_ethernet(0x9e, &(0x7f0000000800)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "42bf00", 0x68, 0x3a, 0x0, @local={0xfe, 0x80, [0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7c, {0x0, 0x6, "7f112d", 0x8001, 0x29, 0x1, @mcast1, @remote, [@dstopts={0x0, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3a], [@enc_lim, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x10, 0x0, [@mcast2]}]}}}}}}}, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2a, 0x2) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000300)={0x0, 0x7f}, 0x8) dup2(r0, r3) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:32:15 executing program 3: 05:32:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @initdev}, &(0x7f00000002c0)=0x10) exit_group(0x1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="040000000000000000000b00000008000b0006000000060028000300000008000600", @ANYRES32, @ANYBLOB="74661600e4f725130da84ce4fcbb5955b7fdb77da1a873e2442cd30f3d0e3cf0677100f226dcbb59bcf57d78252f47ac4f7f658e957cc9145ef4a2985e0a8b71947b342a"], 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x4004010) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x55002101}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="00002bbd7000fedbdf250200000008002b000400000004f47f5d4e7c47c0ac5fbd698e18a222deb49116352eb2354772bbbe61e04b562da7e94a85df3b6b2aa05cd0f1d3f4f10931a73720dc6ec88feb3d278e4694b03ef3265c2b67e13dd4e8bb88f16fe5dc45db45ce0cda463cc07d7cd71ce93ef4bf76505e081cf3b32ed28bccc36ddf47092fa83ec0d9c3b4e3cc9b1de48737ded5a9d9928f6bf6619d2277595add6d889689845024c7e9a4f6614785e78d2a0824c233acb6afffd9ce59e48eb089"], 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x800) syz_emit_ethernet(0xac, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000780)={{0x0, @empty, 0x4e21, 0x1000, 'ovf\x00', 0x10, 0xffff0008, 0x76}, {@private=0xa010102, 0x4e20, 0x2, 0x17d94dad, 0x725979f1, 0x8001}}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2400c05d}, 0x0) r2 = socket(0x2, 0x803, 0xff) syz_emit_ethernet(0x9e, &(0x7f0000000800)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "42bf00", 0x68, 0x3a, 0x0, @local={0xfe, 0x80, [0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7c, {0x0, 0x6, "7f112d", 0x8001, 0x29, 0x1, @mcast1, @remote, [@dstopts={0x0, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3a], [@enc_lim, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x10, 0x0, [@mcast2]}]}}}}}}}, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2a, 0x2) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000300)={0x0, 0x7f}, 0x8) dup2(r0, r3) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:32:15 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:15 executing program 3: 05:32:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, 0x0, 0x0, 0x7) 05:32:18 executing program 5: 05:32:18 executing program 2: 05:32:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:18 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:18 executing program 3: 05:32:18 executing program 5: 05:32:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x28, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x7, './file0', './file0'}}, 0x6c}}, 0x0) 05:32:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 05:32:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x44044, 0x0, 0x0) 05:32:18 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:21 executing program 5: r0 = openat$fuse(0xffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 05:32:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x0) 05:32:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x104) 05:32:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000007c0)={&(0x7f00000003c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x30}}}, 0x1c, 0x0}, 0x88c0) 05:32:21 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:32:21 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff}, 0x14}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x145042, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) pwritev(r1, &(0x7f0000000080), 0xc3, 0x0, 0x0) socketpair(0x27, 0x5, 0x2, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c467144d2fa8332053bdcd4ad04d6c7c7be1f7dda24c805ab57aa5542c6d66114a53ee9c7d91c64ffa0fb67006661ca2f1a4c21974e94d8992dca1745e12921570f62484dc9122b6fb779501ab6f782dd7c55062d48e6254c190dd68a82bab9f06dafd6b1276a785595096a7cc88f6f396b83cb7daabdb184ac20457cdaf6c5feb20"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="0081e400ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x14, 0x2, [@TCA_BASIC_EMATCHES={0x5, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x4}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x44}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000001200)={'syztnl2\x00', &(0x7f0000000180)={'gre0\x00', r7, 0x40, 0x700, 0xffffffff, 0x381, {{0x17, 0x4, 0x1, 0x5, 0x5c, 0x68, 0x0, 0x1, 0x2f, 0x0, @private=0xa010102, @local, {[@lsrr={0x83, 0x7, 0x12, [@multicast1]}, @rr={0x7, 0x13, 0xf9, [@dev={0xac, 0x14, 0x14, 0x19}, @local, @broadcast, @empty]}, @timestamp_prespec={0x44, 0x14, 0xc3, 0x3, 0x9, [{@local, 0x10001}, {@multicast2, 0x1ff}]}, @ssrr={0x89, 0x17, 0x7e, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback]}]}}}}}) 05:32:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001dc0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x1c, &(0x7f0000000100)=[{&(0x7f00000000c0)="fa", 0x1}], 0x1, &(0x7f0000000140)=[@rthdr={{0x14}}, @rthdrdstopts={{0x14}}], 0x28}}, {{&(0x7f0000000500)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=[@flowinfo={{0x10, 0x29, 0xb, 0x5}}], 0x10}}], 0x2, 0x0) 05:32:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:21 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) [ 649.816058][ T604] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:21 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:32:21 executing program 3: add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 05:32:21 executing program 5: openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x194083, 0x0) openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) [ 649.979793][ T630] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:24 executing program 3: 05:32:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x0) 05:32:24 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f00000001c0)) 05:32:24 executing program 5: 05:32:24 executing program 0: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:32:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:24 executing program 3: 05:32:24 executing program 5: 05:32:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:24 executing program 2: [ 652.897145][ T659] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:24 executing program 3: 05:32:24 executing program 0: getpid() openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_RUN(r0, 0xae80, 0x0) 05:32:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x891b, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_mtu}) [ 653.048031][ T679] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:27 executing program 0: getpid() openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_RUN(r0, 0xae80, 0x0) 05:32:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x20, r0, 0x0, 0x0) 05:32:27 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000940)='/dev/full\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004200)={0x2020}, 0x2020) 05:32:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:27 executing program 3: openat$autofs(0xffffffffffffff9c, 0x0, 0x511000, 0x0) 05:32:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 05:32:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, @l2tp, @tipc=@id, @phonet={0x23, 0x0, 0x0, 0x34}}) 05:32:27 executing program 0: getpid() openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_RUN(r0, 0xae80, 0x0) 05:32:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002400)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000017c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40008002, 0x0) 05:32:27 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0xc0040, 0x0) 05:32:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) [ 655.937057][ T701] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:27 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 05:32:27 executing program 0: getpid() r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 656.074246][ T720] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:30 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20005f) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000500000000000000000300030000000000000000003804000000000000000000800800200001"], 0x58) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(r0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:32:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x0) 05:32:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:30 executing program 3: r0 = msgget(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x0) 05:32:30 executing program 0: getpid() r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:32:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000001200)={0x11, @multicast2, 0x4e23, 0x1, 'none\x00', 0x30, 0x2, 0x2e}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x2, 0x480100) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000001100)={0x0, 0x0, {0x8, 0x31, 0x7, 0xc, 0x0, 0x7a5e5529, 0x6, 0x7}}) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000010c0)) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/4096, &(0x7f0000000000)=0x1000) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000080)={'veth0_to_bridge\x00', @ifru_settings={0x0, 0x0, @cisco=0x0}}) r3 = socket$inet(0x2, 0xa, 0xb1) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000001240)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000be00000029f3255e2e50d8310a1a03031907f9a33d865fb0447b72fa1ae1c9b9db38a8c9da472c77b330456ad2eb65dd1e17ae1ae1ccccf8bd094184ffd934839cced52130323a59d22af6b6c4e1258a92afb045f7d0d5beb0fe565fe3a7f273c318e46c83468e0700000043ec55f59c084399b991ce7eca6496dfac359d6fc5b3d8c39a435855a051193f32a6244587af8db5928e29a79ed4aabf7755bf05a562fd04d9df7744ca6f62c74afcf7230e81181db6dce783d0ed05fe4bdc5b8dee9eaa"], &(0x7f0000001340)=0xe2) getsockname(r1, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001, 0x1010, r0, 0xc505d000) 05:32:30 executing program 2: 05:32:30 executing program 5: 05:32:30 executing program 0: getpid() r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:32:30 executing program 3: 05:32:30 executing program 2: 05:32:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) [ 659.026893][ T746] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:30 executing program 1: 05:32:30 executing program 3: 05:32:30 executing program 5: 05:32:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:30 executing program 2: 05:32:30 executing program 1: 05:32:30 executing program 3: 05:32:30 executing program 5: 05:32:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:30 executing program 2: [ 659.224672][ T767] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:30 executing program 1: 05:32:30 executing program 3: 05:32:30 executing program 2: 05:32:30 executing program 5: 05:32:30 executing program 1: [ 659.426393][ T786] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c00000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:31 executing program 3: 05:32:31 executing program 5: 05:32:31 executing program 2: 05:32:31 executing program 1: 05:32:31 executing program 5: 05:32:31 executing program 1: 05:32:31 executing program 2: 05:32:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:31 executing program 3: 05:32:31 executing program 5: 05:32:31 executing program 1: [ 660.158683][ T817] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c00000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) 05:32:31 executing program 2: 05:32:31 executing program 3: 05:32:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:31 executing program 5: 05:32:31 executing program 1: 05:32:31 executing program 5: 05:32:31 executing program 1: 05:32:31 executing program 3: 05:32:31 executing program 2: 05:32:31 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:32:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c000000100001080000000c00000000000000", @ANYRES32=r3, @ANYBLOB='@'], 0x3c}}, 0x0) [ 660.309740][ T830] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:31 executing program 5: 05:32:31 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0x4020940d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "73950917"}, 0x0, 0x0, @userptr}) 05:32:31 executing program 3: 05:32:31 executing program 1: 05:32:31 executing program 5: 05:32:31 executing program 3: 05:32:31 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:32:31 executing program 2: 05:32:31 executing program 1: 05:32:31 executing program 4: [ 660.510285][ T848] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:31 executing program 5: 05:32:31 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:32:31 executing program 3: 05:32:31 executing program 1: 05:32:32 executing program 4: 05:32:32 executing program 2: 05:32:32 executing program 5: 05:32:32 executing program 1: 05:32:32 executing program 3: 05:32:32 executing program 4: 05:32:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:32 executing program 2: 05:32:32 executing program 5: 05:32:32 executing program 3: 05:32:32 executing program 1: 05:32:32 executing program 4: 05:32:32 executing program 2: 05:32:32 executing program 5: 05:32:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:32 executing program 3: 05:32:32 executing program 1: 05:32:32 executing program 2: 05:32:32 executing program 4: 05:32:32 executing program 5: 05:32:32 executing program 1: 05:32:32 executing program 2: 05:32:32 executing program 3: 05:32:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:32 executing program 5: 05:32:32 executing program 4: 05:32:32 executing program 1: 05:32:32 executing program 3: 05:32:32 executing program 2: 05:32:32 executing program 5: 05:32:32 executing program 4: 05:32:32 executing program 2: 05:32:32 executing program 1: 05:32:32 executing program 3: 05:32:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 05:32:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e2f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000000ac78aee630b40d9ae2efa3163fd2529010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000e2f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000013400)="504d4d00504d4dff", 0x8, 0x40000}], 0x0, &(0x7f0000000440)=ANY=[]) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x410481, 0x0) pwritev(r0, &(0x7f00000014c0), 0x0, 0x7300, 0x20) pipe2(0x0, 0x0) io_setup(0x5, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1}) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x0, 0x3, 0x6}}, 0x14) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, 0x0, 0x0) 05:32:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self\x00', 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000002280)=""/4113, 0x1011) 05:32:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x3}, {0x5}]}) 05:32:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self\x00', 0x0, 0x0) dup3(r1, r0, 0x0) getdents(r0, &(0x7f0000002280)=""/4113, 0x1011) 05:32:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000002680)={&(0x7f00000023c0)={0x14, 0x0, 0x3, 0x5}, 0x14}}, 0x0) [ 661.354373][ T927] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 05:32:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setregid(r1, 0xffffffffffffffff) 05:32:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 05:32:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x80045438, 0x74a000) 05:32:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000000106050000000000000000000c00000a0900020073797a3000000000050001"], 0x30}}, 0x0) 05:32:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) 05:32:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000000706050000000000000000000c00000a040002"], 0x30}}, 0x0) 05:32:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x16, 0x0, 0x7fffffff, 0x5, 0x28}, 0x40) 05:32:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000000406050000000000000000000c00000a0900020073797a3000000000050001"], 0x30}}, 0x0) 05:32:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="30000000050605"], 0x30}}, 0x0) [ 661.544163][ T963] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 05:32:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010180000000000001001b000000080001"], 0x38}}, 0x0) 05:32:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xfff}) 05:32:33 executing program 3: clone(0x2000000006808300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000000)='v', 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) dup(0xffffffffffffffff) tkill(r0, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) 05:32:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="cc000000965caf"], 0xcc}}, 0x0) [ 661.675381][ T980] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 661.687381][ T981] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 05:32:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000002680)={&(0x7f00000023c0)={0x14, 0x5, 0x6, 0x101}, 0x14}}, 0x0) 05:32:33 executing program 3: msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000300)={0x0, ""/210}, 0xda, 0x0, 0x0) 05:32:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:33 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 05:32:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 661.768218][ T991] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 05:32:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:32:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private0}}) [ 661.838255][ T1006] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 05:32:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7, 0x7800}}) 05:32:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:33 executing program 2: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa, 0xffffffffffffffff) 05:32:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:33 executing program 5: mq_open(&(0x7f0000000040)='.\'.\x00', 0x0, 0x0, 0x0) 05:32:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = epoll_create(0x4) dup3(r0, r1, 0x0) 05:32:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890b, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x8002) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 05:32:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000000c0)={'sit0\x00', 0x0}) 05:32:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) r1 = gettid() tkill(r1, 0x15) 05:32:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000002680)={0x0}, 0x7}, 0x0) 05:32:33 executing program 2: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x10) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 05:32:33 executing program 3: socket(0x0, 0xa00, 0x0) 05:32:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x1) 05:32:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:33 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x4000, 0x0) 05:32:33 executing program 2: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x10) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 05:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8901, 0x0) 05:32:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xe) 05:32:33 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000bfe000/0x400000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0}, 0x68) 05:32:33 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000240)) timer_gettime(0x0, &(0x7f0000000280)) 05:32:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @loopback}}) 05:32:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, 0x0}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 662.390991][ T1079] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:32:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000080)={0xfffffffffffffffd, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 662.436898][ T1079] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x0, 0x6, 0x201, 0x0, 0x0, {}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) 05:32:33 executing program 3: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 05:32:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8901, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:34 executing program 1: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0xa07400) 05:32:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, 0x0}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000080)="f818551100e80230743c82d4126c", 0x0}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890c, &(0x7f0000000040)={'syztnl2\x00', 0x0}) 05:32:34 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x8002, 0x0) 05:32:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x4) 05:32:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:34 executing program 3: mq_open(&(0x7f0000000100)='\xc4\x9d\xa0^\xec\xcc\x9c]\xb7\xd9zr\xd1\x97\xe3\xf6\x13^{mf-y\x9d\xca\x0e\xfe\x18\xd2T:\xc7\x04-XC\v\'\f\xd0W}\v\x99\x85F\'\x0f\f\xd7\xb9{\xa6\x04\xdbs}_2\xe2\xc0\xf7\x9c\x00Y\x1b6\xbefM\xe1', 0x0, 0x0, 0x0) 05:32:34 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000240)) timer_gettime(0x0, 0x0) 05:32:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, 0x0}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000002680)={0x0}, 0x1, 0x0, 0x36fe}, 0x0) 05:32:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc01047d0, 0x0) 05:32:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8936, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 05:32:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x12, 0x0, 0x0, "8e02df2313fd2a96a9d5616c5a823513205f959d57d65d158e5ffe92dc0af7ba7e1deba3545e10eb09539d6952e9664e729394e6a44f83454671b812a735f25b", "2a5182c19773a0473851ede11f80341bb8c1e515d45411ab48f7a5752f8d7fb0"}) 05:32:34 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = getpgid(r1) ptrace$peeksig(0x1b, r2, &(0x7f0000000180)={0x0, 0x0, 0x28}, 0x0) 05:32:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 663.233533][ T1196] ptrace attach of "/root/syz-executor.1"[8480] was attempted by "/root/syz-executor.1"[1196] [ 663.276119][ T1197] ptrace attach of "/root/syz-executor.1"[8480] was attempted by "/root/syz-executor.1"[1197] [ 663.494905][ T26] device hsr_slave_0 left promiscuous mode [ 663.519890][ T26] device hsr_slave_1 left promiscuous mode [ 663.530388][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 663.562756][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 663.582222][ T26] device bridge_slave_1 left promiscuous mode [ 663.588351][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 663.613388][ T26] device bridge_slave_0 left promiscuous mode [ 663.619615][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.713284][ T26] team0 (unregistering): Port device team_slave_1 removed [ 663.734546][ T26] team0 (unregistering): Port device team_slave_0 removed [ 663.753846][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 663.775735][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 663.853898][ T26] bond0 (unregistering): Released all slaves [ 667.428864][ T1264] IPVS: ftp: loaded support on port[0] = 21 [ 667.491004][ T1264] chnl_net:caif_netlink_parms(): no params data found [ 667.522245][ T1264] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.529345][ T1264] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.537339][ T1264] device bridge_slave_0 entered promiscuous mode [ 667.545944][ T1264] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.553172][ T1264] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.560586][ T1264] device bridge_slave_1 entered promiscuous mode [ 667.575339][ T1264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 667.586139][ T1264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 667.603182][ T1264] team0: Port device team_slave_0 added [ 667.609931][ T1264] team0: Port device team_slave_1 added [ 667.622905][ T1264] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 667.629835][ T1264] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 667.657161][ T1264] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 667.669117][ T1264] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 667.676106][ T1264] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 667.701992][ T1264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 667.724578][ T1264] device hsr_slave_0 entered promiscuous mode [ 667.731033][ T1264] device hsr_slave_1 entered promiscuous mode [ 667.737744][ T1264] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 667.745625][ T1264] Cannot create hsr debugfs directory [ 667.774053][ T1264] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.781090][ T1264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 667.788653][ T1264] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.795701][ T1264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.826843][ T1264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 667.838004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 667.846738][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.854651][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.863936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 667.875717][ T1264] 8021q: adding VLAN 0 to HW filter on device team0 [ 667.886855][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 667.896324][ T9254] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.903515][ T9254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.922118][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 667.930392][ T489] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.937446][ T489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 667.947635][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 667.957942][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 667.966281][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 667.981047][ T1264] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 667.993035][ T1264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 668.005403][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.014704][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 668.023821][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 668.041679][ T1264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 668.049934][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 668.059388][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 668.094563][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 668.107474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 668.116947][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 668.125415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.134922][ T1264] device veth0_vlan entered promiscuous mode [ 668.145635][ T1264] device veth1_vlan entered promiscuous mode [ 668.163113][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 668.170847][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 668.179007][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.189117][ T1264] device veth0_macvtap entered promiscuous mode [ 668.197737][ T1264] device veth1_macvtap entered promiscuous mode [ 668.210591][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.221026][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.231010][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.241712][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.251593][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.262027][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.271871][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.282481][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.292375][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.302963][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.314182][ T1264] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 668.321626][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.331414][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 668.340972][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 668.351873][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.361969][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 668.372402][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.382400][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 668.393073][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.402987][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 668.413414][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.423394][ T1264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 668.433850][ T1264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.445645][ T1264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 668.454455][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.491687][ T955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 668.499504][ T955] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 668.518485][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 668.538324][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 668.546597][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 668.555571][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:32:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3000000010"], 0x30}}, 0x0) 05:32:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:32:40 executing program 3: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc8) 05:32:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:40 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x20}]}) [ 668.589335][ T1495] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 668.604426][ T1495] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:32:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:32:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x3, 0xaa, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x40) 05:32:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x7f}, 0x40) 05:32:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000026c0)={0x0, 0x57, &(0x7f0000002680)={&(0x7f0000000000)={0x230, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0x0, 0x0, 0x0, 0x0, @pid}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={[], [], @local}}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="8941c0a59f89d705a67be0a6a0228fc8ae22dcb10c7027c4b44e56c1a70e2b2301c489d9efbef08ef0c169b6ed84bb546516bfd7392711bafdb7b11f13019ebcadf3df0478caa3cf7b409f7086ef82038ccb40b06e8f3555ba4f2024f109416b1ddc4e0ff81009c1d8a63ba26fadcb6833d0614823e685a5a9788d49b9b3a0893773960e20732f681aee52fb983fe69128910e0cd057", @nested={0x3c, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={[], [], @private}}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @u64}, @typed={0xb, 0x0, 0x0, 0x0, @str='{$&}/\\\x00'}]}, @generic="820c748a1ecff975539c249e90f24ebf2e09e1a0230d32029f7d9d8c37808825acc47775c92a5c1413802cba80dd1c9a2d47839c59752e85108d0a32ff94098babb808872bd53d50546a8cbe6ae72d86171fb10962ed1e1b736e1c8f6a152f50c2b8b0168530352ac0dae30eb643287c833ca45e4eebfdcd", @generic="43d2e62370ffc3250f883771e78baf", @typed={0x8, 0x0, 0x0, 0x0, @str='p\xd3\xf7~vb\xe0\xfd\xf23c\xd3\x86i\aP=\x86\x8d\x9bpn\x82\xc6\xff\xeb\xc4\xd0[hZ\xf6\xd5\xf0\x01\x06\x8c\x9a\xe2\x10!\x17N\xf6'}, @generic="599f34e9e23703c550e9b95e51ad6dc3884d8fe8d548cf4b40940b071c17491d7412108cdb2381920369575e60b6f2f034035882740860ca1afb719990bd55fd64e14011ca928e0d1a08a82c3d467b67ad1bffaf3d9d45f62444ab01d5ba53f40d12b2967653c8a682855984dfb53c0d4ea41a306b816c8974dbfa0431c83fca899d8b73b0ddeedb65fb2f94587e", @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x230}, 0x300}, 0x0) [ 668.714879][ T1510] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:32:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) read$FUSE(r0, &(0x7f00000022c0)={0x2020}, 0x2020) 05:32:40 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x4d3, 0x7}]}, 0x14, 0x0) mount$overlay(0x0, &(0x7f0000000340)='./bus/file1\x00', 0x0, 0x110000, &(0x7f0000000540)={[{@upperdir={'upperdir', 0x3d, './bus/file1'}}], [{@smackfsdef={'smackfsdef'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x8) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x41, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2d, 0x4, 0x0, {0x0, 0xffff, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000700)='/dev/bsg\x00', 0x20002, 0x0) 05:32:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:40 executing program 3: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x10) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 05:32:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890b, 0x0) 05:32:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:32:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 05:32:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0xffffffffffffffff) [ 668.979390][ T1546] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 05:32:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x940ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:32:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:40 executing program 2: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc9) 05:32:41 executing program 1: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8) 05:32:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, 0x2, 0x2, 0x3}, 0x14}}, 0x0) 05:32:41 executing program 4: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xffffffffff7fffc7, 0x3bb602) 05:32:41 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/191, 0xbf}], 0xc7, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/212, 0x7ffff000}], 0x2, 0x0) 05:32:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:41 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x15) 05:32:41 executing program 1: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) [ 670.153841][ T955] device hsr_slave_0 left promiscuous mode [ 670.167385][ T955] device hsr_slave_1 left promiscuous mode [ 670.198020][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 670.249365][ T955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 670.291941][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 670.299669][ T955] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 670.320251][ T955] device bridge_slave_1 left promiscuous mode [ 670.327282][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.335909][ T955] device bridge_slave_0 left promiscuous mode [ 670.343639][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.356242][ T955] device veth1_macvtap left promiscuous mode [ 670.362602][ T955] device veth0_macvtap left promiscuous mode [ 670.368654][ T955] device veth1_vlan left promiscuous mode [ 670.378560][ T955] device veth0_vlan left promiscuous mode [ 671.065279][ T955] team0 (unregistering): Port device team_slave_1 removed [ 671.074736][ T955] team0 (unregistering): Port device team_slave_0 removed [ 671.085413][ T955] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 671.097300][ T955] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 671.125805][ T955] bond0 (unregistering): Released all slaves [ 672.692218][ T1607] IPVS: ftp: loaded support on port[0] = 21 [ 672.760183][ T1607] chnl_net:caif_netlink_parms(): no params data found [ 672.790946][ T1607] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.798190][ T1607] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.806149][ T1607] device bridge_slave_0 entered promiscuous mode [ 672.814414][ T1607] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.822520][ T1607] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.830145][ T1607] device bridge_slave_1 entered promiscuous mode [ 672.846140][ T1607] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 672.856653][ T1607] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 672.874447][ T1607] team0: Port device team_slave_0 added [ 672.881682][ T1607] team0: Port device team_slave_1 added [ 672.895342][ T1607] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 672.902460][ T1607] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 672.928360][ T1607] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 672.940761][ T1607] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 672.947735][ T1607] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 672.973994][ T1607] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 672.994560][ T1607] device hsr_slave_0 entered promiscuous mode [ 673.001658][ T1607] device hsr_slave_1 entered promiscuous mode [ 673.007995][ T1607] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 673.015537][ T1607] Cannot create hsr debugfs directory [ 673.042645][ T1607] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.049734][ T1607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.056987][ T1607] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.064022][ T1607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.096834][ T1607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 673.108092][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 673.117293][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.125915][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.135372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 673.147532][ T1607] 8021q: adding VLAN 0 to HW filter on device team0 [ 673.157962][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 673.167355][ T489] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.174397][ T489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.191392][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 673.199582][ T9289] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.206639][ T9289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.224048][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 673.232860][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 673.241532][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 673.249586][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 673.260264][ T1607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 673.268881][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 673.285350][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 673.293319][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 673.304332][ T1607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 673.341260][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 673.356449][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 673.365398][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 673.373364][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 673.382792][ T1607] device veth0_vlan entered promiscuous mode [ 673.394051][ T1607] device veth1_vlan entered promiscuous mode [ 673.410179][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 673.418827][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 673.428140][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 673.438309][ T1607] device veth0_macvtap entered promiscuous mode [ 673.447516][ T1607] device veth1_macvtap entered promiscuous mode [ 673.460922][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 673.471338][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.482086][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 673.492651][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.502630][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 673.513076][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.522903][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 673.533715][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.543535][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 673.553958][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.564788][ T1607] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 673.572738][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 673.582385][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 673.591921][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 673.602955][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.613386][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 673.624109][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.633993][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 673.644717][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.654598][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 673.665046][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.675130][ T1607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 673.685725][ T1607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 673.696607][ T1607] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 673.705070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 673.752424][ T955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 673.760323][ T955] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 673.782225][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 673.792934][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 05:32:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:45 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 05:32:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setregid(r1, 0xee01) 05:32:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=@ipv4_delroute={0x2c, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x4}, @RTA_MULTIPATH={0xc}]}, 0x2c}}, 0x0) 05:32:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback}}) [ 673.800751][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 673.808882][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 673.841567][ T1849] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 673.853754][ T1849] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:32:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8946, &(0x7f00000000c0)={'sit0\x00', 0x0}) 05:32:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty}}) 05:32:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)="6e32e5980ba5725606caf9f97f", 0x0}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890c, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 05:32:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x3, 0xaa, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 05:32:45 executing program 1: 05:32:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:46 executing program 4: 05:32:46 executing program 2: 05:32:46 executing program 1: 05:32:46 executing program 3: 05:32:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:46 executing program 2: 05:32:46 executing program 4: 05:32:46 executing program 1: 05:32:46 executing program 4: 05:32:46 executing program 3: 05:32:46 executing program 1: 05:32:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:46 executing program 2: 05:32:46 executing program 4: 05:32:46 executing program 3: 05:32:46 executing program 4: [ 675.333816][ T888] device hsr_slave_0 left promiscuous mode [ 675.350753][ T888] device hsr_slave_1 left promiscuous mode [ 675.371156][ T888] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 675.378589][ T888] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 675.411387][ T888] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 675.418996][ T888] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 675.442797][ T888] device bridge_slave_1 left promiscuous mode [ 675.452142][ T888] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.459778][ T888] device bridge_slave_0 left promiscuous mode [ 675.482305][ T888] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.493341][ T888] device veth1_macvtap left promiscuous mode [ 675.499456][ T888] device veth0_macvtap left promiscuous mode [ 675.522241][ T888] device veth1_vlan left promiscuous mode [ 675.528020][ T888] device veth0_vlan left promiscuous mode [ 676.575468][ T888] team0 (unregistering): Port device team_slave_1 removed [ 676.585672][ T888] team0 (unregistering): Port device team_slave_0 removed [ 676.595670][ T888] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 676.607806][ T888] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 676.635295][ T888] bond0 (unregistering): Released all slaves [ 678.306292][ T1961] IPVS: ftp: loaded support on port[0] = 21 [ 678.366814][ T1961] chnl_net:caif_netlink_parms(): no params data found [ 678.396201][ T1961] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.403368][ T1961] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.411717][ T1961] device bridge_slave_0 entered promiscuous mode [ 678.419628][ T1961] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.426691][ T1961] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.435016][ T1961] device bridge_slave_1 entered promiscuous mode [ 678.449985][ T1961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 678.462191][ T1961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 678.478212][ T1961] team0: Port device team_slave_0 added [ 678.485433][ T1961] team0: Port device team_slave_1 added [ 678.499113][ T1961] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 678.506475][ T1961] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 678.533069][ T1961] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 678.545935][ T1961] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 678.553008][ T1961] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 678.578971][ T1961] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 678.600148][ T1961] device hsr_slave_0 entered promiscuous mode [ 678.606628][ T1961] device hsr_slave_1 entered promiscuous mode [ 678.613384][ T1961] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 678.621042][ T1961] Cannot create hsr debugfs directory [ 678.648663][ T1961] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.655712][ T1961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.663115][ T1961] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.670158][ T1961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.704016][ T1961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 678.715338][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 678.723884][ T489] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.732069][ T489] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.742228][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 678.754179][ T1961] 8021q: adding VLAN 0 to HW filter on device team0 [ 678.764282][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.775071][T28451] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.782113][T28451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.798198][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.806920][ T9254] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.813967][ T9254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.831872][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 678.840352][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 678.849252][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.857622][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.867597][ T1961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 678.875635][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 678.894079][ T1961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 678.902377][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 678.909743][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 678.951779][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 678.961168][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.969462][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.977515][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.986871][ T1961] device veth0_vlan entered promiscuous mode [ 678.997283][ T1961] device veth1_vlan entered promiscuous mode [ 679.013605][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 679.021641][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 679.029923][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 679.042143][ T1961] device veth0_macvtap entered promiscuous mode [ 679.050842][ T1961] device veth1_macvtap entered promiscuous mode [ 679.063929][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 679.074345][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.084359][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 679.095016][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.105034][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 679.115457][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.126290][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 679.138006][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.147985][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 679.158392][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.169954][ T1961] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 679.178554][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 679.188271][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 679.197711][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 679.208590][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.218649][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 679.229180][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.239835][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 679.250372][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.260301][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 679.270721][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.280725][ T1961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 679.291421][ T1961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 679.302532][ T1961] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 679.310782][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 679.351466][ T9930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 679.359325][ T9930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 679.371622][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 679.379427][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 679.395682][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 679.405505][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:32:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:50 executing program 3: 05:32:50 executing program 1: 05:32:50 executing program 2: 05:32:50 executing program 4: 05:32:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 679.443041][ T2214] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 679.455062][ T2214] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:32:50 executing program 4: 05:32:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:50 executing program 3: 05:32:50 executing program 1: 05:32:50 executing program 2: 05:32:50 executing program 4: 05:32:50 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x2000, 0x0) 05:32:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r0, 0x0, 0x0) 05:32:51 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 05:32:51 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) 05:32:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x2000800) 05:32:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000740)=ANY=[], 0x284}}, 0x0) 05:32:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000080) 05:32:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), 0x4) 05:32:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4010) 05:32:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 05:32:51 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) 05:32:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) 05:32:51 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xcd3, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 05:32:51 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_crypto(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x24048080) 05:32:52 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000040), 0x0) [ 680.794948][ T21] device hsr_slave_0 left promiscuous mode [ 680.812391][ T21] device hsr_slave_1 left promiscuous mode [ 680.821334][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 680.850450][ T21] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 680.879695][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 680.895107][ T21] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 680.924288][ T21] device bridge_slave_1 left promiscuous mode [ 680.952097][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.985491][ T21] device bridge_slave_0 left promiscuous mode [ 681.004649][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.037648][ T21] device veth1_macvtap left promiscuous mode [ 681.055312][ T21] device veth0_macvtap left promiscuous mode [ 681.075545][ T21] device veth1_vlan left promiscuous mode [ 681.095710][ T21] device veth0_vlan left promiscuous mode 05:32:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[], 0x24}}, 0x4040000) [ 682.435862][ T21] team0 (unregistering): Port device team_slave_1 removed [ 682.445895][ T21] team0 (unregistering): Port device team_slave_0 removed [ 682.455390][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 682.466545][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 682.494125][ T21] bond0 (unregistering): Released all slaves [ 684.134199][ T2334] IPVS: ftp: loaded support on port[0] = 21 [ 684.203991][ T2334] chnl_net:caif_netlink_parms(): no params data found [ 684.233916][ T2334] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.241129][ T2334] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.248679][ T2334] device bridge_slave_0 entered promiscuous mode [ 684.258731][ T2334] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.266677][ T2334] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.275030][ T2334] device bridge_slave_1 entered promiscuous mode [ 684.291232][ T2334] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 684.303330][ T2334] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 684.321406][ T2334] team0: Port device team_slave_0 added [ 684.328486][ T2334] team0: Port device team_slave_1 added [ 684.341802][ T2334] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 684.348859][ T2334] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 684.375230][ T2334] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 684.386852][ T2334] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 684.393818][ T2334] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 684.420898][ T2334] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 684.442313][ T2334] device hsr_slave_0 entered promiscuous mode [ 684.448691][ T2334] device hsr_slave_1 entered promiscuous mode [ 684.455341][ T2334] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 684.463305][ T2334] Cannot create hsr debugfs directory [ 684.490899][ T2334] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.497962][ T2334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.505593][ T2334] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.512620][ T2334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.545513][ T2334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 684.556787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 684.566151][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.574017][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.583027][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 684.594055][ T2334] 8021q: adding VLAN 0 to HW filter on device team0 [ 684.605416][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 684.614551][ T489] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.621594][ T489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.643053][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 684.652002][ T3694] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.659089][ T3694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.668055][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 684.677432][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 684.692364][ T2334] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 684.702967][ T2334] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 684.717748][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 684.726171][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 684.734387][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 684.750119][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 684.757568][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 684.765147][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 684.775731][ T2334] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 684.812104][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 684.830619][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 684.839427][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 684.848396][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 684.856845][ T2334] device veth0_vlan entered promiscuous mode [ 684.869337][ T2334] device veth1_vlan entered promiscuous mode [ 684.887112][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 684.895893][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 684.904481][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 684.914501][ T2334] device veth0_macvtap entered promiscuous mode [ 684.925044][ T2334] device veth1_macvtap entered promiscuous mode [ 684.938998][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 684.950595][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 684.961710][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 684.973614][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 684.984410][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 684.995887][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.006654][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.018168][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.029055][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.040437][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.052222][ T2334] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 685.061065][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 685.071602][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 685.081493][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.092018][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.103068][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.113514][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.123445][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.133909][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.144158][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.154834][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.167780][ T2334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.178800][ T2334] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.189976][ T2334] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 685.198397][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 685.235938][ T955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 685.261895][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 685.269818][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 685.278595][ T955] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 685.281651][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 685.296054][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:32:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002a80)={'syztnl0\x00', 0x0}) 05:32:56 executing program 1: semget(0x1, 0x1, 0x1) 05:32:56 executing program 4: 05:32:56 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 05:32:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 685.336165][ T2564] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 685.347508][ T2564] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:32:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, 0x0, 0x0) 05:32:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 05:32:56 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x0) 05:32:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:56 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x0, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, 0x0, 0x0) 05:32:56 executing program 4: r0 = socket(0x11, 0x3, 0x0) getsockname$unix(r0, 0x0, 0x0) 05:32:56 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x0, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 05:32:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={0x0}}, 0x4) 05:32:57 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x0, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, 0x0, 0x0) 05:32:57 executing program 4: shmget$private(0x0, 0x4000, 0xca0, &(0x7f0000ff9000/0x4000)=nil) 05:32:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:57 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0) 05:32:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:57 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 05:32:57 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) 05:32:57 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, 0x0, 0x0) 05:32:57 executing program 3: sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) 05:32:57 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_crypto(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x400c044) 05:32:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000240)={0x0, 0x55, &(0x7f0000000000)={0x0}}, 0x4910) 05:32:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x40004) 05:32:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x804) 05:32:57 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x2c}}, 0x0) 05:32:57 executing program 4: r0 = epoll_create(0x3) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 05:32:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:57 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x0, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, 0x0, 0x0) 05:32:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 05:32:57 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 05:32:57 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) fcntl$dupfd(r1, 0x0, r0) 05:32:57 executing program 1: shmget(0x1, 0x4000, 0x200, &(0x7f0000ffb000/0x4000)=nil) 05:32:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4000080) 05:32:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, 0x0, 0x0) 05:32:58 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, 0x0, 0x0) 05:32:58 executing program 1: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x800, 0x0, 0x0) 05:32:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:32:58 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$nl_crypto(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x40000) 05:32:58 executing program 3: pipe2$9p(&(0x7f0000000040), 0x80000) 05:32:58 executing program 2: prctl$PR_SET_PDEATHSIG(0x1, 0x80000001) 05:32:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4040000) 05:32:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:32:58 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x983000, 0x0) 05:32:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000010) 05:32:58 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, 0x0, 0x0) 05:32:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 05:32:58 executing program 3: getgroups(0x1, &(0x7f0000000000)=[0x0]) setresgid(0x0, 0x0, r0) [ 687.382976][ T9930] device hsr_slave_0 left promiscuous mode [ 687.398689][ T9930] device hsr_slave_1 left promiscuous mode [ 687.420235][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 687.447092][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 687.471472][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 687.497568][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 687.525651][ T9930] device bridge_slave_1 left promiscuous mode [ 687.547118][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.574004][ T9930] device bridge_slave_0 left promiscuous mode [ 687.593466][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.638679][ T9930] device veth1_macvtap left promiscuous mode [ 687.660496][ T9930] device veth0_macvtap left promiscuous mode [ 687.682589][ T9930] device veth1_vlan left promiscuous mode 05:32:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x10004844) [ 687.701716][ T9930] device veth0_vlan left promiscuous mode [ 688.869504][ T9930] team0 (unregistering): Port device team_slave_1 removed [ 688.879282][ T9930] team0 (unregistering): Port device team_slave_0 removed [ 688.889146][ T9930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 688.901649][ T9930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 688.929034][ T9930] bond0 (unregistering): Released all slaves [ 690.619191][ T2747] IPVS: ftp: loaded support on port[0] = 21 [ 690.692372][ T2747] chnl_net:caif_netlink_parms(): no params data found [ 690.722872][ T2747] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.730794][ T2747] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.738269][ T2747] device bridge_slave_0 entered promiscuous mode [ 690.748627][ T2747] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.756741][ T2747] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.765481][ T2747] device bridge_slave_1 entered promiscuous mode [ 690.782385][ T2747] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 690.793373][ T2747] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 690.811898][ T2747] team0: Port device team_slave_0 added [ 690.818581][ T2747] team0: Port device team_slave_1 added [ 690.832497][ T2747] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 690.839470][ T2747] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 690.866362][ T2747] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 690.878732][ T2747] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 690.885775][ T2747] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 690.911731][ T2747] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 690.933242][ T2747] device hsr_slave_0 entered promiscuous mode [ 690.940068][ T2747] device hsr_slave_1 entered promiscuous mode [ 690.946322][ T2747] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 690.954970][ T2747] Cannot create hsr debugfs directory [ 690.982540][ T2747] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.989604][ T2747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 690.996843][ T2747] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.003866][ T2747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.035237][ T2747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 691.047220][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 691.055797][ T9573] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.064144][ T9573] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.073095][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 691.084258][ T2747] 8021q: adding VLAN 0 to HW filter on device team0 [ 691.095491][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 691.104764][ T489] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.112236][ T489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.130207][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 691.138496][ T9573] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.145592][ T9573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 691.154939][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 691.171459][ T2747] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 691.182639][ T2747] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 691.195833][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 691.204201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 691.213284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 691.222194][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 691.240180][ T2747] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 691.249318][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 691.259118][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 691.267671][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 691.302618][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 691.315694][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 691.324017][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 691.333109][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 691.343512][ T2747] device veth0_vlan entered promiscuous mode [ 691.354336][ T2747] device veth1_vlan entered promiscuous mode [ 691.370764][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 691.378733][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 691.387784][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 691.399176][ T2747] device veth0_macvtap entered promiscuous mode [ 691.408816][ T2747] device veth1_macvtap entered promiscuous mode [ 691.421756][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 691.432383][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.442322][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 691.452758][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.462811][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 691.473226][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.483108][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 691.493677][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.504024][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 691.515363][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.526319][ T2747] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 691.534870][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 691.544229][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 691.553781][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 691.564404][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.574415][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 691.585147][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.595113][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 691.605618][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.615466][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 691.626803][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.636634][ T2747] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 691.647270][ T2747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 691.659139][ T2747] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 691.667805][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 691.706348][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 691.723020][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 691.740882][ T9930] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 691.748700][ T9930] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 05:33:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:03 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffff82) 05:33:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20040000) 05:33:03 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000001940)='/dev/full\x00', 0x200801, 0x0) 05:33:03 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000880)) 05:33:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 691.758438][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 691.766607][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 691.797279][ T2983] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:33:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) [ 691.808206][ T2983] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:33:03 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000)="18", 0x1, 0x4010, &(0x7f0000000100)=@hci, 0x80) 05:33:03 executing program 1: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x20, 0xa00) 05:33:03 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 05:33:03 executing program 4: 05:33:03 executing program 3: 05:33:03 executing program 2: 05:33:03 executing program 1: 05:33:03 executing program 4: 05:33:03 executing program 3: 05:33:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:33:04 executing program 1: 05:33:04 executing program 2: 05:33:04 executing program 3: 05:33:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:04 executing program 4: 05:33:04 executing program 2: 05:33:04 executing program 4: 05:33:04 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)=@phonet, 0x80) 05:33:04 executing program 3: process_vm_writev(0x0, &(0x7f00000000c0)=[{&(0x7f0000001180)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=[{0x0}, {0x0}], 0x2, 0x0) 05:33:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:33:04 executing program 2: 05:33:04 executing program 4: 05:33:04 executing program 1: 05:33:04 executing program 3: 05:33:04 executing program 1: [ 693.252270][ T26] device hsr_slave_0 left promiscuous mode [ 693.269746][ T26] device hsr_slave_1 left promiscuous mode [ 693.281104][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 693.298733][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 693.334476][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 693.350810][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 693.368701][ T26] device bridge_slave_1 left promiscuous mode [ 693.388390][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.399557][ T26] device bridge_slave_0 left promiscuous mode [ 693.405674][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.440087][ T26] device veth1_macvtap left promiscuous mode [ 693.456240][ T26] device veth0_macvtap left promiscuous mode [ 693.466322][ T26] device veth1_vlan left promiscuous mode [ 693.482370][ T26] device veth0_vlan left promiscuous mode [ 694.542431][ T26] team0 (unregistering): Port device team_slave_1 removed [ 694.552111][ T26] team0 (unregistering): Port device team_slave_0 removed [ 694.563789][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 694.576126][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 694.603887][ T26] bond0 (unregistering): Released all slaves [ 696.384942][ T3103] IPVS: ftp: loaded support on port[0] = 21 [ 696.451935][ T3103] chnl_net:caif_netlink_parms(): no params data found [ 696.481995][ T3103] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.489029][ T3103] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.498905][ T3103] device bridge_slave_0 entered promiscuous mode [ 696.507563][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.515934][ T3103] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.524464][ T3103] device bridge_slave_1 entered promiscuous mode [ 696.541299][ T3103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 696.551958][ T3103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 696.570741][ T3103] team0: Port device team_slave_0 added [ 696.577638][ T3103] team0: Port device team_slave_1 added [ 696.590966][ T3103] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 696.597965][ T3103] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 696.624515][ T3103] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 696.636212][ T3103] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 696.644000][ T3103] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 696.669990][ T3103] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 696.691444][ T3103] device hsr_slave_0 entered promiscuous mode [ 696.697853][ T3103] device hsr_slave_1 entered promiscuous mode [ 696.704552][ T3103] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 696.712736][ T3103] Cannot create hsr debugfs directory [ 696.740072][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.747103][ T3103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.754413][ T3103] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.761507][ T3103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.793695][ T3103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 696.805408][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.814394][ T9573] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.822609][ T9573] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.831637][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 696.843062][ T3103] 8021q: adding VLAN 0 to HW filter on device team0 [ 696.853344][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 696.862519][ T9573] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.869549][ T9573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.889696][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 696.897964][ T489] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.905002][ T489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.914558][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 696.923536][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 696.932481][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 696.942853][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 696.956330][ T3103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 696.967588][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 696.975507][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 696.990912][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 696.998470][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 697.010576][ T3103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 697.052619][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 697.066735][ T3103] device veth0_vlan entered promiscuous mode [ 697.075797][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 697.085802][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 697.094989][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 697.105958][ T3103] device veth1_vlan entered promiscuous mode [ 697.122400][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 697.131029][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 697.139170][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 697.149108][ T3103] device veth0_macvtap entered promiscuous mode [ 697.157504][ T3103] device veth1_macvtap entered promiscuous mode [ 697.172328][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 697.182866][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.193460][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 697.203991][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.213880][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 697.224739][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.234779][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 697.245209][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.255194][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 697.265737][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.277539][ T3103] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 697.286169][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 697.295416][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 697.304936][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 697.316025][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.326072][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 697.337263][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.347111][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 697.357529][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.367424][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 697.377948][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.388453][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 697.399016][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 697.410180][ T3103] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 697.418220][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 697.459081][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 697.466895][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 697.474551][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 697.491643][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 697.499273][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:33:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:08 executing program 2: 05:33:08 executing program 4: 05:33:08 executing program 3: 05:33:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:33:08 executing program 1: [ 697.511297][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 697.546139][ T3345] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:33:08 executing program 4: 05:33:08 executing program 2: [ 697.556851][ T3345] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:33:09 executing program 4: 05:33:09 executing program 3: 05:33:09 executing program 1: 05:33:09 executing program 2: 05:33:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:09 executing program 4: 05:33:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:33:09 executing program 3: 05:33:09 executing program 2: 05:33:09 executing program 1: 05:33:09 executing program 4: 05:33:09 executing program 3: 05:33:09 executing program 2: 05:33:09 executing program 1: 05:33:09 executing program 2: 05:33:09 executing program 4: 05:33:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:09 executing program 3: 05:33:09 executing program 1: 05:33:09 executing program 2: 05:33:09 executing program 4: 05:33:09 executing program 0: 05:33:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:09 executing program 1: 05:33:09 executing program 3: 05:33:09 executing program 2: 05:33:09 executing program 0: 05:33:09 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001680)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1477, 0x1021, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2, &(0x7f00000017c0)=@string={0x2}}]}) 05:33:09 executing program 2: syz_open_dev$hidraw(0x0, 0x0, 0x0) 05:33:09 executing program 3: syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000040)=""/119) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x1a000) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x0, 0x9b, 0x7}) syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, 0x0) r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000380)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, 0x0) 05:33:09 executing program 1: syz_open_dev$evdev(&(0x7f0000001c80)='/dev/input/event#\x00', 0x0, 0x8041) 05:33:09 executing program 0: r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x40) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000240)={0x7ff, 0x0, 0x3cb, 0x5, 0x5c49}) r1 = syz_open_dev$hidraw(&(0x7f0000000280)='/dev/hidraw#\x00', 0x0, 0x0) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f00000002c0)={0x0, "2fae54d837344a9f49b6483d3fd559dd67b25596d9f35077a68692ca06b6e317f2678a9ec0e9c23a57e4e681e1563bd0fd15ca9e01e5b793e1d03c7b834aad6d"}) r2 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x400801) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000380)=""/189) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, 0x0) ioctl$HIDIOCGRAWNAME(0xffffffffffffffff, 0x80404804, &(0x7f00000004c0)) r3 = syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000500)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x1ae7, 0x9001, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x1, 0x40, 0x2, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x2, 0x1}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0x0, 0x4}}}}}]}}]}}, &(0x7f0000000840)={0xa, &(0x7f0000000540)={0xa, 0x6, 0x201}, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000640)=@lang_id={0x4, 0x3, 0x407}}, {0x0, 0x0}, {0x79, &(0x7f0000000740)=@string={0x79, 0x3, "ecc585b2ac538639e975b1f12e081f16d54e71b86c5097923785a4404a92cc6d9bc4bbcbef39e5fceadc33c5c0a8ebb29db91c983fe24acb25643c235ae9ad791e8aee759826bcedfd767be7d6e3e9fb44ea6ba67c38cc9ff2f5a0a6f3468ced08a383176e40febe8e3c655bd2a350b1d79d6bdb321e4e"}}, {0x4, &(0x7f0000000800)=@lang_id={0x4, 0x3, 0x42c}}]}) syz_usb_ep_write(r3, 0x1, 0x0, 0x0) 05:33:09 executing program 2: syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000340)={0x200}) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000380)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) 05:33:09 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1ae7, 0x9001, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) [ 698.629692][ T5] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 698.699088][T28451] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 698.720318][ T9289] usb 4-1: new high-speed USB device number 19 using dummy_hcd [ 698.727923][ T7] usb 3-1: new high-speed USB device number 13 using dummy_hcd [ 698.760005][ T3858] usb 2-1: new high-speed USB device number 77 using dummy_hcd [ 699.010124][ T3858] usb 2-1: Using ep0 maxpacket: 8 [ 699.021030][ T5] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 699.100355][ T5] usb 5-1: language id specifier not provided by device, defaulting to English [ 699.129273][T28451] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 699.130747][ T3858] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 699.148204][T28451] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 699.180578][ T3858] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 699.213490][ T3858] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 699.269928][ T5] usb 5-1: New USB device found, idVendor=1477, idProduct=1021, bcdDevice= 0.40 [ 699.290692][ T5] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 699.322090][ T9289] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 699.334076][ T5] usb 5-1: Product: syz [ 699.338365][ T5] usb 5-1: Manufacturer: syz [ 699.349579][ T9289] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 699.357652][ T5] usb 5-1: SerialNumber: syz [ 699.366996][ T9289] usb 4-1: Product: syz [ 699.372297][ T7] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 699.395788][ T7] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 699.417834][ T9289] usb 4-1: Manufacturer: syz [ 699.425717][ T9289] usb 4-1: SerialNumber: syz [ 699.434139][ T7] usb 3-1: Product: syz [ 699.438692][ T7] usb 3-1: Manufacturer: syz [ 699.448549][ T7] usb 3-1: SerialNumber: syz [ 699.457352][ T5] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 699.484701][ T9289] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 699.489361][ T3858] usb 2-1: string descriptor 0 read error: -22 [ 699.520211][ T7] usb 3-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 699.528668][ T3858] usb 2-1: New USB device found, idVendor=1ae7, idProduct=9001, bcdDevice= 0.40 [ 699.559268][ T3858] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 699.601466][T28451] usb 1-1: New USB device found, idVendor=1ae7, idProduct=9001, bcdDevice= 0.40 [ 699.610918][ T26] device hsr_slave_0 left promiscuous mode [ 699.614184][T28451] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 699.624856][ T26] device hsr_slave_1 left promiscuous mode [ 699.626628][T28451] usb 1-1: Product: 여늅厬㦆痩࠮ᘟ仕롱偬銗蔷䂤鉊淌쒛쮻㧯ﳥ씳ꣀ닫릝頜쭊搥⌼禭訞痮⚘盽ﯩꙫ㡼鿌ꚠ䛳ꌈឃ䁮뻾㲎孥ꏒ념鷗Ḳ [ 699.641856][ T3858] usbhid 2-1:1.0: can't add hid device: -22 [ 699.652817][T28451] usb 1-1: SerialNumber: Ь [ 699.688924][ T3858] usbhid: probe of 2-1:1.0 failed with error -22 [ 699.700426][ T3694] usb 5-1: USB disconnect, device number 8 [ 699.706835][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 699.715137][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 699.732264][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 699.743798][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 699.830912][ T26] device bridge_slave_1 left promiscuous mode [ 699.837043][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.848433][ T26] device bridge_slave_0 left promiscuous mode [ 699.864600][ T5] usb 2-1: USB disconnect, device number 77 [ 699.897755][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.912725][ T26] device veth1_macvtap left promiscuous mode [ 699.924366][ T26] device veth0_macvtap left promiscuous mode [ 699.938157][ T26] device veth1_vlan left promiscuous mode [ 699.948299][ T26] device veth0_vlan left promiscuous mode [ 699.989129][T28451] usbhid 1-1:1.0: can't add hid device: -22 [ 699.996315][T28451] usbhid: probe of 1-1:1.0 failed with error -22 [ 700.027205][T28451] usb 1-1: USB disconnect, device number 5 [ 700.148930][ T9289] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 700.208931][ T7] usb 3-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 700.362724][T28451] usb 4-1: USB disconnect, device number 19 [ 700.413639][ T5] usb 3-1: USB disconnect, device number 13 [ 700.458814][T28447] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 700.699446][ T43] usb 2-1: new high-speed USB device number 78 using dummy_hcd [ 700.810602][ T26] team0 (unregistering): Port device team_slave_1 removed [ 700.821517][ T26] team0 (unregistering): Port device team_slave_0 removed [ 700.831289][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 700.842233][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 700.868262][ T26] bond0 (unregistering): Released all slaves [ 700.878817][T28447] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 700.940023][T28447] usb 5-1: language id specifier not provided by device, defaulting to English [ 700.998857][ T43] usb 2-1: Using ep0 maxpacket: 8 [ 701.109068][T28447] usb 5-1: New USB device found, idVendor=1477, idProduct=1021, bcdDevice= 0.40 [ 701.118224][T28447] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 701.119313][ T43] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 701.130536][T28447] usb 5-1: Product: syz [ 701.144375][T28447] usb 5-1: Manufacturer: syz [ 701.146962][ T43] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 701.149691][T28447] usb 5-1: SerialNumber: syz [ 701.159574][ T43] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 701.202039][T28447] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 701.238768][ T7] ath9k_htc 3-1:1.0: ath9k_htc: Target is unresponsive [ 701.245625][ T7] ath9k_htc: Failed to initialize the device [ 701.251710][ T9289] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 701.258541][ T9289] ath9k_htc: Failed to initialize the device [ 701.271048][T28451] usb 4-1: ath9k_htc: USB layer deinitialized [ 701.278028][ T5] usb 3-1: ath9k_htc: USB layer deinitialized [ 701.309347][T28447] usb 5-1: USB disconnect, device number 9 [ 701.429109][ T43] usb 2-1: string descriptor 0 read error: -22 [ 701.435275][ T43] usb 2-1: New USB device found, idVendor=1ae7, idProduct=9001, bcdDevice= 0.40 [ 701.458721][ T43] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 701.498760][ T43] usb 2-1: can't set config #1, error -71 [ 701.507011][ T43] usb 2-1: USB disconnect, device number 78 [ 701.816268][ T3499] IPVS: ftp: loaded support on port[0] = 21 [ 701.876595][ T3499] chnl_net:caif_netlink_parms(): no params data found [ 701.908118][ T3499] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.915413][ T3499] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.923799][ T3499] device bridge_slave_0 entered promiscuous mode [ 701.932033][ T3499] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.939261][ T3499] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.946807][ T3499] device bridge_slave_1 entered promiscuous mode [ 701.961706][ T3499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 701.973178][ T3499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 701.990281][ T3499] team0: Port device team_slave_0 added [ 701.997126][ T3499] team0: Port device team_slave_1 added [ 702.010219][ T3499] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 702.017161][ T3499] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 702.043717][ T3499] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 702.055802][ T3499] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 702.062769][ T3499] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 702.090175][ T3499] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 702.111712][ T3499] device hsr_slave_0 entered promiscuous mode [ 702.118213][ T3499] device hsr_slave_1 entered promiscuous mode [ 702.125767][ T3499] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 702.134140][ T3499] Cannot create hsr debugfs directory [ 702.185686][ T3499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 702.197720][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 702.209267][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 702.216772][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 702.226062][ T3499] 8021q: adding VLAN 0 to HW filter on device team0 [ 702.236090][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 702.246053][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 702.254367][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.261469][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.279193][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 702.286903][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 702.295826][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 702.304203][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.311225][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 702.320152][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 702.336701][ T3499] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 702.347950][ T3499] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 702.363027][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 702.371044][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 702.381337][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 702.390679][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 702.400644][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 702.415466][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 702.422890][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 702.435371][ T3499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 702.479450][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 702.490260][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 702.499929][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 702.507548][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.518221][ T3499] device veth0_vlan entered promiscuous mode [ 702.530400][ T3499] device veth1_vlan entered promiscuous mode [ 702.547821][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 702.556001][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 702.564283][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 702.574590][ T3499] device veth0_macvtap entered promiscuous mode [ 702.585136][ T3499] device veth1_macvtap entered promiscuous mode [ 702.598433][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 702.609193][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.619075][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 702.629634][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.639485][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 702.649984][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.660149][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 702.670678][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.681406][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 702.691979][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.703279][ T3499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 702.711430][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 702.721245][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 702.730872][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 702.741491][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.751612][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 702.762731][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.772576][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 702.783053][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.794360][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 702.804867][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.815247][ T3499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 702.826522][ T3499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 702.837575][ T3499] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 702.848215][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 702.888561][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 702.898107][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 702.907696][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 702.915675][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 05:33:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:14 executing program 0: syz_open_dev$hidraw(0x0, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1ae7, 0x9001, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 05:33:14 executing program 4: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001680)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x40, 0x1477, 0x1021, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x50, 0x0, [{{0x9, 0x4, 0x0, 0xc4, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x3, 0x1, {0x22, 0x7a9}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x0, 0x0, 0x3}}}}}]}}]}}, &(0x7f0000001b80)={0xa, &(0x7f00000016c0)={0xa, 0x6, 0x0, 0x0, 0x3f, 0x0, 0xff, 0x7}, 0x1d, &(0x7f0000001700)={0x5, 0xf, 0x1d, 0x3, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x0, 0x3f}, @generic={0x3}, @wireless={0xb, 0x10, 0x1, 0xc, 0x0, 0x1, 0x0, 0x2, 0x5}]}, 0x1, [{0x0, 0x0}]}) syz_open_dev$evdev(0x0, 0x1f20, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000001cc0)=""/20) 05:33:14 executing program 1: syz_usb_connect$hid(0x2, 0x36, &(0x7f0000001680)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x40, 0x1477, 0x1021, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0}) 05:33:14 executing program 2: syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x0) 05:33:14 executing program 3: syz_usb_ep_write$ath9k_ep2(0xffffffffffffffff, 0x83, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000040)=""/119) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x1a000) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x0, 0x9b, 0x7}) syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, 0x0) r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000380)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, 0x0) [ 702.933604][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 702.948435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:33:14 executing program 2: ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000000c0)=""/85) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, 0x0) syz_usb_connect$hid(0x2, 0x36, &(0x7f0000001680)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1477, 0x1021, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x80, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7a9}}, {{{0x9, 0x5, 0x81, 0x3, 0x40}}}}}]}}]}}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000001cc0)=""/20) 05:33:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) [ 703.298613][ T3858] usb 2-1: new full-speed USB device number 79 using dummy_hcd [ 703.306306][ T43] usb 5-1: new high-speed USB device number 10 using dummy_hcd [ 703.315071][ T9254] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 703.330187][ T5] usb 4-1: new high-speed USB device number 21 using dummy_hcd [ 703.408586][ T488] usb 3-1: new full-speed USB device number 15 using dummy_hcd [ 703.559221][ T9254] usb 1-1: Using ep0 maxpacket: 8 [ 703.679706][ T9254] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 703.698566][ T3858] usb 2-1: unable to get BOS descriptor or descriptor too short [ 703.758620][ T43] usb 5-1: config 1 interface 0 altsetting 196 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 703.772468][ T488] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 703.792349][ T43] usb 5-1: config 1 interface 0 has no altsetting 0 [ 703.838561][ T3858] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 703.848335][ T3858] usb 2-1: can't read configurations, error -71 [ 703.869029][ T9254] usb 1-1: New USB device found, idVendor=1ae7, idProduct=9001, bcdDevice= 0.40 [ 703.878057][ T9254] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 703.903858][ T9254] usb 1-1: Product: syz [ 703.910478][ T5] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 703.913040][ T9254] usb 1-1: Manufacturer: syz [ 703.927238][ T5] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 703.934766][ T9254] usb 1-1: SerialNumber: syz [ 703.947129][ T5] usb 4-1: Product: syz [ 703.961669][ T5] usb 4-1: Manufacturer: syz [ 703.978171][ T5] usb 4-1: SerialNumber: syz [ 703.981052][ T9254] usbhid 1-1:1.0: couldn't find an input interrupt endpoint [ 704.039065][ T488] usb 3-1: string descriptor 0 read error: -22 [ 704.040564][ T5] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 704.045794][ T488] usb 3-1: New USB device found, idVendor=1477, idProduct=1021, bcdDevice= 0.40 [ 704.068935][ T43] usb 5-1: string descriptor 0 read error: -22 [ 704.078734][ T43] usb 5-1: New USB device found, idVendor=1477, idProduct=1021, bcdDevice= 0.40 [ 704.110626][ T43] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 704.132191][ T488] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 704.181780][ T43] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 704.197744][ T43] usb 1-1: USB disconnect, device number 6 [ 704.226710][ T955] device hsr_slave_0 left promiscuous mode [ 704.240434][ T955] device hsr_slave_1 left promiscuous mode [ 704.246907][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 704.261231][ T955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 704.270940][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 704.278333][ T955] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 704.286539][ T955] device bridge_slave_1 left promiscuous mode [ 704.292830][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.300621][ T955] device bridge_slave_0 left promiscuous mode [ 704.306701][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.317274][ T955] device veth1_macvtap left promiscuous mode [ 704.323467][ T955] device veth0_macvtap left promiscuous mode [ 704.329707][ T955] device veth1_vlan left promiscuous mode [ 704.335482][ T955] device veth0_vlan left promiscuous mode [ 704.381768][ T9289] usb 5-1: USB disconnect, device number 10 [ 704.508563][ T488] usbhid 3-1:1.0: can't add hid device: -71 [ 704.514494][ T488] usbhid: probe of 3-1:1.0 failed with error -71 [ 704.528507][ T3858] usb 2-1: new full-speed USB device number 80 using dummy_hcd [ 704.549529][ T488] usb 3-1: USB disconnect, device number 15 05:33:16 executing program 0: syz_open_dev$hidraw(0x0, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1ae7, 0x9001, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) [ 704.668537][ T5] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 05:33:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000002100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bridge_slave_1\x00'}) 05:33:16 executing program 1: bpf$MAP_LOOKUP_BATCH(0x9, 0x0, 0x2b) 05:33:16 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x101, 0x0) [ 704.917940][T28451] usb 4-1: USB disconnect, device number 21 [ 704.928491][ T3858] usb 2-1: unable to get BOS descriptor or descriptor too short 05:33:16 executing program 1: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x24, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef87456558f000ff1f00000000122e25d30800", 0x0, 0x6d, 0xe00, 0x22d}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) [ 705.009425][ T9289] usb 1-1: new high-speed USB device number 7 using dummy_hcd 05:33:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x3, 0xffffffffffffffff, 0x5) 05:33:16 executing program 1: perf_event_open(&(0x7f0000001840)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 705.088474][ T3858] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 705.102110][ T3858] usb 2-1: can't read configurations, error -71 [ 705.125225][ T3858] usb usb2-port1: attempt power cycle 05:33:16 executing program 1: [ 705.348597][ T9289] usb 1-1: Using ep0 maxpacket: 8 [ 705.414747][ T955] team0 (unregistering): Port device team_slave_1 removed [ 705.424770][ T955] team0 (unregistering): Port device team_slave_0 removed [ 705.438022][ T955] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 705.451189][ T955] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 705.480669][ T955] bond0 (unregistering): Released all slaves [ 705.488941][ T9289] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 05:33:16 executing program 3: 05:33:16 executing program 1: 05:33:16 executing program 2: [ 705.678497][ T9289] usb 1-1: New USB device found, idVendor=1ae7, idProduct=9001, bcdDevice= 0.40 [ 705.687552][ T9289] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 705.699855][ T9289] usb 1-1: Product: syz [ 705.704021][ T9289] usb 1-1: Manufacturer: syz [ 705.712967][ T9289] usb 1-1: SerialNumber: syz [ 705.724019][ T5] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 705.731585][ T5] ath9k_htc: Failed to initialize the device [ 705.737664][T28451] usb 4-1: ath9k_htc: USB layer deinitialized [ 705.770404][ T9289] usbhid 1-1:1.0: couldn't find an input interrupt endpoint [ 705.975523][T28447] usb 1-1: USB disconnect, device number 7 [ 706.454132][ T3896] IPVS: ftp: loaded support on port[0] = 21 [ 706.525335][ T3896] chnl_net:caif_netlink_parms(): no params data found [ 706.555857][ T3896] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.563170][ T3896] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.570978][ T3896] device bridge_slave_0 entered promiscuous mode [ 706.579191][ T3896] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.586225][ T3896] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.594175][ T3896] device bridge_slave_1 entered promiscuous mode [ 706.609237][ T3896] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 706.620800][ T3896] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 706.637546][ T3896] team0: Port device team_slave_0 added [ 706.644656][ T3896] team0: Port device team_slave_1 added [ 706.657749][ T3896] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 706.664747][ T3896] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 706.691781][ T3896] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 706.703923][ T3896] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 706.711717][ T3896] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 706.738604][ T3896] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 706.759721][ T3896] device hsr_slave_0 entered promiscuous mode [ 706.766401][ T3896] device hsr_slave_1 entered promiscuous mode [ 706.773294][ T3896] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 706.781526][ T3896] Cannot create hsr debugfs directory [ 706.809297][ T3896] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.816394][ T3896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.824316][ T3896] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.831389][ T3896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.863712][ T3896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 706.875077][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 706.884192][ T3858] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.892317][ T3858] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.901794][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 706.913464][ T3896] 8021q: adding VLAN 0 to HW filter on device team0 [ 706.923838][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 706.933163][T28447] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.940215][T28447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.959903][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 706.968148][ T3858] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.975198][ T3858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.984440][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 707.000798][ T3896] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 707.011658][ T3896] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 707.023758][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 707.032282][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 707.041003][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 707.049313][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 707.057772][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 707.077303][ T3896] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 707.086546][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 707.095005][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 707.130886][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 707.144999][ T3896] device veth0_vlan entered promiscuous mode [ 707.155144][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.164876][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.173988][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 707.185172][ T3896] device veth1_vlan entered promiscuous mode [ 707.203546][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 707.212081][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 707.222929][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 707.233175][ T3896] device veth0_macvtap entered promiscuous mode [ 707.242713][ T3896] device veth1_macvtap entered promiscuous mode [ 707.256059][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 707.267575][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.277627][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 707.288200][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.298006][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 707.308433][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.318240][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 707.328695][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.338512][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 707.349548][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.361084][ T3896] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 707.369453][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 707.379577][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 707.389444][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.400850][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.410898][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.422174][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.431999][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.442584][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.452913][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.463477][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.473471][ T3896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 707.483973][ T3896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 707.495283][ T3896] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 707.504155][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 707.539761][ T888] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 707.547650][ T888] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 707.575053][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 707.598844][ T888] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 707.606735][ T888] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 707.614300][ T9289] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:33:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:19 executing program 4: 05:33:19 executing program 1: 05:33:19 executing program 2: 05:33:19 executing program 3: 05:33:19 executing program 0: [ 707.639768][ T4181] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 707.651691][ T4181] EXT4-fs error (device loop5): ext4_lookup:1710: inode #12: comm syz-executor.5: deleted inode referenced: 13 05:33:19 executing program 0: 05:33:19 executing program 1: 05:33:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:19 executing program 4: 05:33:19 executing program 2: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0) 05:33:19 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9, 0x0, 0x81, 0x0, 0x0, 0xffffffffffffffff}) 05:33:19 executing program 0: getresgid(&(0x7f0000000c00), 0x0, 0x0) 05:33:19 executing program 4: unshare(0xa020400) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, 0x0, 0x0) 05:33:19 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='.dead\x00', &(0x7f0000000180)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 05:33:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000001c0)={[], 0x0, 0x1, 0x20}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) openat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:33:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:19 executing program 3: 05:33:19 executing program 0: add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='-', 0x1, 0xfffffffffffffffc) 05:33:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x1}, 0x40) 05:33:19 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000080)={0x0, 0xf1, 0x0, 0x0, 0x0, 0xff}) 05:33:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}, {@delalloc='delalloc'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:33:19 executing program 1: syz_mount_image$nfs(&(0x7f0000001080)='nfs\x00', 0x0, 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000001600)) 05:33:19 executing program 5: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) open(0x0, 0x200400, 0xec) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000001c0)={[], 0x0, 0x1, 0x20}) pipe2(0x0, 0x0) 05:33:19 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') 05:33:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xc) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 05:33:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x51, 0x200, 0x7, 0x0, 0x1}, 0x69) 05:33:19 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x3, 0x6, 0xefffffffffffff04}, 0x0, 0x0, 0x0) 05:33:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x4242) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 05:33:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000000)) 05:33:19 executing program 5: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:19 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f00000000c0)) [ 708.211565][ T4238] EXT4-fs (loop4): Test dummy encryption mode enabled [ 708.269613][ T4238] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,delalloc,,errors=continue 05:33:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}, {@delalloc='delalloc'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:33:19 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 05:33:19 executing program 2: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) preadv2(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x1008}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000011c0)='security.ima\x00', 0x0, 0x49, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000002240)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) 05:33:19 executing program 3: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:33:19 executing program 5: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:19 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x341003) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 05:33:19 executing program 0: socketpair(0xa, 0x0, 0xfffffffb, &(0x7f0000000040)) 05:33:19 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='#! \x13\xdb\xb9\xdaU\xb1\xea\xa3\x8a\x91C\xd6\x9fA\xe9\xfb7\xb6\xe5,\x19\xb2y\x02MO&\xcb*p<\xa4\x84\xfa5\xd7YX]z<\xf3T\xf6\x80\xafm\xcfr\xe6\x17\xe1o\x81G\x1e:\x00}[\xfaY-\x13K0\'s\xe0\xceQ\x8b\xdc 9\xb6\x7f*\xe8\xc6\xff\xe7[\xb4\xb9', 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='#e0'], 0x17) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 05:33:19 executing program 1: sysfs$1(0x1, &(0x7f0000000000)=']}@\x00') 05:33:19 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) 05:33:19 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffffff, 0x23c2) [ 708.485471][ T4295] EXT4-fs (loop4): Test dummy encryption mode enabled [ 708.520013][ T3694] Bluetooth: hci5: command 0x0409 tx timeout [ 708.610230][ T4295] EXT4-fs (loop4): mounted filesystem without journal. Opts: test_dummy_encryption,delalloc,,errors=continue 05:33:20 executing program 4: clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:20 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x51, 0x803, 0xa, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) 05:33:20 executing program 0: syz_mount_image$nfs(&(0x7f0000001080)='nfs\x00', &(0x7f00000010c0)='./file0\x00', 0x9, 0x6, &(0x7f0000001540)=[{&(0x7f0000001100)="bf70191cef9e96b9c736aa3610dfdfb63fbbf43c0cd41a09f14fc4f07d8842fd1a5b12212ed9eb6c234713155b921adb6008178a7ac2d622f612f75fd8cbc4baaf21365685cc4dcf30e811e46cd91a6ef99f0507571d83ca06b10ed846e88476aa224784108aca143573c2dfb765e5bb7cc61c5e5e90d682b1eaf6839f181b070eba43ba9fe8f6e9528641d8213ec2", 0x8f, 0x1ff}, {0x0, 0x0, 0x5}, {&(0x7f0000001280)="cdea65d78c91e9a4783614302ce34aa0c8ac83c6afc94fe205c2549401ef772305787b53a76ba7b2dd5698301f1d486c35a97e4624160c3885630f7508977f61ab226d4b6f905863d197c595fee5e24343e1f44f2e67b4faf75dd283c1996e455c105acb5af115b0f335711e6ea7d48c298db1", 0x73, 0xd294}, {&(0x7f0000001300)="685deccf9766db8fbce6be26aea57dc5c7ac7779b714f7cd23628125b0de70ddafa84e433197d0bb5f8805e68ff0a6cd8bc989bb7c58ba6c2bdb50f9fa3956e246d7e05d2cd7617c565abd52ce4b89bce733f9bec60b04a73fa00590801873e157fafc39337c99c4abd906d1a936c62280451817580233a39ae70da6d3bc1de490865456b7e6dca8a3026c48ff17a531bc80aaddca458ecb4ddde0850b2f391e330f904535c6c4ca24620433", 0xac, 0x4fff8e9d}, {0x0}, {&(0x7f0000001480)="465697ced8388912af6ff405d25758037fe3bb407ba039f9856e76b92e414555236ddc8de241fa35d9115d446e00635d246da8ff5679374fb13f56200418da3dc23eb1d34e26e05b98e04f8a05de2924e6ba0cd6ad492f3f6a875a0eff3d7fd3a767af34cf9185da858688c41aa6518642e7d47b38263471dc06f064be5beb", 0x7f, 0x7f}], 0x41, &(0x7f0000001600)={[{'\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}], [{@fsmagic={'fsmagic', 0x3d, 0x967a}}, {@context={'context', 0x3d, 'user_u'}}]}) 05:33:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x51, 0x80009, 0x1, 0x4}, 0x40) 05:33:20 executing program 1: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001540)=[{&(0x7f00000011c0)="c4", 0x1}, {&(0x7f0000001300)='h', 0x1}], 0x0, 0x0) 05:33:20 executing program 4: clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:20 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:20 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) preadv2(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x1008}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000002240)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) 05:33:20 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x340, 0x340, 0x0, 0x0, 0x410, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'veth0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@local, @ipv6=@private1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0x118, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@dst={{0x48, 'dst\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @private1, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) 05:33:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:20 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002400), 0x0, &(0x7f0000002480)={[{@nls={'nls', 0x3d, 'iso8859-1'}}]}) 05:33:20 executing program 2: open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0xc0, 0x0) 05:33:20 executing program 4: clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:20 executing program 4: clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:20 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x4140, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2600, 0x0) 05:33:20 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4140, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}]}) 05:33:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:20 executing program 4: clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) [ 709.147277][ T4375] x_tables: ip6_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING 05:33:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)=@secondary='builtin_and_secondary_trusted\x00') add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) [ 709.236284][ T34] audit: type=1800 audit(1604036000.576:19): pid=4401 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16299 res=0 errno=0 [ 709.303973][ T34] audit: type=1800 audit(1604036000.616:20): pid=4404 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15731 res=0 errno=0 [ 709.372798][ T34] audit: type=1800 audit(1604036000.616:21): pid=4404 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15731 res=0 errno=0 05:33:21 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) preadv2(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x1008}], 0x1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000002240)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) 05:33:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) 05:33:21 executing program 4: clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:21 executing program 1: unshare(0x46000600) 05:33:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:21 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid_for_children\x00') 05:33:21 executing program 4: clone(0x1208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x1, 0x7f, 0x5, 0x6, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) 05:33:21 executing program 0: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000001100)="bf70191cef9e96b9c736aa3610dfdfb63fbbf43c0cd41a09f14fc4f07d8842fd1a5b12212ed9eb6c234713155b921adb6008178a7ac2d622f612f75fd8cbc4baaf21365685cc4dcf30e811e46cd91a6ef99f0507571d83ca06b10ed846e88476aa224784108aca143573c2dfb765e5bb7cc61c5e5e90d682b1eaf6839f181b070eba43ba9fe8f6e95286", 0x8a}, {0x0, 0x0, 0x5}, {&(0x7f0000001280)="cd", 0x1, 0xd294}], 0x41, &(0x7f0000001600)={[{'\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}]}) 05:33:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) [ 709.722367][ T4435] IPVS: ftp: loaded support on port[0] = 21 05:33:21 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4140, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, [], [{}, {0x0, 0x0, 0x0, 0x0, 0x9}]}) [ 709.919029][ T34] audit: type=1800 audit(1604036001.266:22): pid=4483 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16345 res=0 errno=0 [ 709.953220][ T4435] IPVS: ftp: loaded support on port[0] = 21 [ 709.976165][ T34] audit: type=1800 audit(1604036001.296:23): pid=4483 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16345 res=0 errno=0 05:33:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 05:33:21 executing program 2: unshare(0x2000400) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0xa4e0c0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 05:33:21 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r1, r0, 0x0) 05:33:21 executing program 1: unshare(0x46000600) 05:33:21 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:21 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xb, 0x0, 0xff}) 05:33:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$CHAR_RAW_FLSBUF(r2, 0x1261, 0x0) 05:33:21 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 05:33:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:21 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) [ 710.187340][ T4516] IPVS: ftp: loaded support on port[0] = 21 05:33:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 05:33:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x51, 0x9, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x40) 05:33:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, 0x0, 0x0) 05:33:21 executing program 1: syz_mount_image$nfs(&(0x7f0000001080)='nfs\x00', 0x0, 0x0, 0x2, &(0x7f0000001540)=[{&(0x7f0000001100), 0x0, 0x1ff}, {&(0x7f0000001280)="cdea65d78c91e9a4783614302ce34aa0c8ac83c6afc94fe205c2549401ef772305787b53a76ba7b2dd56", 0x2a}], 0x41, &(0x7f0000001600)={[], [{@fsmagic={'fsmagic'}}]}) 05:33:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000001c0)={[], 0x0, 0x1}) 05:33:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, 0x0) 05:33:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:21 executing program 1: syz_mount_image$nfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000001100)="bf", 0x1}, {&(0x7f00000011c0)="c4", 0x1}, {&(0x7f0000001300)='h', 0x1, 0x4fff8e9d}], 0x0, 0x0) 05:33:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, 0x0, 0x0) 05:33:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') 05:33:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @random="9eb1682fd0b9"}, 0x10) 05:33:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock='dioread_nolock'}]}) 05:33:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, 0x0, 0x0) 05:33:21 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x5}, 0x0, 0x0, 0x0) 05:33:22 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9, 0x0, 0x81}) 05:33:22 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x2, 0x0, 0xaa72}}) 05:33:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 05:33:22 executing program 2: syz_mount_image$nfs(&(0x7f0000001080)='nfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)) 05:33:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:22 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/114, 0x72}], 0x1, 0x0, 0x0) 05:33:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13}, 0x40) 05:33:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 05:33:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) [ 710.791467][ T4608] rtc_cmos 00:00: Alarms can be up to one day in the future 05:33:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock='dioread_nolock'}]}) 05:33:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x6, &(0x7f0000000180)) 05:33:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) [ 710.876842][ T4616] NFS: Device name not specified [ 710.893537][ T4616] NFS: Device name not specified 05:33:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x40) 05:33:22 executing program 2: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 05:33:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 05:33:22 executing program 1: [ 711.010767][ T4627] EXT4-fs (loop3): Mount option "dioread_nolock" incompatible with ext2 05:33:22 executing program 2: 05:33:22 executing program 1: 05:33:22 executing program 0: [ 711.100276][ T4627] EXT4-fs (loop3): Mount option "dioread_nolock" incompatible with ext2 05:33:22 executing program 0: [ 712.321396][ T9930] device hsr_slave_0 left promiscuous mode [ 712.327753][ T9930] device hsr_slave_1 left promiscuous mode [ 712.334133][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 712.341647][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 712.349304][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 712.356716][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 712.366386][ T9930] device bridge_slave_1 left promiscuous mode [ 712.372776][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.381379][ T9930] device bridge_slave_0 left promiscuous mode [ 712.387746][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.397343][ T9930] device veth1_macvtap left promiscuous mode [ 712.403708][ T9930] device veth0_macvtap left promiscuous mode [ 712.409747][ T9930] device veth1_vlan left promiscuous mode [ 712.415561][ T9930] device veth0_vlan left promiscuous mode [ 713.069229][ T9930] team0 (unregistering): Port device team_slave_1 removed [ 713.079922][ T9930] team0 (unregistering): Port device team_slave_0 removed [ 713.090083][ T9930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 713.101486][ T9930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 713.131125][ T9930] bond0 (unregistering): Released all slaves [ 714.377810][ T4668] IPVS: ftp: loaded support on port[0] = 21 [ 714.442553][ T4668] chnl_net:caif_netlink_parms(): no params data found [ 714.472296][ T4668] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.479370][ T4668] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.486860][ T4668] device bridge_slave_0 entered promiscuous mode [ 714.494908][ T4668] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.502632][ T4668] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.510585][ T4668] device bridge_slave_1 entered promiscuous mode [ 714.525558][ T4668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 714.536464][ T4668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 714.553964][ T4668] team0: Port device team_slave_0 added [ 714.560759][ T4668] team0: Port device team_slave_1 added [ 714.573880][ T4668] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 714.580832][ T4668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 714.606785][ T4668] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 714.621065][ T4668] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 714.628105][ T4668] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 714.654645][ T4668] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 714.676252][ T4668] device hsr_slave_0 entered promiscuous mode [ 714.682732][ T4668] device hsr_slave_1 entered promiscuous mode [ 714.689572][ T4668] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 714.697856][ T4668] Cannot create hsr debugfs directory [ 714.725604][ T4668] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.732700][ T4668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 714.739961][ T4668] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.746968][ T4668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 714.781861][ T4668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 714.793696][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 714.805354][ T3858] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.814516][ T3858] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.824779][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 714.837613][ T4668] 8021q: adding VLAN 0 to HW filter on device team0 [ 714.848420][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 714.856559][ T3428] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.863584][ T3428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 714.878137][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 714.886342][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.893377][ T488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 714.910260][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 714.918705][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 714.932231][ T4668] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 714.943184][ T4668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 714.957153][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 714.965332][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 714.973846][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 714.982070][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 715.002433][ T4668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 715.010321][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 715.018948][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 715.059033][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 715.069477][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 715.080101][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 715.087502][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 715.100307][ T4668] device veth0_vlan entered promiscuous mode [ 715.111105][ T4668] device veth1_vlan entered promiscuous mode [ 715.128002][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 715.135908][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 715.147770][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 715.157805][ T4668] device veth0_macvtap entered promiscuous mode [ 715.166249][ T4668] device veth1_macvtap entered promiscuous mode [ 715.180730][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 715.191284][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.201291][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 715.212179][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.222015][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 715.232509][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.242419][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 715.253010][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.262903][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 715.273713][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.285395][ T4668] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 715.293096][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 715.303650][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 715.313183][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 715.324729][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.334769][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 715.345337][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.355342][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 715.365885][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.375729][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 715.386545][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.397399][ T4668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 715.409877][ T4668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 715.421574][ T4668] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 715.430465][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 715.463998][ T888] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 715.482563][ T888] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 715.499946][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 715.518811][ T888] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 715.526882][ T888] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 715.537052][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:33:26 executing program 3: clone(0x194affd, 0x0, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) 05:33:26 executing program 2: 05:33:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 05:33:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:26 executing program 1: 05:33:26 executing program 0: 05:33:27 executing program 3: 05:33:27 executing program 0: 05:33:27 executing program 2: 05:33:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 05:33:27 executing program 1: prctl$PR_MCE_KILL(0x26, 0x1, 0x0) 05:33:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0xd0}}, 0x0) 05:33:27 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000380)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @void}}}]}) 05:33:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x298, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 05:33:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x8000}]}) 05:33:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:27 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x10, 0x1, 0x1, [r1]}}], 0x10}, 0x0) 05:33:27 executing program 3: syz_mount_image$tmpfs(&(0x7f0000001740)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000002c40)) 05:33:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x298, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 05:33:27 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000f00)=[@rights={{0xc, 0x1, 0xfd}}], 0xc}, 0x0) [ 715.874238][ T4953] tmpfs: Bad value for 'mpol' [ 715.884305][ T4953] tmpfs: Bad value for 'mpol' 05:33:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x298, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 05:33:27 executing program 3: request_key(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0xfffffffffffffffa) 05:33:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x4, &(0x7f0000001340)=@framed={{}, [@jmp]}, &(0x7f0000001780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 05:33:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x839}, 0x40) 05:33:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmsg(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:33:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r1, @ANYBLOB="01002cbd70000000000000000000000001"], 0xd0}}, 0x0) 05:33:27 executing program 1: 05:33:27 executing program 2: r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/235, 0xf4}, {&(0x7f0000000100)=""/2}], 0x1, &(0x7f0000000280)=[{0x0, 0x34}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000180)=""/245}], 0x9, 0x0) 05:33:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x10, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0xd0}}, 0x0) [ 716.932359][ T9930] device hsr_slave_0 left promiscuous mode [ 716.949452][ T9930] device hsr_slave_1 left promiscuous mode [ 716.961651][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 716.977677][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 716.998150][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 717.005740][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 717.018233][ T9930] device bridge_slave_1 left promiscuous mode [ 717.024387][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.035676][ T9930] device bridge_slave_0 left promiscuous mode [ 717.043238][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.055253][ T9930] device veth1_macvtap left promiscuous mode [ 717.062817][ T9930] device veth0_macvtap left promiscuous mode [ 717.071027][ T9930] device veth1_vlan left promiscuous mode [ 717.076784][ T9930] device veth0_vlan left promiscuous mode [ 717.759629][ T9930] team0 (unregistering): Port device team_slave_1 removed [ 717.769947][ T9930] team0 (unregistering): Port device team_slave_0 removed [ 717.779999][ T9930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 717.791108][ T9930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 717.818149][ T9930] bond0 (unregistering): Released all slaves [ 719.346251][ T5009] IPVS: ftp: loaded support on port[0] = 21 [ 719.400490][ T5009] chnl_net:caif_netlink_parms(): no params data found [ 719.431457][ T5009] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.438518][ T5009] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.445944][ T5009] device bridge_slave_0 entered promiscuous mode [ 719.455176][ T5009] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.463038][ T5009] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.470817][ T5009] device bridge_slave_1 entered promiscuous mode [ 719.485881][ T5009] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 719.496625][ T5009] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 719.514112][ T5009] team0: Port device team_slave_0 added [ 719.521077][ T5009] team0: Port device team_slave_1 added [ 719.534074][ T5009] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 719.541108][ T5009] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 719.568107][ T5009] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 719.579766][ T5009] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 719.586687][ T5009] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 719.614451][ T5009] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 719.635519][ T5009] device hsr_slave_0 entered promiscuous mode [ 719.642350][ T5009] device hsr_slave_1 entered promiscuous mode [ 719.650438][ T5009] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 719.658196][ T5009] Cannot create hsr debugfs directory [ 719.686146][ T5009] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.693181][ T5009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 719.700511][ T5009] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.707625][ T5009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 719.739878][ T5009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 719.752616][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 719.761338][ T488] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.772530][ T488] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.782445][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 719.795348][ T5009] 8021q: adding VLAN 0 to HW filter on device team0 [ 719.806038][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 719.815090][T28451] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.822208][T28451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 719.837887][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 719.846195][ T3858] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.853240][ T3858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 719.870917][ T5009] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 719.881728][ T5009] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 719.895058][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 719.904359][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 719.913341][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 719.921972][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 719.937444][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 719.944920][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 719.954169][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 719.963848][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 719.977264][ T5009] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 720.017818][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 720.031893][ T5009] device veth0_vlan entered promiscuous mode [ 720.038711][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 720.048958][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 720.056648][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 720.068109][ T5009] device veth1_vlan entered promiscuous mode [ 720.085883][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 720.094057][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 720.103031][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 720.113322][ T5009] device veth0_macvtap entered promiscuous mode [ 720.123258][ T5009] device veth1_macvtap entered promiscuous mode [ 720.136751][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 720.147199][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.157416][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 720.168040][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.179629][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 720.192592][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.204619][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 720.216502][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.228615][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 720.240066][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.252333][ T5009] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 720.260962][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 720.271050][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 720.280244][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 720.291811][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.301781][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 720.312348][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.322225][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 720.332675][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.342500][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 720.352959][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.363733][ T5009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 720.374224][ T5009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 720.385270][ T5009] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 720.393987][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 720.430241][ T888] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 720.445126][ T888] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 720.459238][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 720.483711][ T888] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 720.492963][ T888] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 720.501298][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:33:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:31 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x100}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) 05:33:31 executing program 0: mount$fuseblk(&(0x7f000000aac0)='/dev/loop0\x00', &(0x7f000000ab00)='./file0\x00', &(0x7f000000ab40)='fuseblk\x00', 0x0, &(0x7f000000abc0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 05:33:31 executing program 2: pipe2$9p(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTAT(r0, 0x0, 0x5a) 05:33:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@cred={{0x18}}], 0x18}, 0x0) [ 720.529867][ T5240] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (32 blocks) 05:33:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8936, &(0x7f0000000080)={'sit0\x00', 0x0}) 05:33:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x300, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 05:33:32 executing program 0: r0 = openat$tun(0xffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000300)) 05:33:32 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@size={'size', 0x3d, [0x70, 0x25]}}]}) 05:33:32 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000001780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 05:33:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x300, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 05:33:32 executing program 3: write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) 05:33:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:32 executing program 0: 05:33:32 executing program 1: 05:33:32 executing program 2: 05:33:32 executing program 3: 05:33:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x300, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 05:33:32 executing program 1: 05:33:32 executing program 0: 05:33:32 executing program 2: 05:33:32 executing program 3: 05:33:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:32 executing program 1: [ 721.109969][ T5290] xt_hashlimit: overflow, try lower: 0/0 [ 721.730221][ T955] device hsr_slave_0 left promiscuous mode [ 721.750321][ T955] device hsr_slave_1 left promiscuous mode [ 721.766949][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 721.786675][ T955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 721.802518][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 721.827717][ T955] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 721.838871][ T955] device bridge_slave_1 left promiscuous mode [ 721.845139][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.879073][ T955] device bridge_slave_0 left promiscuous mode [ 721.885338][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.904225][ T955] device veth1_macvtap left promiscuous mode [ 721.919255][ T955] device veth0_macvtap left promiscuous mode [ 721.935433][ T955] device veth1_vlan left promiscuous mode [ 721.941285][ T955] device veth0_vlan left promiscuous mode [ 722.592868][ T955] team0 (unregistering): Port device team_slave_1 removed [ 722.602025][ T955] team0 (unregistering): Port device team_slave_0 removed [ 722.612969][ T955] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 722.624952][ T955] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 722.651885][ T955] bond0 (unregistering): Released all slaves [ 724.132740][ T5311] IPVS: ftp: loaded support on port[0] = 21 [ 724.202342][ T5311] chnl_net:caif_netlink_parms(): no params data found [ 724.231917][ T5311] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.239070][ T5311] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.246552][ T5311] device bridge_slave_0 entered promiscuous mode [ 724.255627][ T5311] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.264003][ T5311] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.272154][ T5311] device bridge_slave_1 entered promiscuous mode [ 724.286927][ T5311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 724.298182][ T5311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 724.315622][ T5311] team0: Port device team_slave_0 added [ 724.323017][ T5311] team0: Port device team_slave_1 added [ 724.336046][ T5311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 724.343130][ T5311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 724.369208][ T5311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 724.381800][ T5311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 724.388855][ T5311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 724.415276][ T5311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 724.438712][ T5311] device hsr_slave_0 entered promiscuous mode [ 724.445086][ T5311] device hsr_slave_1 entered promiscuous mode [ 724.453065][ T5311] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 724.460723][ T5311] Cannot create hsr debugfs directory [ 724.488298][ T5311] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.495377][ T5311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.502663][ T5311] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.509869][ T5311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.541974][ T5311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 724.552986][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 724.562343][T28451] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.571068][T28451] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.580482][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 724.593268][ T5311] 8021q: adding VLAN 0 to HW filter on device team0 [ 724.604557][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 724.615219][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.622395][ T488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.638094][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 724.646417][ T3428] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.653448][ T3428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.672539][ T5311] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 724.683055][ T5311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 724.695716][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 724.704695][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 724.713490][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 724.721960][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 724.737109][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 724.744497][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 724.753172][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 724.760902][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 724.774997][ T5311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 724.817817][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 724.826682][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 724.836199][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 724.843945][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 724.853417][ T5311] device veth0_vlan entered promiscuous mode [ 724.864277][ T5311] device veth1_vlan entered promiscuous mode [ 724.881359][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 724.889251][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 724.898711][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 724.910098][ T5311] device veth0_macvtap entered promiscuous mode [ 724.920378][ T5311] device veth1_macvtap entered promiscuous mode [ 724.933549][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 724.944305][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 724.954208][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 724.964685][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 724.975007][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 724.985618][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 724.995507][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 725.006035][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.017884][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 725.028746][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.039877][ T5311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 725.048618][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 725.058594][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 725.067696][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.078280][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.089856][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.100316][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.110142][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.121459][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.132292][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.142747][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.152617][ T5311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.163138][ T5311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.174248][ T5311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 725.183501][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 725.217908][ T9930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 725.225728][ T9930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 725.252425][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 725.255393][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:33:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:36 executing program 0: 05:33:36 executing program 2: 05:33:36 executing program 3: 05:33:36 executing program 1: 05:33:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) [ 725.267946][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 725.275381][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:33:36 executing program 3: 05:33:36 executing program 2: 05:33:36 executing program 0: 05:33:36 executing program 1: 05:33:36 executing program 2: [ 725.369600][ T5549] xt_hashlimit: overflow, try lower: 0/0 05:33:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000005, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='schedstat\x00') write$P9_RREADDIR(r0, 0x0, 0x0) 05:33:36 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 05:33:36 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000001640)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x2}, 0x20) 05:33:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:36 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) [ 725.515737][ T5563] xt_hashlimit: overflow, try lower: 0/0 05:33:37 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000400)=[{{&(0x7f0000000100)=@pppol2tpv3in6, 0x80, 0x0}}], 0x1, 0x0, 0x0) 05:33:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 05:33:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:37 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xd20c3, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', 0x0, 0x0, 0x0) 05:33:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f00000015c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:33:37 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$inet6(r0, 0x0, &(0x7f0000000300)) 05:33:37 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) 05:33:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000000)={0x6, 'wg0\x00', {0x81}}) 05:33:37 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0xffffffffffff4b1b) 05:33:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:37 executing program 0: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}) 05:33:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 05:33:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) [ 726.692831][ T26] device hsr_slave_0 left promiscuous mode [ 726.708946][ T26] device hsr_slave_1 left promiscuous mode [ 726.719066][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 726.736960][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 726.754986][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 726.763492][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 726.779346][ T26] device bridge_slave_1 left promiscuous mode [ 726.785567][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.797013][ T26] device bridge_slave_0 left promiscuous mode [ 726.803265][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.815499][ T26] device veth1_macvtap left promiscuous mode [ 726.821817][ T26] device veth0_macvtap left promiscuous mode [ 726.828801][ T26] device veth1_vlan left promiscuous mode [ 726.834519][ T26] device veth0_vlan left promiscuous mode [ 727.488907][ T26] team0 (unregistering): Port device team_slave_1 removed [ 727.499211][ T26] team0 (unregistering): Port device team_slave_0 removed [ 727.510245][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 727.521292][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 727.549079][ T26] bond0 (unregistering): Released all slaves [ 728.935722][ T5622] IPVS: ftp: loaded support on port[0] = 21 [ 728.996475][ T5622] chnl_net:caif_netlink_parms(): no params data found [ 729.027520][ T5622] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.034585][ T5622] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.045663][ T5622] device bridge_slave_0 entered promiscuous mode [ 729.055167][ T5622] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.064090][ T5622] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.074386][ T5622] device bridge_slave_1 entered promiscuous mode [ 729.091079][ T5622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 729.101757][ T5622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 729.121566][ T5622] team0: Port device team_slave_0 added [ 729.128476][ T5622] team0: Port device team_slave_1 added [ 729.141508][ T5622] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 729.149476][ T5622] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 729.177309][ T5622] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 729.189080][ T5622] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 729.196015][ T5622] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 729.221892][ T5622] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 729.243068][ T5622] device hsr_slave_0 entered promiscuous mode [ 729.249583][ T5622] device hsr_slave_1 entered promiscuous mode [ 729.255791][ T5622] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 729.264330][ T5622] Cannot create hsr debugfs directory [ 729.292668][ T5622] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.299711][ T5622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.306955][ T5622] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.313981][ T5622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.344641][ T5622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 729.356104][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.365302][ T3428] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.373615][ T3428] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.383629][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 729.395485][ T5622] 8021q: adding VLAN 0 to HW filter on device team0 [ 729.405545][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 729.414260][ T3858] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.421296][ T3858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.438002][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 729.446350][ T3428] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.453447][ T3428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.462244][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 729.478805][ T5622] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 729.490231][ T5622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 729.502888][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 729.511600][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 729.520609][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 729.528942][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 729.547287][ T5622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 729.554396][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 729.561870][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 729.570900][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 729.599448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 729.619588][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 729.628227][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 729.635849][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 729.649561][ T5622] device veth0_vlan entered promiscuous mode [ 729.662258][ T5622] device veth1_vlan entered promiscuous mode [ 729.679864][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 729.688228][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 729.696526][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 729.712291][ T5622] device veth0_macvtap entered promiscuous mode [ 729.721654][ T5622] device veth1_macvtap entered promiscuous mode [ 729.734634][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 729.745122][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.755156][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 729.766782][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.776769][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 729.787179][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.797207][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 729.807638][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.817457][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 729.827901][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.839093][ T5622] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 729.846836][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 729.856601][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 729.866118][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 729.877047][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.887055][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 729.897532][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.907371][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 729.917775][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.927622][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 729.939494][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.949609][ T5622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 729.960164][ T5622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 729.971275][ T5622] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 729.980129][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 730.014633][ T9930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 730.035993][ T9930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 730.044023][ T888] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 730.053814][ T888] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 05:33:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:41 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4913}, 0x1c) 05:33:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x400000000000003, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}, @sadb_lifetime={0x4, 0x4}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0xb0}}, 0x0) 05:33:41 executing program 0: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r1 = epoll_create(0x20) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x7f2480, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000000c0)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000000c0)='//\x00'}, 0x30) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) close(r5) r6 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) keyctl$chown(0x4, r4, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 05:33:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 730.068199][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 730.075946][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 730.127639][ T5853] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:33:41 executing program 0: pselect6(0x40, &(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)={0x7fff}, &(0x7f0000002900)={0x77359400}, &(0x7f0000002980)={&(0x7f0000002940)={[0x8]}, 0x8}) 05:33:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2c0, 0x2a8, 0x2a8, 0x2c0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000005}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x3, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'netpci0\x00', 'hsr0\x00'}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 05:33:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 05:33:41 executing program 2: 05:33:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:41 executing program 3: 05:33:41 executing program 0: 05:33:41 executing program 4: 05:33:41 executing program 3: 05:33:41 executing program 0: 05:33:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 05:33:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="d13d080000000000ffff0f"], 0x14}}, 0x0) 05:33:41 executing program 0: 05:33:41 executing program 2: 05:33:41 executing program 4: 05:33:41 executing program 3: 05:33:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:41 executing program 0: 05:33:41 executing program 1: 05:33:41 executing program 4: 05:33:41 executing program 2: 05:33:41 executing program 3: 05:33:42 executing program 0: 05:33:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:42 executing program 4: 05:33:42 executing program 1: 05:33:42 executing program 2: 05:33:42 executing program 3: 05:33:42 executing program 1: 05:33:42 executing program 4: 05:33:42 executing program 2: 05:33:42 executing program 0: 05:33:42 executing program 3: 05:33:42 executing program 1: 05:33:42 executing program 4: [ 731.731055][ T888] device hsr_slave_0 left promiscuous mode [ 731.751468][ T888] device hsr_slave_1 left promiscuous mode [ 731.763951][ T888] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 731.779665][ T888] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 731.790189][ T888] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 731.797879][ T888] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 731.805504][ T888] device bridge_slave_1 left promiscuous mode [ 731.811844][ T888] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.819570][ T888] device bridge_slave_0 left promiscuous mode [ 731.825812][ T888] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.839598][ T888] device veth1_macvtap left promiscuous mode [ 731.845704][ T888] device veth0_macvtap left promiscuous mode [ 731.852718][ T888] device veth1_vlan left promiscuous mode [ 731.858472][ T888] device veth0_vlan left promiscuous mode [ 732.504879][ T888] team0 (unregistering): Port device team_slave_1 removed [ 732.514542][ T888] team0 (unregistering): Port device team_slave_0 removed [ 732.525118][ T888] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 732.536511][ T888] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 732.563900][ T888] bond0 (unregistering): Released all slaves [ 733.976062][ T5943] IPVS: ftp: loaded support on port[0] = 21 [ 734.040954][ T5943] chnl_net:caif_netlink_parms(): no params data found [ 734.072305][ T5943] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.079499][ T5943] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.091433][ T5943] device bridge_slave_0 entered promiscuous mode [ 734.101602][ T5943] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.110321][ T5943] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.121459][ T5943] device bridge_slave_1 entered promiscuous mode [ 734.138304][ T5943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 734.148902][ T5943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 734.169120][ T5943] team0: Port device team_slave_0 added [ 734.175924][ T5943] team0: Port device team_slave_1 added [ 734.194014][ T5943] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 734.201150][ T5943] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 734.231815][ T5943] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 734.245614][ T5943] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 734.254270][ T5943] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 734.282066][ T5943] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 734.305585][ T5943] device hsr_slave_0 entered promiscuous mode [ 734.312165][ T5943] device hsr_slave_1 entered promiscuous mode [ 734.321043][ T5943] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 734.328623][ T5943] Cannot create hsr debugfs directory [ 734.356223][ T5943] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.363260][ T5943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.371545][ T5943] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.378575][ T5943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.411176][ T5943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 734.422553][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 734.432030][ T9573] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.439910][ T9573] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.450189][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 734.461047][ T5943] 8021q: adding VLAN 0 to HW filter on device team0 [ 734.471870][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 734.481069][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.488117][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.507839][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 734.516059][ T9573] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.523102][ T9573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.532157][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 734.541190][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 734.549678][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 734.561853][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 734.573477][ T5943] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 734.584451][ T5943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 734.592854][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 734.607927][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 734.615276][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 734.627469][ T5943] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 734.669861][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 734.683151][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 734.692056][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 734.701710][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 734.712470][ T5943] device veth0_vlan entered promiscuous mode [ 734.723043][ T5943] device veth1_vlan entered promiscuous mode [ 734.739881][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 734.748422][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 734.757625][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 734.767992][ T5943] device veth0_macvtap entered promiscuous mode [ 734.777082][ T5943] device veth1_macvtap entered promiscuous mode [ 734.791498][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.802290][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.812352][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.822865][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.832693][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.843222][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.853125][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.864388][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.874248][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.884920][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.896945][ T5943] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 734.906051][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 734.916780][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 734.926456][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 734.937080][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.947022][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 734.957458][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.968172][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 734.978686][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.988545][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 734.999064][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 735.009475][ T5943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 735.020948][ T5943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 735.031882][ T5943] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 735.041099][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 735.077798][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 735.085615][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 735.111692][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 735.120203][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:33:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:46 executing program 0: 05:33:46 executing program 3: 05:33:46 executing program 2: 05:33:46 executing program 1: 05:33:46 executing program 4: [ 735.127867][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 735.135212][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:33:46 executing program 3: 05:33:46 executing program 2: [ 735.171082][ T6173] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:33:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:46 executing program 0: 05:33:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000003140)={0x5, 0x4, 0x5, 0x396}, 0x40) 05:33:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:33:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000003140)={0x5, 0x4, 0x5, 0x4, 0x9}, 0x40) 05:33:46 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x20008842) 05:33:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) 05:33:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000080)) 05:33:46 executing program 2: 05:33:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000001380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000001140)=""/192, 0x2e, 0xc0, 0x1}, 0x20) 05:33:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500), 0x0, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:46 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') 05:33:46 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:33:47 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x1e7c1, 0x0) 05:33:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000001380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10, 0x10000000}, {0x1, 0x4}]}]}}, &(0x7f0000001140)=""/192, 0x36, 0xc0, 0x1}, 0x20) 05:33:47 executing program 4: socketpair(0x2c, 0x0, 0x0, &(0x7f00000000c0)) 05:33:47 executing program 2: 05:33:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000001cc0)=[@ip_retopts={{0x10}}, @ip_ttl={{0x14}}], 0x28}, 0x0) 05:33:47 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140), 0x58) 05:33:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@txtime={{0x24}}], 0x18}, 0x0) 05:33:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:33:47 executing program 1: [ 736.536311][ T26] device hsr_slave_0 left promiscuous mode [ 736.548422][ T26] device hsr_slave_1 left promiscuous mode [ 736.571151][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 736.588875][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 736.621821][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 736.649473][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 736.667005][ T26] device bridge_slave_1 left promiscuous mode [ 736.680606][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.701072][ T26] device bridge_slave_0 left promiscuous mode [ 736.710668][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.743548][ T26] device veth1_macvtap left promiscuous mode [ 736.749809][ T26] device veth0_macvtap left promiscuous mode [ 736.765983][ T26] device veth1_vlan left promiscuous mode [ 736.771967][ T26] device veth0_vlan left promiscuous mode [ 737.442490][ T26] team0 (unregistering): Port device team_slave_1 removed [ 737.452050][ T26] team0 (unregistering): Port device team_slave_0 removed [ 737.463424][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 737.474501][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 737.501153][ T26] bond0 (unregistering): Released all slaves [ 739.094416][ T6255] IPVS: ftp: loaded support on port[0] = 21 [ 739.153747][ T6255] chnl_net:caif_netlink_parms(): no params data found [ 739.184549][ T6255] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.192472][ T6255] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.200544][ T6255] device bridge_slave_0 entered promiscuous mode [ 739.209681][ T6255] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.217060][ T6255] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.225120][ T6255] device bridge_slave_1 entered promiscuous mode [ 739.240749][ T6255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 739.251215][ T6255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 739.269476][ T6255] team0: Port device team_slave_0 added [ 739.277179][ T6255] team0: Port device team_slave_1 added [ 739.291976][ T6255] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 739.298958][ T6255] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 739.326918][ T6255] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 739.338638][ T6255] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 739.345573][ T6255] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 739.371468][ T6255] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 739.392735][ T6255] device hsr_slave_0 entered promiscuous mode [ 739.399272][ T6255] device hsr_slave_1 entered promiscuous mode [ 739.405501][ T6255] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 739.413087][ T6255] Cannot create hsr debugfs directory [ 739.443258][ T6255] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.450327][ T6255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 739.457553][ T6255] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.464578][ T6255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 739.496290][ T6255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 739.508631][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 739.517827][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.525518][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.538822][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 739.549970][ T6255] 8021q: adding VLAN 0 to HW filter on device team0 [ 739.561192][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 739.570153][ T3428] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.577194][ T3428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 739.596655][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 739.605635][ T3694] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.612833][ T3694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 739.621948][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 739.637937][ T6255] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 739.649634][ T6255] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 739.662364][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 739.670922][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 739.680021][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 739.688332][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 739.705392][ T6255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 739.713456][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 739.721738][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 739.729945][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 739.768747][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 739.781381][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 739.792211][ T6255] device veth0_vlan entered promiscuous mode [ 739.799426][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 739.807168][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 739.819745][ T6255] device veth1_vlan entered promiscuous mode [ 739.836520][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 739.844904][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 739.854503][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 739.864807][ T6255] device veth0_macvtap entered promiscuous mode [ 739.874441][ T6255] device veth1_macvtap entered promiscuous mode [ 739.890002][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 739.900592][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.910540][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 739.921309][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.931388][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 739.944089][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.953954][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 739.964562][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.974404][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 739.984979][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.998140][ T6255] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 740.005755][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 740.016105][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 740.025670][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 740.036626][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.046821][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 740.057302][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.067200][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 740.077805][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.087755][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 740.098299][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.109036][ T6255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 740.119506][ T6255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.131127][ T6255] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 740.140149][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 740.174571][ T888] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 740.189805][ T888] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 740.197709][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 740.205628][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 740.224230][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 740.234178][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:33:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:51 executing program 3: 05:33:51 executing program 2: 05:33:51 executing program 4: 05:33:51 executing program 1: 05:33:51 executing program 0: 05:33:51 executing program 4: 05:33:51 executing program 2: [ 740.275376][ T6486] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:33:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:51 executing program 0: 05:33:51 executing program 1: 05:33:51 executing program 2: 05:33:51 executing program 3: 05:33:51 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(r0, 0x0, 0x0) 05:33:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000012c0)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000001280)=[@rights], 0x10}, 0x0) 05:33:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r0, 0x5) 05:33:51 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) chmod(&(0x7f0000000080)='./file0\x00', 0x0) 05:33:51 executing program 0: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 05:33:51 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0xc34) 05:33:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, 0x0) 05:33:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:52 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCNXCL(r0, 0x2000740e) 05:33:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ftruncate(r0, 0x0) 05:33:52 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000140)="ad5bfc86c1c8ebb452c83c2c759b1eae1c86ff3b2d2eb16021c77f33fdca189f54164f72cfd4709adc4dd70f676210133ddde41f8afdaca9c26d2a45ab1676869df9aadbec17691772ad6c5ae073a10f1616d76094d7b16f10d53339a2f6dc04598a01b0056357919347eb7863fa4ba9969255ed07a9c35e78d4ea48e97865fd5812ee6f232001b9bafb7f783db4e44c3ac0a81c20a903e788ab39179ce35106122fd08be0fe1ae89ee85d91a4344191ce99c5e1130eb3e50b0d", 0xba) 05:33:52 executing program 1: setrlimit(0x5, &(0x7f0000000140)={0x0, 0x80000001}) 05:33:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000012c0)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000001280)}, 0x0) 05:33:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400", 0x2b, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 05:33:52 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x4004667f, &(0x7f0000000080)) 05:33:52 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/134}], 0x10000099) 05:33:52 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 05:33:52 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff}) writev(r0, &(0x7f0000002580), 0x1) 05:33:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$TIOCMBIC(r1, 0x8004746b, &(0x7f0000000000)) 05:33:52 executing program 4: socketpair(0x23, 0x2, 0x0, &(0x7f0000001800)) 05:33:52 executing program 3: 05:33:52 executing program 0: 05:33:52 executing program 1: 05:33:52 executing program 0: [ 741.842419][ T26] device hsr_slave_0 left promiscuous mode [ 741.856383][ T26] device hsr_slave_1 left promiscuous mode [ 741.868257][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 741.886018][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 741.906527][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 741.913960][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 741.936488][ T26] device bridge_slave_1 left promiscuous mode [ 741.942743][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.953933][ T26] device bridge_slave_0 left promiscuous mode [ 741.965479][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.985711][ T26] device veth1_macvtap left promiscuous mode [ 741.991733][ T26] device veth0_macvtap left promiscuous mode [ 742.001465][ T26] device veth1_vlan left promiscuous mode [ 742.009590][ T26] device veth0_vlan left promiscuous mode [ 742.657087][ T26] team0 (unregistering): Port device team_slave_1 removed [ 742.668224][ T26] team0 (unregistering): Port device team_slave_0 removed [ 742.679288][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 742.690580][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 742.716759][ T26] bond0 (unregistering): Released all slaves [ 744.228299][ T6580] IPVS: ftp: loaded support on port[0] = 21 [ 744.283278][ T6580] chnl_net:caif_netlink_parms(): no params data found [ 744.313983][ T6580] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.321506][ T6580] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.332815][ T6580] device bridge_slave_0 entered promiscuous mode [ 744.342606][ T6580] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.351862][ T6580] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.361743][ T6580] device bridge_slave_1 entered promiscuous mode [ 744.378347][ T6580] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 744.389086][ T6580] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 744.409831][ T6580] team0: Port device team_slave_0 added [ 744.419495][ T6580] team0: Port device team_slave_1 added [ 744.435074][ T6580] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 744.442523][ T6580] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 744.471854][ T6580] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 744.485296][ T6580] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 744.494026][ T6580] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 744.523783][ T6580] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 744.547357][ T6580] device hsr_slave_0 entered promiscuous mode [ 744.553841][ T6580] device hsr_slave_1 entered promiscuous mode [ 744.563931][ T6580] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 744.573549][ T6580] Cannot create hsr debugfs directory [ 744.602660][ T6580] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.609695][ T6580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 744.616978][ T6580] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.624478][ T6580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 744.656838][ T6580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 744.668411][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 744.676706][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.684275][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.694190][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 744.706017][ T6580] 8021q: adding VLAN 0 to HW filter on device team0 [ 744.717029][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 744.725244][T28451] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.732338][T28451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 744.747336][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 744.757144][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.764258][ T488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 744.788031][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 744.797271][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 744.805845][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 744.814086][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 744.825053][ T6580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 744.833281][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 744.848639][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 744.856549][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 744.868105][ T6580] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 744.906047][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 744.921608][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 744.929993][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 744.939121][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 744.948732][ T6580] device veth0_vlan entered promiscuous mode [ 744.959637][ T6580] device veth1_vlan entered promiscuous mode [ 744.976264][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 744.984114][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 744.992660][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 745.003114][ T6580] device veth0_macvtap entered promiscuous mode [ 745.012004][ T6580] device veth1_macvtap entered promiscuous mode [ 745.026138][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 745.036575][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.048711][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 745.059166][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.068977][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 745.080966][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.091039][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 745.101611][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.111445][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 745.121930][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.134375][ T6580] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 745.142393][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 745.153357][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 745.162557][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 745.174165][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.184256][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 745.195890][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.205776][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 745.216244][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.226193][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 745.237817][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.247618][ T6580] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 745.258269][ T6580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 745.269496][ T6580] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 745.278231][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 745.325334][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 745.333824][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 745.349439][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 745.359985][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 745.362234][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:33:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400", 0x2b, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:56 executing program 1: 05:33:56 executing program 3: 05:33:56 executing program 4: 05:33:56 executing program 2: 05:33:56 executing program 0: [ 745.382202][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 745.416907][ T6810] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:33:56 executing program 1: 05:33:56 executing program 0: 05:33:56 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt(r0, 0xfff, 0x0, 0x0, 0x0) 05:33:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000040), 0x1) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000000c0)="2e299a4a35", 0x5}], 0x1}, 0x0) 05:33:56 executing program 3: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 05:33:56 executing program 4: getpeername$unix(0xffffffffffffff9c, 0x0, 0x0) 05:33:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400", 0x2b, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, &(0x7f0000000240)="c6", 0x1, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 05:33:57 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x3e, 0x0, 0x0) 05:33:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x1c, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 05:33:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="060002"], 0xc) 05:33:57 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c1c4e20000000000003"], 0x98) 05:33:57 executing program 0: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000) 05:33:57 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) 05:33:57 executing program 2: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000001c0)={0x0, 0x5830}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)="de409143d8aee2056628d8fa0571b60ef795df5df2", 0x15}, {&(0x7f0000000080)="6c1082fc041f6ceff41eabf05e0390dbf8ee3b7bca277336b78783b721d65fa40649f7d428a9d75f5bc686226da8a892643fc45879ce7bc37a33ebbc4c3af31e3415455159304ea9b87a7373c8eae31ef2189804f7b8b3874b489ed40bcaf4da6f8990d73b8407874f3941236c37f0295f8aabcef0cfe6b6528262dc46f9b824ede96e747b1eb446f9a6b64a3108d65533031b586c88011f80ea8f254914fc1b8354ee93ca5905fdab76c7ae5b4da6ca4a42a4f4f3906d91f83ab5913979275b9abea878e73db295775b3c0c25634a4f2f2f10c91c164308b3f0083e8607d3c929d2e5bd70a7daa1a810034df03a6c96f9", 0xf1}, {&(0x7f0000000700)="9f6e39cfd37bb2164db5bf74e5948c18d24c4d0e19b1ae213220768a5429316220b4374f313655c7c3168216b30b023d9bc4caee4d2ea31afe37dc5f9371f0d25bed4191af6368309ba0d6624723ab3c306a69961dbe89e553d460f7db96f1f19162808e0b681f8739b507ee49b4819dad0f8708f438033f", 0x78}, {&(0x7f0000000280)="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", 0xfe}, {&(0x7f0000000380)="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", 0xfb}, {&(0x7f0000000480)="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", 0xfb}, {&(0x7f00000012c0)="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", 0x127}], 0x7}, 0x0) 05:33:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000", 0x32, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:57 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r4 = dup(r3) r5 = fcntl$dupfd(r2, 0x0, r4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x24, &(0x7f0000000000)=0x1c00, 0xfe6a) 05:33:57 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1c, 0x1c, 0x2}, 0x1c) close(r0) 05:33:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fchmod(r0, 0x0) 05:33:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000", 0x32, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:33:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 05:33:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0xe9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000280), &(0x7f0000000000)=0x94) 05:33:57 executing program 2: munmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000) 05:33:57 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f00000001c0), &(0x7f0000000140)=0x7) 05:33:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="7fd734a8f356e98d39ed718b90b82b0d63c55e3cc8a5554bd218b0de7814d1b4275ab49b426051124f5070d27d415ff45513a4cc049f24952f3ff65a6261dbe0031e7908f83a8409bc377a23accf433f7f621c07a86cf269", 0x58}, {&(0x7f00000001c0)="8154749a1cf0d6775e7922d86d675c3ed8c30f698bcdd67d628b0c6e34677e762dda6c351058b2385fda71c75b724e1038f5eca9b8fe11e7bf9a1bb1e1bdbe1782", 0x41}], 0x2, &(0x7f0000000380)=ANY=[], 0xa8}, 0x0) 05:33:57 executing program 3: pipe2(&(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 05:33:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000080)=ANY=[@ANYBLOB="1002"], &(0x7f0000000140)=0x94) 05:33:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB='\a'], 0xc) 05:33:57 executing program 0: select(0xff01, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x200000000}) 05:33:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) close(r0) 05:33:57 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040), 0x8) [ 746.962256][ T21] device hsr_slave_0 left promiscuous mode [ 746.969402][ T21] device hsr_slave_1 left promiscuous mode [ 746.980803][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 746.999558][ T21] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 747.020483][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 747.038903][ T21] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 747.058590][ T21] device bridge_slave_1 left promiscuous mode [ 747.095604][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.103363][ T21] device bridge_slave_0 left promiscuous mode [ 747.123704][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.146593][ T21] device veth1_macvtap left promiscuous mode [ 747.152613][ T21] device veth0_macvtap left promiscuous mode [ 747.163241][ T21] device veth1_vlan left promiscuous mode [ 747.169043][ T21] device veth0_vlan left promiscuous mode [ 747.813891][ T21] team0 (unregistering): Port device team_slave_1 removed [ 747.823646][ T21] team0 (unregistering): Port device team_slave_0 removed [ 747.835250][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 747.846452][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 747.873101][ T21] bond0 (unregistering): Released all slaves [ 749.336259][ T6941] IPVS: ftp: loaded support on port[0] = 21 [ 749.396390][ T6941] chnl_net:caif_netlink_parms(): no params data found [ 749.427017][ T6941] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.434066][ T6941] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.445928][ T6941] device bridge_slave_0 entered promiscuous mode [ 749.453766][ T6941] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.464995][ T6941] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.474307][ T6941] device bridge_slave_1 entered promiscuous mode [ 749.491120][ T6941] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 749.501604][ T6941] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 749.522837][ T6941] team0: Port device team_slave_0 added [ 749.529747][ T6941] team0: Port device team_slave_1 added [ 749.543003][ T6941] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 749.549946][ T6941] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 749.579512][ T6941] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 749.591178][ T6941] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 749.598135][ T6941] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 749.624142][ T6941] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 749.646063][ T6941] device hsr_slave_0 entered promiscuous mode [ 749.652377][ T6941] device hsr_slave_1 entered promiscuous mode [ 749.660376][ T6941] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 749.668007][ T6941] Cannot create hsr debugfs directory [ 749.695855][ T6941] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.702881][ T6941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.710144][ T6941] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.718616][ T6941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 749.750510][ T6941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 749.762008][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 749.771801][ T3428] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.779564][ T3428] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.789331][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 749.801349][ T6941] 8021q: adding VLAN 0 to HW filter on device team0 [ 749.812547][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 749.822126][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.829189][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 749.846891][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 749.855211][T28451] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.862248][T28451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.871668][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 749.888480][ T6941] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 749.898944][ T6941] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 749.911947][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 749.920385][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 749.929302][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 749.937709][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 749.956046][ T6941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 749.963190][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 749.971512][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 749.979084][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 750.008009][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 750.026577][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 750.034926][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 750.044792][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 750.055386][ T6941] device veth0_vlan entered promiscuous mode [ 750.066129][ T6941] device veth1_vlan entered promiscuous mode [ 750.082095][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 750.090586][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 750.099205][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 750.109217][ T6941] device veth0_macvtap entered promiscuous mode [ 750.119456][ T6941] device veth1_macvtap entered promiscuous mode [ 750.133071][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 750.145138][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.155120][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 750.165784][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.175605][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 750.186500][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.197350][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 750.207790][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.217713][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 750.228222][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.239202][ T6941] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 750.247973][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 750.259442][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 750.269389][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 750.279950][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.289946][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 750.300478][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.310300][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 750.320820][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.330652][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 750.341075][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.351869][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 750.363559][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 750.375151][ T6941] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 750.383490][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 750.427748][ T9930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 750.436977][ T9930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 750.451738][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 750.470147][ T9930] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 05:34:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000", 0x32, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:01 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x32, 0x0, 0x0) 05:34:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x108, &(0x7f0000000040)={0x0, 0x0, 0xd25f85eaa0aee342}, &(0x7f0000000080)=0x18) 05:34:01 executing program 4: setrlimit(0x0, &(0x7f0000000140)={0x10001}) 05:34:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)='T', 0x1}], 0x1, &(0x7f0000000440)=[@init={0x14}], 0x14}, 0x0) 05:34:01 executing program 0: 05:34:01 executing program 2: [ 750.480212][ T9930] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 750.488008][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 750.517181][ T7172] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:34:01 executing program 2: 05:34:02 executing program 2: 05:34:02 executing program 4: 05:34:02 executing program 0: 05:34:02 executing program 3: r0 = epoll_create(0x400) flock(r0, 0x5) 05:34:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c000000100005026669", 0x36, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:02 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x32241, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 05:34:02 executing program 1: pselect6(0x0, 0x0, &(0x7f00000021c0), 0x0, &(0x7f0000002240)={0x0, 0x3938700}, &(0x7f00000022c0)={0x0}) 05:34:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x644000, 0x0) 05:34:02 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$char_raw(r0, &(0x7f0000000100)=ANY=[], 0xbe00) 05:34:02 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) 05:34:02 executing program 4: open(&(0x7f000000dd40)='./file0\x00', 0x32640, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x628c1, 0x0) 05:34:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c000000100005026669", 0x36, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:02 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RCREATE(r0, 0x0, 0x0) 05:34:02 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$char_raw(r0, &(0x7f0000000200)={""/43991}, 0xac00) write$P9_RREADDIR(r1, &(0x7f00000001c0)=ANY=[], 0x12e) 05:34:02 executing program 0: open(&(0x7f000000dd40)='./file0\x00', 0x32640, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x84) 05:34:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) 05:34:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x73d040) 05:34:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000080)='e', 0x1, 0x4880, &(0x7f0000000100)=@abs, 0x6e) 05:34:03 executing program 0: pselect6(0x40, &(0x7f0000002080), 0x0, 0x0, &(0x7f0000002240)={0x0, 0x3938700}, &(0x7f00000022c0)={0x0}) 05:34:03 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$char_raw(r0, &(0x7f0000000200)={""/43991}, 0xac00) write$P9_RREADDIR(r1, &(0x7f00000001c0)=ANY=[], 0x12e) 05:34:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000080)={0x0, 0x2710}, 0x10) 05:34:03 executing program 4: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc) [ 751.668407][ T9930] device hsr_slave_0 left promiscuous mode [ 751.686714][ T9930] device hsr_slave_1 left promiscuous mode 05:34:03 executing program 1: pselect6(0x0, 0x0, &(0x7f00000021c0), &(0x7f0000002200), &(0x7f0000002240)={0x0, 0x3938700}, 0x0) [ 751.720474][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 751.753839][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 751.780625][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 751.810106][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 751.861186][ T9930] device bridge_slave_1 left promiscuous mode [ 751.875318][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.894088][ T9930] device bridge_slave_0 left promiscuous mode [ 751.908369][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.943512][ T9930] device veth1_macvtap left promiscuous mode [ 751.976744][ T9930] device veth0_macvtap left promiscuous mode [ 751.982837][ T9930] device veth1_vlan left promiscuous mode [ 752.015209][ T9930] device veth0_vlan left promiscuous mode [ 753.093965][ T9930] team0 (unregistering): Port device team_slave_1 removed [ 753.103713][ T9930] team0 (unregistering): Port device team_slave_0 removed [ 753.114485][ T9930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 753.126835][ T9930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 753.152639][ T9930] bond0 (unregistering): Released all slaves [ 754.933112][ T7278] IPVS: ftp: loaded support on port[0] = 21 [ 755.001789][ T7278] chnl_net:caif_netlink_parms(): no params data found [ 755.035757][ T7278] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.043220][ T7278] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.057523][ T7278] device bridge_slave_0 entered promiscuous mode [ 755.065443][ T7278] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.072821][ T7278] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.080809][ T7278] device bridge_slave_1 entered promiscuous mode [ 755.100111][ T7278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 755.111598][ T7278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 755.132262][ T7278] team0: Port device team_slave_0 added [ 755.139811][ T7278] team0: Port device team_slave_1 added [ 755.156509][ T7278] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 755.163853][ T7278] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 755.191358][ T7278] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 755.203187][ T7278] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 755.210427][ T7278] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 755.236598][ T7278] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 755.257965][ T7278] device hsr_slave_0 entered promiscuous mode [ 755.264829][ T7278] device hsr_slave_1 entered promiscuous mode [ 755.273142][ T7278] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 755.280800][ T7278] Cannot create hsr debugfs directory [ 755.309602][ T7278] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.316766][ T7278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 755.324077][ T7278] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.331109][ T7278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.363317][ T7278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 755.374331][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 755.384773][T28451] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.393593][T28451] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.403894][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 755.416887][ T7278] 8021q: adding VLAN 0 to HW filter on device team0 [ 755.429156][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 755.437427][T28451] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.444451][T28451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.466517][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 755.476378][ T4881] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.483528][ T4881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 755.493751][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 755.503178][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 755.518828][ T7278] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 755.530354][ T7278] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 755.544695][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 755.553734][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 755.563831][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 755.583479][ T7278] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 755.591946][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 755.599899][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 755.611442][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 755.645459][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 755.662248][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 755.671104][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 755.680538][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 755.692287][ T7278] device veth0_vlan entered promiscuous mode [ 755.703041][ T7278] device veth1_vlan entered promiscuous mode [ 755.722059][ T7278] device veth0_macvtap entered promiscuous mode [ 755.729198][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 755.738884][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 755.747157][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 755.758105][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 755.768585][ T7278] device veth1_macvtap entered promiscuous mode [ 755.782095][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 755.795200][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.806355][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 755.817289][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.827363][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 755.840607][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.850931][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 755.862168][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.872934][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 755.884479][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.896241][ T7278] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 755.904470][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 755.916421][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 755.927269][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.939001][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 755.949620][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.959724][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 755.970437][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 755.980521][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 755.993186][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 756.003488][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 756.014209][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 756.025947][ T7278] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 756.034020][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 756.073243][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 756.088613][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 756.100565][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 756.104330][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:34:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c000000100005026669", 0x36, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x4000) 05:34:07 executing program 4: 05:34:07 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x500000f, 0x403c072, r0, 0x0) 05:34:07 executing program 3: r0 = open(&(0x7f000000dd40)='./file0\x00', 0x32640, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) 05:34:07 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000007c80), 0x0, 0x0, &(0x7f0000007e00)) [ 756.119003][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 756.129970][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 756.162851][ T7508] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:34:07 executing program 3: socket(0x10, 0x2, 0x7) 05:34:07 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x100, 0x0, 0x0) 05:34:07 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000007c80), 0x2, 0x0, 0x0) 05:34:07 executing program 0: 05:34:07 executing program 2: 05:34:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65", 0x38, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:07 executing program 0: 05:34:07 executing program 4: 05:34:07 executing program 2: 05:34:07 executing program 1: 05:34:07 executing program 0: 05:34:07 executing program 3: 05:34:07 executing program 0: 05:34:07 executing program 1: 05:34:07 executing program 2: 05:34:07 executing program 4: 05:34:07 executing program 3: 05:34:07 executing program 1: 05:34:07 executing program 0: 05:34:07 executing program 2: 05:34:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65", 0x38, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:07 executing program 4: 05:34:07 executing program 3: 05:34:08 executing program 1: 05:34:08 executing program 2: 05:34:08 executing program 3: 05:34:08 executing program 4: 05:34:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65", 0x38, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:08 executing program 0: 05:34:08 executing program 1: 05:34:08 executing program 3: 05:34:08 executing program 2: 05:34:08 executing program 4: 05:34:08 executing program 0: 05:34:08 executing program 1: 05:34:08 executing program 3: 05:34:08 executing program 4: 05:34:08 executing program 2: 05:34:08 executing program 0: [ 757.747962][ T9930] device hsr_slave_0 left promiscuous mode [ 757.765282][ T9930] device hsr_slave_1 left promiscuous mode [ 757.777134][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 757.784609][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 757.806465][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 757.813925][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 757.842563][ T9930] device bridge_slave_1 left promiscuous mode [ 757.848992][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 757.862714][ T9930] device bridge_slave_0 left promiscuous mode [ 757.869130][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.878760][ T9930] device veth1_macvtap left promiscuous mode [ 757.884860][ T9930] device veth0_macvtap left promiscuous mode [ 757.891012][ T9930] device veth1_vlan left promiscuous mode [ 757.898047][ T9930] device veth0_vlan left promiscuous mode [ 758.555016][ T9930] team0 (unregistering): Port device team_slave_1 removed [ 758.565901][ T9930] team0 (unregistering): Port device team_slave_0 removed [ 758.576996][ T9930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 758.588223][ T9930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 758.618427][ T9930] bond0 (unregistering): Released all slaves [ 760.055904][ T7598] IPVS: ftp: loaded support on port[0] = 21 [ 760.120144][ T7598] chnl_net:caif_netlink_parms(): no params data found [ 760.154956][ T7598] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.162352][ T7598] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.174321][ T7598] device bridge_slave_0 entered promiscuous mode [ 760.185223][ T7598] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.192250][ T7598] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.204083][ T7598] device bridge_slave_1 entered promiscuous mode [ 760.219965][ T7598] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 760.230705][ T7598] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 760.248980][ T7598] team0: Port device team_slave_0 added [ 760.256928][ T7598] team0: Port device team_slave_1 added [ 760.270007][ T7598] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 760.277022][ T7598] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 760.305407][ T7598] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 760.317206][ T7598] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 760.324141][ T7598] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 760.351493][ T7598] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 760.372129][ T7598] device hsr_slave_0 entered promiscuous mode [ 760.378512][ T7598] device hsr_slave_1 entered promiscuous mode [ 760.387156][ T7598] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 760.394718][ T7598] Cannot create hsr debugfs directory [ 760.424609][ T7598] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.431670][ T7598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 760.438955][ T7598] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.446838][ T7598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 760.479192][ T7598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 760.490772][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 760.500624][ T3858] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.508832][ T3858] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.519400][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 760.532458][ T7598] 8021q: adding VLAN 0 to HW filter on device team0 [ 760.542861][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 760.552034][ T4881] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.559079][ T4881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 760.575108][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 760.584205][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.591265][ T488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 760.608598][ T7598] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 760.620166][ T7598] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 760.633206][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 760.642359][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 760.652026][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 760.662051][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 760.679675][ T7598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 760.686984][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 760.694393][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 760.702927][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 760.715119][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 760.755124][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 760.763938][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 760.776500][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 760.783953][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 760.796313][ T7598] device veth0_vlan entered promiscuous mode [ 760.806717][ T7598] device veth1_vlan entered promiscuous mode [ 760.823977][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 760.831839][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 760.843990][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 760.856220][ T7598] device veth0_macvtap entered promiscuous mode [ 760.865866][ T7598] device veth1_macvtap entered promiscuous mode [ 760.879017][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 760.889523][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 760.899451][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 760.910038][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 760.922742][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 760.934427][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 760.946294][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 760.958041][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 760.969061][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 760.980788][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 760.992857][ T7598] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 761.001952][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 761.013009][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 761.023554][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 761.034088][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 761.044184][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 761.056049][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 761.065877][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 761.077456][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 761.087353][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 761.097769][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 761.107590][ T7598] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 761.118016][ T7598] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 761.131698][ T7598] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 761.139849][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 761.176519][ T955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 761.184341][ T955] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 761.196227][ T9930] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 761.204097][ T9930] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 761.214260][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 761.223264][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:12 executing program 1: 05:34:12 executing program 3: 05:34:12 executing program 4: 05:34:12 executing program 2: 05:34:12 executing program 0: 05:34:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:12 executing program 2: 05:34:12 executing program 3: [ 761.272837][ T7828] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:34:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:12 executing program 1: 05:34:12 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) sendmsg$inet_sctp(r2, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000080)="d1", 0x1}], 0x1, &(0x7f0000000200)=[@init={0x14, 0x84, 0x1, {0x0, 0x0, 0xad47}}], 0x14}, 0x0) 05:34:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="01"], 0x9) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000000)={0x0, 0x1}, 0x8) 05:34:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000000)=0x20000587, 0x4) 05:34:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0xa, 0x0, 0x0, &(0x7f0000000140)=[@cred, @rights, @rights], 0x40}, 0x0) 05:34:12 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000440)=@file={0xa}, 0xa, 0x0, 0x50, &(0x7f00000003c0)=[@cred], 0x18}, 0x0) 05:34:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000000)=0x587, 0x49) 05:34:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000140)="01e6bda79ac693f5fadceedb1cc3d1e7123134293e7690e5981f30fc2fc9aa32ea919d7f45e6d3ebd6631e4f6f0d35e9c729a78e83f2ed6eed8cda81e4e9f3d6a2f8b71e92760dc7ad4fb464e51c42d99fd27dde874101a82833a0585eec1c044df2c0747113b2ea7bd9e9fad8c90988d69dcb1e1914ae3bac26c527be0c4a8c7c4bd04fab83ed8fff16ffb285d4624cfe84", 0xfffffffffffffe4e, 0x4, 0x0, 0x7) writev(r0, 0x0, 0x0) 05:34:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r1) sendmsg$unix(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000ffff000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="10000000ffff000001000000", @ANYRES32=r1, @ANYBLOB="20000000ffff000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0c000000ffff00000100000018000000ffff000002000000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="18000000ffff"], 0x84}, 0x0) 05:34:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) writev(r0, &(0x7f0000001700)=[{&(0x7f0000000200)="1dbdd661be833bef63142a694886e7358f4b981b0a72ead12447468e5a598808cdfbf863a75b31f6782ab492fd0351a67eec393cc7bc22caf850999b24349b0ae2872ac88bde4faaa4e01377830bf50a96f038522a8d8f1c30d34212f381e43d99acc0476b814b0e7f6cefea62ca2242ad1f919e3fd831", 0x77}, {&(0x7f0000000280)="4449d625cf0a1b237c4ea685249f62750d99fb253da9971f2b1b3aae4de0780648af89d4a841f0a19ba7350b73a8867cf30a7936873f43ac970397611c84134043f48ff8f478092d8778c056c667f1a73d30bb09dce344dd86366bb306722ee6d70ee5523ad6821f2f35212423226c9cca536526858b64991d8a7208703629393b5dbf8c54c485b9249b15d2db4331bb54435712e09cb4bc0e201862fd57b7e09c9e6655f9cc6f6048bd9c0cce12afe9908f6d3b693a697a9641a8de79543c2a5702a7ad769f5574c4b6", 0xca}, {&(0x7f0000000380)="cb419907d8e4c8bfff45c7c60ba88d7904b1dbadcd012715037b27aebf1a4a17b6ab66f1ccfb937b15b820762a5dd61c65938d32ff30e23a4cca7d0ccf8ac4bdac9c6e4acfb0305f9fff87a56797589f904b356c87728bdbcf4babfea14879f19d98655ab780ca4550ca63048ca54e2549fed058c1e9092f4d8b6d37141b71641a38db0183bfd77e3f1472534ab2b4db854dfd7d3d802dd22994535c9757b3cad4083859f9f9a838c7ab60d2df9547e2182e3cadee2c55ab31461bf3eee5b64f554dc749668cee7b6bc6d4d32b84284942b0932222617ab8a93547b94222439bac01c385e240b967ff87e3c7", 0xec}, {&(0x7f0000000480)="4af4ca2aa32596bac0c282418c9aa8214276b0144d2f719b24d1cd2586df3452544436760606e3b640ddbc1c29848ee47cdd19db45f554e85da44e1343b832051b3bfef1f44b26849b4810b0841d858fcc948f472030038189b83903b9d48cac8eb6fd360a6e044b3b412729503045e70244705eacef92689571c083fd292fd8952271da774e396408dffd8baa700ef15ca4b6edbbbb8b0c4cdd6d1c0c76ec4ce9d8e57d25d7a98ee2996391c0f9cfd7543dfa5b967863bdd66a48bf6e9646a59442da51e8e3cda1ea2868470708ea08f0689522462624b395eedede1e8a4f013b639590bbd95e806784984e4d94824b8f3beaeec4dd2b3e5efc86bb7d24f528b6ca92d9d26b357a8fea1eb719e97d35a2b791947e084c1b46255b9fcbfea318576cb0eb720dbbc55faa8bf1c19bb20f9685ff8bb95d18c352f49acb3c41e68c3b34bdb579ab4b4eb5cc0497d0dfc50118cb248e8161878fbe05c3a6f12cfcffe309bfe74ac7de7921de2dfeb9088c7878d04f040eee37c34a8108ed35f9bdbfebb31f1e2cad16a86b10996e431873468e408862a773e1b47ac00073b508462a56f032e9edeb9dc559165b79ec963aa9f986472f4cd508082ee12108f858526f67a07366e209033e8d22154761b71038422ca8340868ad13f2b58c6dd3ad560f52ee39eee3302f5401215c15f239fcb41c733e97147bb1ddc07cf7ec98ff495ed0dc38672c450bfe67f24fe353d4d8c0fcbf02ecd2cb146d413a4af196ae305f4ed1f33e83aa5ef74d8d404e8eb1b4f26da434fa51fffc3730267f5f1d46c3fc52471921ad1bd8d06d883c530d5e8582383df84398ba64b24d3dafccefe35f0ff6e2f6c7b4171c485140464f419a4d3f75941d0d16bb63024aee04b4ddee5be1bcae47560af1a578a1079d3172c4dd3a9c058f64148196744cba23dc27751d8f818d327caecdf77cfd8a7084913b9713bee638521af06d267e921a144e7843c960f6bc519e5121434a550b71383e3f54b3d8ff1f55757299b04da51271908fa65ab407208242cdb6f2ef4036dee19eb2b408dcf4a96f3c7c326e3d688bdf86e68d01f0646ebe099377230db8e668d69e9cca37cee08f02e168b0b2be7a9a796c03d610ebcf9f6cfe96aa8252f981b721c8e3f33a64a75ef3e62c6b5fd9deb2f0550335efd3b08063bbc874ccf39f9253373c35deffd85a36cdf344b97803873c4dcb16caaecd34f49d6cf4c9b56c1801c6877774d00033626eace0124ee5b2a5ac2680901ad280c2add5e0c65090fef166bc3901b422b5f76c3bd3da735951196e59ba09105fcf4b405151f4bbec77365ba51bb3de365cb582c03162b18e3a7b1c7ecd821af8698e05ac90d41cdaf1bb9aaffbcb40d5146cc55243416bf6fd2b08d2f72ccd6c1dddaa49bce92be4d61ee7e316ae9364f64777f263f53e240bf5a2e7f2c9e0473595928de82affc689806cd4303d3976c63775982c061038d73e3e0f311ad8e4ce8f037df813768ad2bc99ab0b19537db25fb3221855ff4f91090f01d2d76a94fc5f1442415e99d693ce63949a4a6b848e40dfb3b50ccb3cfd62306fa461230ad6c1291cd7978e50c383fb50b7e895c23b762fe85d8a77e5cc66d2b9c6fa1e2ef881f0affb6fc303d81f4ae020d18f1609b0e82c35fd0c138c503980dee61c8df3227fa98fe038f9dc8956669c53c375121d88f01d41d71afb6d18516dcfcbfa7fadf6c81073fcffceb00f398be43d7dfbb37d0a606ec378bbae69e10605bde54db6736284b60549309a3098360bad63e06a98ce25e35f497458ab1960c57c8ae1f3d2e877f531d637cadbda3a0cb94d6eb428ada137a34290e9772926cf8e5bba108d810a6444508c8a173e2e868f4a7d7edda99069a305302d70a1cb8e5b2033a54ff359f6379e014511ebf67b46a7102ece52abcd3d20bc20d054f9080874180564ed6b9b74a2db992d683e84f125ec3e71dbdb513108bdc65a0c3b868802c1d221b13a570b2e07944ac6f32ba27c22dead5b0fd54e76f32e227fd0f3820f7ac5795cf8289c9e67c38d6e5edebf77c3c016c36207e4bf3529556c304b21f869af897db9d2aef01cc2f590c53ed0fe5dee5ad7da5e58afa47ad68fcaa6b6bd40a8895dd0b0fec16a226ba3e2ba2872dcbaf1463cf80f56629ef4eba1476b7daf20bbeac2e0d0d67fcffec7cc3efbd83f63b3044a28836b515349a85c540423db7460b882be1194fd2a9872f466a4a3c78063d0c2755a427c955d0e6afcf3ac2828c79992bb4e7a24171087505ef25267ab98b2e9981a4293a42d04b5d6c37c3ca3bbb77daa93c6a029f50192337fceab8d9d91f47cd34be119a85e821669bfb5f0bc69ef51dc04c4577166268e043a6174f539073aa69c3816961c9d5dc09edc3721eebaa9abe14557c2bdc93b7710505a792e69c4659a01973332d082e89638edddee5bf158a74331790c55c60e5d6e9998e70730b87a57ef7bbc8ae46dc87f4d9e56469e6130ceee5af66159bdc06e29d4be5bdcc48b11a3a3498aff471b955c63802775f1ebe0b905913f64bc7d9b3810d82c9afbcc4498216b9798387b86352bc4774727511b618dd58d99d2ffd7587ec1264536cd43670c9f78b14bf2593ae2e786c7be8bddad2d941a1860d416c1f6ed7df204c2d2d031704ccce8d3453a930fa71a6e520d6f7e67106f24323064515dee20ec24af17521bd0208e3adf380ea8f639cd60d6f858d7e51161e73e92994cd393570d3135f83cf582ae38e0b0684f2f3ed8a8e249028c98e404d1cdab89ccbcf7c9680215acbcc6d2af8f16b548e4c9dd6740332e0071b6c2a7d5d4a9c9b8408df9166d9e3eb493ddc9d02f904ad23e135fbf0fa1b56ee72d618fa72da9ad2c9514555ef16e2ae9e4693786e785cde7f87b2c4e9f11022749760bdbac20c6880c352715352636dc605c262d25b5caabda8b178e3928e7aa67969669e10d0622cff6cccbf2f1587b435713a760b64e722506a0f0ae0aee59a02428ad4b811fe0961e2129d198cedb85960ff4d2abb9ce4dc88492d198feaf48a42836f93ede382b85c0a65617dbbc1492ffa6911dd41c00b5ea4f488a468274c455ba4209d01d507b49f53307c2d3d8be8a0f062c2c08210e7c2542bd489be7d416e3786351e74a816c4c0f4eb8635c6041758863067750bd6a91f8163eef46a05a1db4463c619c29485adc8d828820815dc59113b80a1c91be6ddf05644297182a4425c9520de5af97d6a5be53cca7cc3ec6c81b6356d7765aad21ae386561f5ba91ff15ef914d927cc381d1e28410dfaef8b89b7bb8e1b378588e427bfdebbdcbbfc50cbdfb6455e20609f5b3cb173016e4073753a48400c5ba26e852b13804c53c7c1f112b37b0184494f795eda1bbba8511cca995d182ffda2f62d7339703314805aad853c91a0c1cb33c2f96e7c42b5e62bdb525607da122342ba4758f1469582553441952cef8525be702f8ce671d909d2a9098dcdb59f623c721db34add44b05f3a91f0de3e04c56b30a1584bb1a5176880b6b569d8edbcb775e27878e91a6c6e6522763746c81e314e65f7d8080932c5c3c752efdff41b2b47394e907bfef5fdde64b622ac3f4661cfae7f1cff8dbad74f990e58d92e1d9325737d17999ea5095d75a203f796f59dd740a14f10b6fd9e4dfccf88dc6abc4f388a42be6b458c171db08b1f721179642d559c6bbed5b0a984bd05a236584bc78dce02da6d7438db563e9b9da5eb62950d2371b708aacc24a0709a663ffb855961fdf64ac9667a5d754b5caf9973501653f3890bd3056fed056b3dee1a846459ae7972d7d2d0c6b68e0851c2c4993138ca7e8cca2bcca0f73c56920f3bfa65d4940a21cf7146812bd0a27b7fd052a8ff2a2a67144a1a6f7bec2f7e79176b1e4556253baacf2138f54c136f11743e5f3a73473ba873522c39a0252dc4ec3b40c2a965b23d33bc29dfd7a8df178f3324875884c527316c51c8ce60759de4f05b1afb8e2bb08b3713ffe5b431252daa22f9195b39812ee224d570c28188ad1728697cdbaab6f0fbfb615457cf541e8a239467ca82689ab466c7a7bf89a7065011cfb856c71f10012255ca63080f2fa0a42104584ac6b6da05ff10c3b601387806561b5342cd5018ac2b1db549c22278189381a30be12a54f0221903569435125777c632af55c7df662bbcbba09c1e8b23bf866fec743623544bf0d6586e2e76f7c663ee0ed92de38ea219ffc1a3937539df237e25dd67c2534bb52dca9b7d8358c66263aaaa28ca751cf128c12f4ae29ee14eb4917e50a54d1457a22b393397811971cc38723e05b7608b45521d4a01e9c0e2264c24063d9ed2d9656694a6e16fa6950bcf927bf1bb9c6abf3eb3a2aa6b8bcc43c9dd55929fa4b6ab2e1a02da6198eb81c4229b9b5089f7e709c850cb5866cf64a3b2b033b1cf38b7479f5829a56acda65afe6790a2452c5dd225d65cc1d16e2773c6acdad871eed8cbd13d4d33c9a4716fd4655be35374c2c7bd983e05eda6bca253745db6ea27dd4e262ceeb7411dd4616736b67c0de2a422d8b5ae8684cd529e6e3b8878fad8c26de6e45a52b18d993a59f86efeaa8a8c63fe59910bf4f9d5950783ea182f12a456019f18de9bdd19b8ef43e22fd89711dd541ecd99bcc9fb6f8daf88b77a882f16dba3af3c4d5ac18c744f275bcb2cb974ffd274d04b880e96543edefcf3b71d548e07afd68ddb13f5bd7a97596f7544e546f75fe089c10c1009bcdb6da7bbd938562ec0ffb1b0f7ee88fe9e97ebb815cc92486204d4d0173a4784c7d500bf25bbe603918df1dc81a1d77eda03996817dec6c27ca10def82dd9c6ac95970a5a1fbb7163177bd5f99e80f0db0cace261ffde98b50464d14ee029ec68a316415f65b64c4c09782b95163a35f7fcf1b31e7316ca040732f0ba03cfc1b9d7e13cd6c5b2928c77e4eeb9471ae7f5dde435de0d18d87888b5709d86ff123fe6e1f6e308dac665fe727583ca2f", 0xdd4}], 0x4) 05:34:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000200)={0x0, 0x400}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000015c0)="95", 0x1}], 0x1}, 0x0) 05:34:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000280)=ANY=[@ANYBLOB="251c"], &(0x7f0000000080)=0x98) 05:34:13 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 05:34:13 executing program 3: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x5, 0x0) writev(r0, 0x0, 0x0) 05:34:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred, @cred], 0x30}, 0x0) 05:34:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$unix(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred, @cred, @rights, @rights, @rights, @cred, @rights, @cred], 0xac}, 0x0) 05:34:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000300)={0x0, 0xc679}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="01"], 0x9) 05:34:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)="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", 0xfe}, {&(0x7f00000001c0)="09e954e0902a2aa0d527713e0af704a3387243cf6a21504f17ceb4513bbb219d2bd4466c6182c9957016708db15320e6a11215c0bdd2db44a3bf88763b39cecc2fc8753cc21bafa673127f48553a0c2c872bd7d7d1d29edbcf9b0bd083a20d09dfc221e56d12b288b9000000", 0x6c}, {&(0x7f0000000240)="4b4f730a5e6e903a2a58ae3a7b2d85cc18e594d9a49198190174068ee77e709be39810e3e06141e9aaf50e795b464c01799fad915ad0d3d30a687f300eec7868a737568d40f925e80b9ace8cdf631100f47f0c22b54fec9d5830f3056e013b8134bdf464ac6cbf2da3af56c0d9b8294cb079d167f5", 0x75}, {&(0x7f0000000180)="4416b07d4b733ae9dfd6a71b43ae881162e03202bceecf399f2c82d3141a1032", 0x20}, {&(0x7f0000001340)="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", 0xe02}], 0x5) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:34:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)=ANY=[@ANYBLOB="1c1c4e200000000000000000000000000000ffffac1400aa"], 0x98) 05:34:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000000)=0x80008, 0x4) 05:34:13 executing program 0: 05:34:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)=ANY=[@ANYBLOB="1c1c4e200000000000000000000000000000ffffac"], 0x98) 05:34:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 05:34:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000040)=0x80008, 0xfc1c) 05:34:13 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) select(0x40, &(0x7f0000000000)={0x1c}, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 05:34:13 executing program 3: symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 05:34:13 executing program 4: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) [ 762.799234][ T8] device hsr_slave_0 left promiscuous mode [ 762.816712][ T8] device hsr_slave_1 left promiscuous mode [ 762.856168][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 762.877303][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 762.886880][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 762.894300][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 762.953796][ T8] device bridge_slave_1 left promiscuous mode [ 762.963118][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 762.986779][ T8] device bridge_slave_0 left promiscuous mode [ 763.002372][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.030202][ T8] device veth1_macvtap left promiscuous mode [ 763.037645][ T8] device veth0_macvtap left promiscuous mode [ 763.043840][ T8] device veth1_vlan left promiscuous mode [ 763.063335][ T8] device veth0_vlan left promiscuous mode [ 763.719413][ T8] team0 (unregistering): Port device team_slave_1 removed [ 763.728982][ T8] team0 (unregistering): Port device team_slave_0 removed [ 763.741256][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 763.752279][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 763.779484][ T8] bond0 (unregistering): Released all slaves [ 765.256342][ T7946] IPVS: ftp: loaded support on port[0] = 21 [ 765.319273][ T7946] chnl_net:caif_netlink_parms(): no params data found [ 765.349839][ T7946] bridge0: port 1(bridge_slave_0) entered blocking state [ 765.356948][ T7946] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.369139][ T7946] device bridge_slave_0 entered promiscuous mode [ 765.377117][ T7946] bridge0: port 2(bridge_slave_1) entered blocking state [ 765.384127][ T7946] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.399048][ T7946] device bridge_slave_1 entered promiscuous mode [ 765.415001][ T7946] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 765.427200][ T7946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 765.443669][ T7946] team0: Port device team_slave_0 added [ 765.451905][ T7946] team0: Port device team_slave_1 added [ 765.465428][ T7946] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 765.472350][ T7946] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 765.498337][ T7946] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 765.510137][ T7946] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 765.517308][ T7946] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 765.543353][ T7946] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 765.563633][ T7946] device hsr_slave_0 entered promiscuous mode [ 765.570932][ T7946] device hsr_slave_1 entered promiscuous mode [ 765.579234][ T7946] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 765.586803][ T7946] Cannot create hsr debugfs directory [ 765.615244][ T7946] bridge0: port 2(bridge_slave_1) entered blocking state [ 765.622280][ T7946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 765.629581][ T7946] bridge0: port 1(bridge_slave_0) entered blocking state [ 765.637523][ T7946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 765.670006][ T7946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 765.682530][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 765.692343][ T9254] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.700407][ T9254] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.711033][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 765.723602][ T7946] 8021q: adding VLAN 0 to HW filter on device team0 [ 765.733962][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 765.742806][ T9573] bridge0: port 1(bridge_slave_0) entered blocking state [ 765.749950][ T9573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 765.765219][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 765.773547][ T9254] bridge0: port 2(bridge_slave_1) entered blocking state [ 765.780626][ T9254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 765.800772][ T7946] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 765.811213][ T7946] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 765.824501][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 765.834083][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 765.843168][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 765.852068][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 765.860314][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 765.869108][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 765.884669][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 765.892080][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 765.902453][ T7946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 765.945618][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 765.956593][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 765.965064][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 765.972720][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 765.988010][ T7946] device veth0_vlan entered promiscuous mode [ 765.998854][ T7946] device veth1_vlan entered promiscuous mode [ 766.014680][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 766.023451][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 766.032116][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 766.043470][ T7946] device veth0_macvtap entered promiscuous mode [ 766.052745][ T7946] device veth1_macvtap entered promiscuous mode [ 766.066148][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 766.077232][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.088623][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 766.099045][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.108855][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 766.120356][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.130323][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 766.140793][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.151273][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 766.161794][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.172921][ T7946] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 766.181970][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 766.193247][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 766.202139][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 766.213010][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.222875][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 766.233313][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.244365][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 766.254796][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.264894][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 766.275360][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.285237][ T7946] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 766.295674][ T7946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 766.307035][ T7946] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 766.315601][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 766.356429][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 766.376473][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 766.386180][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 766.394797][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 05:34:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:17 executing program 0: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0xa) 05:34:17 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000080)="dc", 0x1}, {&(0x7f00000000c0)='k', 0x1}], 0x3}, 0x0) 05:34:17 executing program 2: readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x0, 0x0) 05:34:17 executing program 4: faccessat(0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x0) 05:34:17 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[], 0xa, 0x0, 0x0, &(0x7f0000000000)=[@cred], 0x18}, 0x0) [ 766.402607][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 766.413749][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 766.440628][ T8189] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:34:17 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r0, 0x0) [ 766.453900][ T8189] EXT4-fs error (device loop5): ext4_lookup:1710: inode #2: comm syz-executor.5: deleted inode referenced: 12 05:34:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:17 executing program 2: getegid() semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/4096) 05:34:17 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{0x0, 0xffffffffffffff63}}, 0x0) 05:34:17 executing program 1: open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 05:34:17 executing program 0: wait4(0x0, 0x0, 0x18, 0x0) 05:34:18 executing program 4: 05:34:18 executing program 0: 05:34:18 executing program 3: 05:34:18 executing program 1: 05:34:18 executing program 4: 05:34:18 executing program 2: 05:34:18 executing program 3: 05:34:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {0x0, 0x0, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:18 executing program 1: 05:34:18 executing program 0: 05:34:18 executing program 4: 05:34:18 executing program 2: 05:34:18 executing program 3: 05:34:18 executing program 0: 05:34:18 executing program 1: 05:34:18 executing program 3: 05:34:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {0x0, 0x0, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:18 executing program 2: 05:34:18 executing program 4: 05:34:18 executing program 0: 05:34:18 executing program 1: r0 = socket(0x2, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:34:18 executing program 3: 05:34:18 executing program 4: 05:34:18 executing program 2: 05:34:18 executing program 0: 05:34:18 executing program 3: 05:34:18 executing program 4: 05:34:18 executing program 2: [ 767.950785][ T8] device hsr_slave_0 left promiscuous mode [ 767.966504][ T8] device hsr_slave_1 left promiscuous mode [ 767.976635][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 767.995662][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 768.016340][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 768.023756][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 768.047962][ T8] device bridge_slave_1 left promiscuous mode [ 768.065918][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 768.073659][ T8] device bridge_slave_0 left promiscuous mode [ 768.081127][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 768.103094][ T8] device veth1_macvtap left promiscuous mode [ 768.111869][ T8] device veth0_macvtap left promiscuous mode [ 768.126684][ T8] device veth1_vlan left promiscuous mode [ 768.132486][ T8] device veth0_vlan left promiscuous mode [ 768.788888][ T8] team0 (unregistering): Port device team_slave_1 removed [ 768.798640][ T8] team0 (unregistering): Port device team_slave_0 removed [ 768.811376][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 768.822567][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 768.850690][ T8] bond0 (unregistering): Released all slaves [ 770.294648][ T8280] IPVS: ftp: loaded support on port[0] = 21 [ 770.355929][ T8280] chnl_net:caif_netlink_parms(): no params data found [ 770.385456][ T8280] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.392558][ T8280] bridge0: port 1(bridge_slave_0) entered disabled state [ 770.401041][ T8280] device bridge_slave_0 entered promiscuous mode [ 770.411524][ T8280] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.419988][ T8280] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.428786][ T8280] device bridge_slave_1 entered promiscuous mode [ 770.445225][ T8280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 770.456154][ T8280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 770.473242][ T8280] team0: Port device team_slave_0 added [ 770.481392][ T8280] team0: Port device team_slave_1 added [ 770.494179][ T8280] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 770.501123][ T8280] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 770.528835][ T8280] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 770.540707][ T8280] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 770.549135][ T8280] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 770.575039][ T8280] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 770.596084][ T8280] device hsr_slave_0 entered promiscuous mode [ 770.602454][ T8280] device hsr_slave_1 entered promiscuous mode [ 770.611173][ T8280] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 770.618746][ T8280] Cannot create hsr debugfs directory [ 770.646892][ T8280] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.654070][ T8280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.661299][ T8280] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.668451][ T8280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.701252][ T8280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 770.713131][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 770.723137][ T9573] bridge0: port 1(bridge_slave_0) entered disabled state [ 770.731156][ T9573] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.741384][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 770.754555][ T8280] 8021q: adding VLAN 0 to HW filter on device team0 [ 770.765060][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 770.773405][ T3694] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.780572][ T3694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.805014][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 770.813333][ T9573] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.820366][ T9573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.830100][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 770.840850][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 770.849545][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 770.858637][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 770.868695][ T8280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 770.878390][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 770.893992][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 770.901398][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 770.914035][ T8280] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 770.955268][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 770.969495][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 770.979004][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 770.987561][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 770.998009][ T8280] device veth0_vlan entered promiscuous mode [ 771.009619][ T8280] device veth1_vlan entered promiscuous mode [ 771.027518][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 771.035626][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 771.043808][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 771.054579][ T8280] device veth0_macvtap entered promiscuous mode [ 771.064150][ T8280] device veth1_macvtap entered promiscuous mode [ 771.077249][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.087805][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.098979][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.109484][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.120222][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.130800][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.140632][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.151151][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.161537][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.171978][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.182952][ T8280] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 771.191805][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 771.203103][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 771.213335][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.223827][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.235047][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.245616][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.255536][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.266162][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.275978][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.286459][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.297320][ T8280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.308455][ T8280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.320150][ T8280] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 771.329104][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 771.365521][ T9930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 771.373337][ T9930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 771.385092][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 771.404394][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 771.410375][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 771.429322][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {0x0, 0x0, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:22 executing program 1: 05:34:22 executing program 3: 05:34:22 executing program 2: 05:34:22 executing program 4: 05:34:22 executing program 0: [ 771.462073][ T8532] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 771.472757][ T8532] EXT4-fs error (device loop5): ext4_lookup:1710: inode #2: comm syz-executor.5: deleted inode referenced: 12 05:34:22 executing program 2: 05:34:22 executing program 4: 05:34:22 executing program 1: 05:34:22 executing program 3: 05:34:22 executing program 0: 05:34:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00), 0x0, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@filter={'filter\x00', 0xe, 0x4, 0x4b8, 0xffffffff, 0x1d8, 0x318, 0x0, 0xffffffff, 0xffffffff, 0x3e8, 0x3e8, 0x3e8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x1b0, 0x1d8, 0x0, {}, [@common=@inet=@recent1={{0x108, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@private2, @private1, [], [], 'veth1_to_bond\x00', 'veth0_macvtap\x00'}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}, @common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@ipv6={@local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'vxcan1\x00', 'veth0_to_bond\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) 05:34:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000003fc0)={'sit0\x00', 0x0}) 05:34:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @phonet, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, @ipx={0x4, 0x0, 0x0, "113557a49074"}}) 05:34:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000005b80)={0x0, 0x0, &(0x7f0000005b40)={&(0x7f0000005ac0)={0x2, 0x11, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:34:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000700)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000001d40)=[@rthdr={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x0, 0x0, [@private1]}}}], 0x28}}], 0x2, 0x0) 05:34:23 executing program 0: pselect6(0x17, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180), 0x0) 05:34:23 executing program 3: socketpair(0x21, 0x0, 0x2, 0x0) 05:34:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000380)="aa", 0xfffffffffffffe2f, 0x4000050, &(0x7f0000000480)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) [ 771.747612][ T8560] x_tables: duplicate underflow at hook 2 05:34:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000003c0)='e', 0x1, 0x44, &(0x7f00000004c0)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 05:34:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00), 0x0, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x760, 0x118, 0x1e8, 0x1e8, 0x0, 0x0, 0x690, 0x690, 0x690, 0x690, 0x690, 0x6, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'ipvlan1\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@multicast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@ipv4={[], [], @empty}, @private0, [], [], 'caif0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x108, 0x150, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv6=@mcast1}}}, {{@uncond, 0x0, 0x210, 0x238, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@private1, @private1, @mcast1, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev, @ipv4={[], [], @broadcast}, @ipv4, @empty, @private0, @mcast1, @dev, @dev, @private2, @ipv4={[], [], @multicast1}, @remote]}}, @common=@frag={{0x30, 'frag\x00'}}]}, @inet=@TOS={0x28, 'TOS\x00'}}, {{@ipv6={@mcast1, @mcast1, [], [], 'wg0\x00', 'bridge_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "94e0"}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @HL={0x28, 'HL\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c0) 05:34:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) 05:34:23 executing program 0: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x101000, 0x0) 05:34:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000140)="aa", 0x1, 0x0, &(0x7f0000000480)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) 05:34:23 executing program 2: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4) 05:34:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00), 0x0, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000700)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000001d40)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x2, 0x0) 05:34:23 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000003c0)) 05:34:23 executing program 0: pipe2$9p(&(0x7f000000de00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, &(0x7f000000de40)={0x80, 0x7d, 0x0, {{0x0, 0x5d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6, '\xed!*@!\x83', 0x3, '(%-', 0x13, '/dev/ocfs2_control\x00', 0xe, 'devices.allow\x00'}, 0xe, 'devices.allow\x00', 0x0, 0x0, 0xffffffffffffffff}}, 0x80) 05:34:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000001d80)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x23}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000180)="04", 0x1}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000040)="db", 0x1}], 0x1}}], 0x2, 0x20000841) 05:34:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0x0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x1c0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x18}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@ipv6={@private2, @local, [], [], 'veth0_to_team\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2f0) 05:34:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x3e, 0x0, &(0x7f00000014c0)) 05:34:23 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000180)={@multicast, @multicast, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @dev}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 05:34:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_int(r0, 0x29, 0x4c, 0x0, &(0x7f0000000000)) [ 772.182643][ T8600] x_tables: duplicate underflow at hook 3 05:34:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x598, 0xffffffff, 0x0, 0x128, 0x0, 0xffffffff, 0xffffffff, 0x4c8, 0x4c8, 0x4c8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@local, @private2, [], [], 'bridge_slave_0\x00', 'wg2\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0x44}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x200, 0x228, 0x0, {}, [@common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv6=@dev, [], @ipv6=@mcast1}, {@ipv6=@private2, [], @ipv4=@loopback}, {@ipv4=@remote, [], @ipv6=@private2}, {@ipv4=@remote}]}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}, {{@uncond, 0x0, 0x118, 0x178, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}, @common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@empty}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f8) [ 772.357338][ T8610] x_tables: duplicate underflow at hook 2 05:34:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:34:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x11, 0x0, &(0x7f0000000040)) [ 772.996953][ T9930] device hsr_slave_0 left promiscuous mode [ 773.014537][ T9930] device hsr_slave_1 left promiscuous mode [ 773.028801][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 773.053828][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 773.078621][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 773.103860][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 773.132416][ T9930] device bridge_slave_1 left promiscuous mode [ 773.145451][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.153119][ T9930] device bridge_slave_0 left promiscuous mode [ 773.173587][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.206388][ T9930] device veth1_macvtap left promiscuous mode [ 773.212393][ T9930] device veth0_macvtap left promiscuous mode [ 773.234086][ T9930] device veth1_vlan left promiscuous mode [ 773.240139][ T9930] device veth0_vlan left promiscuous mode [ 773.911437][ T9930] team0 (unregistering): Port device team_slave_1 removed [ 773.921482][ T9930] team0 (unregistering): Port device team_slave_0 removed [ 773.931580][ T9930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 773.942733][ T9930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 773.972188][ T9930] bond0 (unregistering): Released all slaves [ 775.491587][ T8639] IPVS: ftp: loaded support on port[0] = 21 [ 775.558356][ T8639] chnl_net:caif_netlink_parms(): no params data found [ 775.589754][ T8639] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.597680][ T8639] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.610255][ T8639] device bridge_slave_0 entered promiscuous mode [ 775.620409][ T8639] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.630056][ T8639] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.640105][ T8639] device bridge_slave_1 entered promiscuous mode [ 775.656878][ T8639] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 775.667727][ T8639] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 775.690304][ T8639] team0: Port device team_slave_0 added [ 775.697145][ T8639] team0: Port device team_slave_1 added [ 775.716546][ T8639] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 775.723480][ T8639] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 775.754221][ T8639] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 775.767398][ T8639] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 775.775312][ T8639] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 775.801382][ T8639] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 775.822583][ T8639] device hsr_slave_0 entered promiscuous mode [ 775.829054][ T8639] device hsr_slave_1 entered promiscuous mode [ 775.837408][ T8639] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 775.844968][ T8639] Cannot create hsr debugfs directory [ 775.872842][ T8639] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.879943][ T8639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 775.887195][ T8639] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.894468][ T8639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 775.927463][ T8639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 775.939184][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 775.949463][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.957367][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.965874][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 775.978536][ T8639] 8021q: adding VLAN 0 to HW filter on device team0 [ 775.988602][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 775.998105][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.005133][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.024570][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 776.032797][ T3428] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.039848][ T3428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 776.050925][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 776.059566][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 776.073933][ T8639] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 776.084955][ T8639] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 776.096701][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 776.105116][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 776.113667][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 776.121839][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 776.138633][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 776.146356][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 776.162723][ T8639] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 776.205365][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 776.222108][ T8639] device veth0_vlan entered promiscuous mode [ 776.228857][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.242385][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.252149][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 776.265848][ T8639] device veth1_vlan entered promiscuous mode [ 776.283165][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 776.291721][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 776.300755][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 776.310980][ T8639] device veth0_macvtap entered promiscuous mode [ 776.321172][ T8639] device veth1_macvtap entered promiscuous mode [ 776.336135][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 776.346772][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.356775][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 776.367253][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.377119][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 776.387598][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.397424][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 776.407854][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.417682][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 776.428711][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.441908][ T8639] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 776.450746][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 776.460607][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 776.471386][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 776.482401][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.492496][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 776.503045][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.512986][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 776.523434][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.535427][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 776.545956][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.555988][ T8639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 776.567647][ T8639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.578642][ T8639] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 776.589052][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 776.625171][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 776.633014][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 776.660121][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 776.662002][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 776.673579][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 776.688578][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100"/92, 0x5c, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:28 executing program 4: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x2]}, 0x8}) 05:34:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x9, 0x3, 0x430, 0x240, 0xffffffff, 0xffffffff, 0x240, 0xffffffff, 0x360, 0xffffffff, 0xffffffff, 0x360, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'ip6tnl0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'vxcan1\x00'}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"d45f"}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 05:34:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000006c0)='X', 0x1) 05:34:28 executing program 0: pselect6(0x17, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, &(0x7f0000000180), 0x0) 05:34:28 executing program 1: pipe2$9p(&(0x7f000000de00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, &(0x7f000000de40)={0x80, 0x7d, 0x0, {{0x0, 0x5d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6, '\xed!*@!\x83', 0x3, '(%-', 0x13, '/dev/ocfs2_control\x00', 0xe, 'devices.allow\x00'}, 0xe, 'devices.allow\x00', 0x0, 0x0, 0xffffffffffffffff}}, 0x80) write$P9_RMKDIR(r0, &(0x7f000000dec0)={0x14}, 0x14) [ 776.729606][ T8871] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 776.741597][ T8871] EXT4-fs error (device loop5): ext4_lookup:1710: inode #2: comm syz-executor.5: deleted inode referenced: 12 05:34:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100"/92, 0x5c, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:28 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2275, &(0x7f0000000100)) 05:34:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 05:34:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x17, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote}}]}, 0x28}}, 0x0) 05:34:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x0) 05:34:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2286, 0x0) [ 776.869038][ T8889] x_tables: duplicate underflow at hook 3 05:34:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002a80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f0000001240)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7f}, 0x1c, 0x0, 0x0, &(0x7f00000016c0)=[@pktinfo={{0x24, 0x29, 0x32, {@private2}}}], 0x28}}], 0x2, 0x0) 05:34:28 executing program 4: 05:34:28 executing program 2: 05:34:28 executing program 1: 05:34:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100"/92, 0x5c, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:28 executing program 0: 05:34:28 executing program 2: 05:34:28 executing program 4: 05:34:28 executing program 3: 05:34:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84", 0x8a, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:28 executing program 1: 05:34:28 executing program 3: 05:34:28 executing program 0: 05:34:28 executing program 4: 05:34:28 executing program 2: 05:34:28 executing program 1: 05:34:28 executing program 3: 05:34:28 executing program 4: 05:34:28 executing program 2: 05:34:28 executing program 0: 05:34:28 executing program 1: [ 778.216529][ T8] device hsr_slave_0 left promiscuous mode [ 778.227015][ T8] device hsr_slave_1 left promiscuous mode [ 778.243691][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 778.251217][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 778.261328][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 778.269550][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 778.277806][ T8] device bridge_slave_1 left promiscuous mode [ 778.283999][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.291486][ T8] device bridge_slave_0 left promiscuous mode [ 778.297707][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 778.307699][ T8] device veth1_macvtap left promiscuous mode [ 778.314793][ T8] device veth0_macvtap left promiscuous mode [ 778.322046][ T8] device veth1_vlan left promiscuous mode [ 778.327879][ T8] device veth0_vlan left promiscuous mode [ 778.980218][ T8] team0 (unregistering): Port device team_slave_1 removed [ 778.989864][ T8] team0 (unregistering): Port device team_slave_0 removed [ 779.000165][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 779.011146][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 779.040431][ T8] bond0 (unregistering): Released all slaves [ 780.454208][ T8953] IPVS: ftp: loaded support on port[0] = 21 [ 780.518235][ T8953] chnl_net:caif_netlink_parms(): no params data found [ 780.548383][ T8953] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.555444][ T8953] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.563133][ T8953] device bridge_slave_0 entered promiscuous mode [ 780.572201][ T8953] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.581354][ T8953] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.589846][ T8953] device bridge_slave_1 entered promiscuous mode [ 780.605266][ T8953] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 780.615646][ T8953] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 780.633092][ T8953] team0: Port device team_slave_0 added [ 780.641365][ T8953] team0: Port device team_slave_1 added [ 780.655067][ T8953] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 780.662041][ T8953] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 780.689440][ T8953] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 780.701099][ T8953] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 780.708076][ T8953] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 780.734060][ T8953] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 780.755893][ T8953] device hsr_slave_0 entered promiscuous mode [ 780.762328][ T8953] device hsr_slave_1 entered promiscuous mode [ 780.771061][ T8953] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 780.778696][ T8953] Cannot create hsr debugfs directory [ 780.808362][ T8953] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.815414][ T8953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.822817][ T8953] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.829938][ T8953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.862716][ T8953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 780.874632][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 780.883197][ T9573] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.893175][ T9573] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.901789][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 780.915293][ T8953] 8021q: adding VLAN 0 to HW filter on device team0 [ 780.927962][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 780.936686][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.943706][ T488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.964527][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 780.972761][ T9573] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.979970][ T9573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.991479][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 780.999991][ T9573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 781.014271][ T8953] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 781.025365][ T8953] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 781.037527][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 781.046108][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 781.055497][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 781.072405][ T8953] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 781.080117][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 781.088009][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 781.095774][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 781.134447][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 781.149420][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 781.157906][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 781.167847][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 781.176951][ T8953] device veth0_vlan entered promiscuous mode [ 781.188267][ T8953] device veth1_vlan entered promiscuous mode [ 781.204319][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 781.212581][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 781.221569][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 781.231565][ T8953] device veth0_macvtap entered promiscuous mode [ 781.240953][ T8953] device veth1_macvtap entered promiscuous mode [ 781.254769][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 781.265487][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.275458][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 781.289639][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.299579][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 781.310024][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.319960][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 781.330566][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.340413][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 781.350930][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.363845][ T8953] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 781.371499][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 781.382251][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 781.391719][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 781.403924][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.414036][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 781.424541][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.434393][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 781.444879][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.454776][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 781.466933][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.476885][ T8953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 781.487315][ T8953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.498397][ T8953] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 781.507401][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 781.542778][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 781.558941][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 781.584021][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 781.591885][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 781.601742][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 781.612829][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84", 0x8a, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:33 executing program 3: 05:34:33 executing program 4: 05:34:33 executing program 0: 05:34:33 executing program 2: 05:34:33 executing program 1: 05:34:33 executing program 3: 05:34:33 executing program 4: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x3}, 0x0, 0x0) [ 781.640842][ T9189] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 781.651505][ T9189] EXT4-fs error (device loop5): __ext4_iget:4836: inode #12: block 2: comm syz-executor.5: invalid block 05:34:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x891e, &(0x7f0000000280)={'ip6tnl0\x00', 0x0}) 05:34:33 executing program 2: syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 05:34:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5409, 0x0) 05:34:33 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x5421, &(0x7f0000000040)) 05:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84", 0x8a, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:33 executing program 0: syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x514101) 05:34:33 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000000)={'veth0_to_batadv\x00'}) 05:34:33 executing program 1: memfd_create(&(0x7f0000000000)='{#\x00', 0x3) 05:34:33 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc0306201, 0x0) 05:34:33 executing program 0: socketpair(0x15, 0x0, 0x0, &(0x7f0000000100)) 05:34:33 executing program 2: r0 = syz_open_dev$binderN(&(0x7f00000027c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) [ 782.074941][ T9234] binder: 9227:9234 ioctl c0306201 0 returned -14 05:34:34 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) 05:34:34 executing program 1: syz_mount_image$jffs2(&(0x7f0000000000)='jffs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:34:34 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x38}}, 0x0) 05:34:34 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000500)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ca1a4e50"}, 0x0, 0x0, @fd}) 05:34:34 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r0}) 05:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f000000000000000000", 0xa1, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:34 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2}, 0x40) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f00000000c0)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 05:34:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 05:34:34 executing program 4: 05:34:34 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x4000, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) 05:34:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5427, 0x0) [ 782.712345][ T9258] No source specified [ 782.717845][ T9258] No source specified 05:34:34 executing program 4: memfd_create(0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mq_open(&(0x7f00000000c0)='(@!^/$&{]\\[:\x00', 0x40, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') socket$l2tp6(0xa, 0x2, 0x73) 05:34:34 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x3, 0xee01, 0x0, 0xee00, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 05:34:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0xb}]}}, 0x0, 0x26}, 0x20) 05:34:34 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) accept4$tipc(r0, 0x0, 0x0, 0x0) 05:34:34 executing program 1: clone(0x48000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) clone(0x30b2f100, 0x0, 0x0, 0x0, 0x0) 05:34:34 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x2202, 0x0) [ 783.070424][ T9295] IPVS: ftp: loaded support on port[0] = 21 [ 783.106654][ T8] device hsr_slave_0 left promiscuous mode [ 783.119710][ T8] device hsr_slave_1 left promiscuous mode [ 783.130975][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 783.146043][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 783.157021][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 783.171999][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 783.190335][ T8] device bridge_slave_1 left promiscuous mode [ 783.207575][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.226293][ T8] device bridge_slave_0 left promiscuous mode [ 783.241080][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.265479][ T8] device veth1_macvtap left promiscuous mode [ 783.281445][ T8] device veth0_macvtap left promiscuous mode [ 783.296870][ T8] device veth1_vlan left promiscuous mode [ 783.310889][ T8] device veth0_vlan left promiscuous mode [ 783.867119][ T9313] IPVS: ftp: loaded support on port[0] = 21 [ 784.482103][ T8] team0 (unregistering): Port device team_slave_1 removed [ 784.491849][ T8] team0 (unregistering): Port device team_slave_0 removed [ 784.501803][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 784.512784][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 784.541208][ T8] bond0 (unregistering): Released all slaves [ 786.294223][ T9364] IPVS: ftp: loaded support on port[0] = 21 [ 786.348886][ T9364] chnl_net:caif_netlink_parms(): no params data found [ 786.379802][ T9364] bridge0: port 1(bridge_slave_0) entered blocking state [ 786.387017][ T9364] bridge0: port 1(bridge_slave_0) entered disabled state [ 786.394473][ T9364] device bridge_slave_0 entered promiscuous mode [ 786.403846][ T9364] bridge0: port 2(bridge_slave_1) entered blocking state [ 786.410948][ T9364] bridge0: port 2(bridge_slave_1) entered disabled state [ 786.419593][ T9364] device bridge_slave_1 entered promiscuous mode [ 786.435620][ T9364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 786.446677][ T9364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 786.463514][ T9364] team0: Port device team_slave_0 added [ 786.470503][ T9364] team0: Port device team_slave_1 added [ 786.484412][ T9364] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 786.491342][ T9364] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 786.520069][ T9364] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 786.532251][ T9364] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 786.540693][ T9364] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 786.566794][ T9364] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 786.587964][ T9364] device hsr_slave_0 entered promiscuous mode [ 786.594392][ T9364] device hsr_slave_1 entered promiscuous mode [ 786.600668][ T9364] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 786.608247][ T9364] Cannot create hsr debugfs directory [ 786.640324][ T9364] bridge0: port 2(bridge_slave_1) entered blocking state [ 786.647495][ T9364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 786.654858][ T9364] bridge0: port 1(bridge_slave_0) entered blocking state [ 786.663846][ T9364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 786.696389][ T9364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 786.707578][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 786.717935][T28447] bridge0: port 1(bridge_slave_0) entered disabled state [ 786.726722][T28447] bridge0: port 2(bridge_slave_1) entered disabled state [ 786.737415][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 786.751351][ T9364] 8021q: adding VLAN 0 to HW filter on device team0 [ 786.761902][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 786.771407][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 786.778459][ T488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 786.793597][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 786.802094][T28447] bridge0: port 2(bridge_slave_1) entered blocking state [ 786.809761][T28447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 786.830109][ T9364] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 786.840810][ T9364] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 786.853526][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 786.862983][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 786.873997][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 786.882329][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 786.900833][ T9364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 786.908485][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 786.915974][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 786.928046][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 786.938571][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 786.976156][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 786.988742][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 786.999838][ T9364] device veth0_vlan entered promiscuous mode [ 787.008127][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 787.016994][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 787.028563][ T9364] device veth1_vlan entered promiscuous mode [ 787.046070][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 787.054325][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 787.062253][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 787.073713][ T9364] device veth0_macvtap entered promiscuous mode [ 787.085442][ T9364] device veth1_macvtap entered promiscuous mode [ 787.098571][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 787.109034][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.120307][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 787.131241][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.141068][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 787.151487][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.161374][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 787.171981][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.181791][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 787.192228][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.203865][ T9364] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 787.211663][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 787.222752][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 787.232439][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 787.243811][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.253869][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 787.264329][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.274180][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 787.284607][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.295882][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 787.306433][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.317616][ T9364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 787.328130][ T9364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 787.339307][ T9364] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 787.348127][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 787.382514][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 787.404170][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 787.417523][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 787.433552][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 787.445038][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 787.452576][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f000000000000000000", 0xa1, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000003400), 0x10) 05:34:38 executing program 2: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x9}, 0x0, 0x0, &(0x7f00000001c0)={0x0}) 05:34:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1924, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2020}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:34:38 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x97d) 05:34:38 executing program 1: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x34}, &(0x7f0000000100)) [ 787.481875][ T9598] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 787.495742][ T9598] EXT4-fs error (device loop5): __ext4_iget:4836: inode #12: block 2: comm syz-executor.5: invalid block 05:34:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000003400), 0x10) 05:34:38 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2}, 0x40) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) 05:34:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, &(0x7f0000000640)) 05:34:39 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 05:34:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f000000000000000000", 0xa1, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x97d) 05:34:39 executing program 1: ioperm(0x0, 0x4, 0xa99) 05:34:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 05:34:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/168, &(0x7f00000000c0)=0xa8) 05:34:39 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 05:34:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x97d) 05:34:39 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x1, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) 05:34:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7) 05:34:39 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000240)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6e5994e7"}, 0x0, 0x0, @planes=0x0}) 05:34:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 05:34:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700000000000000", 0xad, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:39 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000002f00)='TIPCv2\x00') socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000003740)='/dev/vcsa\x00', 0x0, 0x0) 05:34:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700000000000000", 0xad, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001400add427323b472545b4560a117fffffff81004e224e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 05:34:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5412, 0x0) 05:34:39 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x26000, 0x0) 05:34:39 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5062e84c"}, 0x0, 0x0, @planes=0x0}) 05:34:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000280)={'ip6tnl0\x00', 0x0}) 05:34:39 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, 0x0) 05:34:39 executing program 0: mq_open(&(0x7f0000000000)='\\#\x00', 0x0, 0x0, 0x0) 05:34:39 executing program 3: socketpair(0x1d, 0x0, 0xffffffff, &(0x7f0000000000)) 05:34:39 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x9, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) 05:34:39 executing program 4: readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/80, 0x50) [ 788.998004][ T26] device hsr_slave_0 left promiscuous mode [ 789.014456][ T26] device hsr_slave_1 left promiscuous mode [ 789.029244][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 789.042791][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 789.070557][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 789.082889][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 789.099809][ T26] device bridge_slave_1 left promiscuous mode [ 789.108330][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.121143][ T26] device bridge_slave_0 left promiscuous mode [ 789.128593][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.140630][ T26] device veth1_macvtap left promiscuous mode [ 789.149456][ T26] device veth0_macvtap left promiscuous mode [ 789.155474][ T26] device veth1_vlan left promiscuous mode [ 789.161177][ T26] device veth0_vlan left promiscuous mode [ 789.817727][ T26] team0 (unregistering): Port device team_slave_1 removed [ 789.827904][ T26] team0 (unregistering): Port device team_slave_0 removed [ 789.840750][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 789.851923][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 789.879527][ T26] bond0 (unregistering): Released all slaves 05:34:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f0000003980)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 791.325529][ T9705] IPVS: ftp: loaded support on port[0] = 21 [ 791.394574][ T9705] chnl_net:caif_netlink_parms(): no params data found [ 791.426911][ T9705] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.434758][ T9705] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.442219][ T9705] device bridge_slave_0 entered promiscuous mode [ 791.458210][ T9705] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.468838][ T9705] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.479049][ T9705] device bridge_slave_1 entered promiscuous mode [ 791.496019][ T9705] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 791.506731][ T9705] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 791.528446][ T9705] team0: Port device team_slave_0 added [ 791.535318][ T9705] team0: Port device team_slave_1 added [ 791.554328][ T9705] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 791.561273][ T9705] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 791.592832][ T9705] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 791.604724][ T9705] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 791.611665][ T9705] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 791.639673][ T9705] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 791.661019][ T9705] device hsr_slave_0 entered promiscuous mode [ 791.668442][ T9705] device hsr_slave_1 entered promiscuous mode [ 791.677331][ T9705] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 791.684901][ T9705] Cannot create hsr debugfs directory [ 791.712028][ T9705] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.719065][ T9705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.727593][ T9705] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.734630][ T9705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.767640][ T9705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 791.779016][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 791.789177][ T488] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.797440][ T488] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.807886][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 791.820630][ T9705] 8021q: adding VLAN 0 to HW filter on device team0 [ 791.830777][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 791.840138][ T4881] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.847314][ T4881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.863150][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 791.871338][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.878361][ T488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.895961][ T9705] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 791.907334][ T9705] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 791.921082][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 791.930119][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 791.939591][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 791.948620][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 791.966132][ T9705] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 791.973402][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 791.980847][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 791.997024][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 792.007423][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 792.044821][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 792.057411][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 792.070811][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 792.081011][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 792.093485][ T9705] device veth0_vlan entered promiscuous mode [ 792.103956][ T9705] device veth1_vlan entered promiscuous mode [ 792.120517][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 792.129885][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 792.139000][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 792.150890][ T9705] device veth0_macvtap entered promiscuous mode [ 792.159567][ T9705] device veth1_macvtap entered promiscuous mode [ 792.175859][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 792.186342][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.201601][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 792.215726][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.228200][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 792.241460][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.251768][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 792.263249][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.273318][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 792.283790][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.295169][ T9705] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 792.302891][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 792.312310][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 792.322938][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 792.333631][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.343686][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 792.356008][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.367524][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 792.378584][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.388458][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 792.399087][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.408999][ T9705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 792.419661][ T9705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 792.431119][ T9705] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 792.439970][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 792.487056][ T9930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 792.497268][ T9930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 792.516983][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 792.526532][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 792.537837][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 792.547099][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700000000000000", 0xad, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:44 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) 05:34:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000040)={'tunl0\x00', @ifru_map}) 05:34:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x80, 0x7ff, 0x2, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000500)={r1}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x80, 0x7ff, 0x2, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000500)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000100)={0x5, 0x7, 0x80, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000140)={r4}) 05:34:44 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000001c0)={0x990000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 05:34:44 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140)='/dev/input/mice\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) [ 792.587307][ T9941] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 792.598240][ T9941] EXT4-fs error (device loop5): ext4_xattr_ibody_find:2175: inode #12: comm syz-executor.5: corrupted in-inode xattr 05:34:44 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8, 0x67}) 05:34:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700"/179, 0xb3, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:44 executing program 2: r0 = gettid() socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5, 0x69, 0xfff7fffe}, 0x2b) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 05:34:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x100}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x20000000000000}) 05:34:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:34:44 executing program 4: process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/103, 0x67}], 0x1, 0x0, 0x0, 0x0) 05:34:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001400)={'vxcan1\x00'}) 05:34:44 executing program 2: 05:34:44 executing program 0: 05:34:44 executing program 4: 05:34:44 executing program 3: 05:34:44 executing program 0: [ 792.887832][ T9977] batman_adv: Cannot find parent device [ 792.929222][ T9977] batman_adv: batadv0: Adding interface: gretap1 [ 792.957946][ T9977] batman_adv: batadv0: The MTU of interface gretap1 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 793.022591][ T9977] batman_adv: batadv0: Not using interface gretap1 (retrying later): interface not active 05:34:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700"/179, 0xb3, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:44 executing program 2: 05:34:44 executing program 4: 05:34:44 executing program 3: 05:34:44 executing program 0: 05:34:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700"/179, 0xb3, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:44 executing program 0: 05:34:44 executing program 4: 05:34:44 executing program 2: 05:34:44 executing program 3: 05:34:44 executing program 0: 05:34:44 executing program 2: 05:34:44 executing program 4: 05:34:44 executing program 3: [ 793.338286][T10005] batman_adv: Cannot find parent device [ 793.368351][T10005] batman_adv: batadv0: Adding interface: gretap2 05:34:44 executing program 4: 05:34:44 executing program 0: [ 793.407406][T10005] batman_adv: batadv0: The MTU of interface gretap2 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:34:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 793.460455][T10005] batman_adv: batadv0: Not using interface gretap2 (retrying later): interface not active [ 793.644483][T10023] batman_adv: Cannot find parent device [ 793.657494][T10023] batman_adv: batadv0: Adding interface: gretap3 [ 793.664176][T10023] batman_adv: batadv0: The MTU of interface gretap3 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 793.695671][T10023] batman_adv: batadv0: Not using interface gretap3 (retrying later): interface not active [ 794.466178][ T8] device hsr_slave_0 left promiscuous mode [ 794.475425][ T8] device hsr_slave_1 left promiscuous mode [ 794.488106][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 794.495662][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 794.508792][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 794.518930][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 794.528988][ T8] device bridge_slave_1 left promiscuous mode [ 794.538595][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 794.548647][ T8] device bridge_slave_0 left promiscuous mode [ 794.557433][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 794.568639][ T8] device veth1_macvtap left promiscuous mode [ 794.577077][ T8] device veth0_macvtap left promiscuous mode [ 794.583329][ T8] device veth1_vlan left promiscuous mode [ 794.590077][ T8] device veth0_vlan left promiscuous mode [ 795.235151][ T8] team0 (unregistering): Port device team_slave_1 removed [ 795.248579][ T8] team0 (unregistering): Port device team_slave_0 removed [ 795.258975][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 795.270528][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 795.297165][ T8] bond0 (unregistering): Released all slaves [ 796.694444][T10046] IPVS: ftp: loaded support on port[0] = 21 [ 796.757658][T10046] chnl_net:caif_netlink_parms(): no params data found [ 796.790112][T10046] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.797357][T10046] bridge0: port 1(bridge_slave_0) entered disabled state [ 796.810481][T10046] device bridge_slave_0 entered promiscuous mode [ 796.820598][T10046] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.830515][T10046] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.840862][T10046] device bridge_slave_1 entered promiscuous mode [ 796.858478][T10046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 796.869383][T10046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 796.886872][T10046] team0: Port device team_slave_0 added [ 796.893776][T10046] team0: Port device team_slave_1 added [ 796.907106][T10046] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 796.915608][T10046] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.941546][T10046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 796.953517][T10046] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 796.960628][T10046] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.986555][T10046] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 797.008206][T10046] device hsr_slave_0 entered promiscuous mode [ 797.014674][T10046] device hsr_slave_1 entered promiscuous mode [ 797.021346][T10046] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 797.030550][T10046] Cannot create hsr debugfs directory [ 797.061779][T10046] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.068837][T10046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 797.076101][T10046] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.083131][T10046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 797.115599][T10046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 797.126728][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 797.137216][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.144826][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.155931][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 797.166959][T10046] 8021q: adding VLAN 0 to HW filter on device team0 [ 797.179082][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 797.191296][T28447] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.198399][T28447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 797.213796][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 797.222038][ T4669] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.229056][ T4669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 797.248506][T10046] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 797.259517][T10046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 797.271792][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 797.281907][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 797.291077][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 797.299753][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 797.318303][T10046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 797.325754][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 797.333586][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 797.342835][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 797.350959][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 797.382509][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 797.397693][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 797.406383][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 797.415329][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 797.426118][T10046] device veth0_vlan entered promiscuous mode [ 797.437520][T10046] device veth1_vlan entered promiscuous mode [ 797.454795][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 797.463648][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 797.471604][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 797.482852][T10046] device veth0_macvtap entered promiscuous mode [ 797.491741][T10046] device veth1_macvtap entered promiscuous mode [ 797.506788][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 797.517366][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.529019][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 797.539528][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.549391][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 797.560044][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.570066][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 797.580598][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.590685][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 797.601154][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.613155][T10046] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 797.620808][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 797.632274][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 797.641732][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 797.652531][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.662536][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 797.672954][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.682835][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 797.693446][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.703249][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 797.714348][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.724148][T10046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 797.734592][T10046] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 797.746062][T10046] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 797.754323][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 797.788291][ T955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 797.811693][ T955] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 797.823647][ T9930] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 797.831600][ T9930] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 797.842653][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 797.852892][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700000000000000000000000000006461", 0xb6, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:49 executing program 2: 05:34:49 executing program 3: 05:34:49 executing program 0: 05:34:49 executing program 4: 05:34:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 797.897104][T10276] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 797.907749][T10276] EXT4-fs error (device loop5): ext4_xattr_ibody_find:2175: inode #12: comm syz-executor.5: corrupted in-inode xattr [ 797.973809][T10287] batman_adv: Cannot find parent device [ 797.985564][T10287] batman_adv: batadv0: Adding interface: gretap4 [ 797.992001][T10287] batman_adv: batadv0: The MTU of interface gretap4 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:34:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:49 executing program 3: 05:34:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:49 executing program 2: [ 798.020166][T10287] batman_adv: batadv0: Not using interface gretap4 (retrying later): interface not active 05:34:49 executing program 4: 05:34:49 executing program 0: 05:34:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700000000000000000000000000006461", 0xb6, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:49 executing program 2: 05:34:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:49 executing program 3: 05:34:49 executing program 4: 05:34:49 executing program 0: 05:34:49 executing program 2: 05:34:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:49 executing program 3: 05:34:49 executing program 4: 05:34:49 executing program 0: 05:34:49 executing program 2: 05:34:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea040700000000000000000000000000006461", 0xb6, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:49 executing program 3: 05:34:49 executing program 4: 05:34:49 executing program 0: 05:34:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:49 executing program 2: 05:34:49 executing program 2: 05:34:49 executing program 4: 05:34:49 executing program 0: 05:34:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea04070000000000000000000000000000646174", 0xb7, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:49 executing program 3: 05:34:49 executing program 0: 05:34:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:50 executing program 3: 05:34:50 executing program 2: 05:34:50 executing program 4: 05:34:50 executing program 3: 05:34:50 executing program 0: 05:34:50 executing program 2: 05:34:50 executing program 4: 05:34:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 799.576942][ T9930] device hsr_slave_0 left promiscuous mode [ 799.593378][ T9930] device hsr_slave_1 left promiscuous mode [ 799.612450][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 799.630503][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 799.651546][ T9930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 799.671166][ T9930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 799.682230][ T9930] device bridge_slave_1 left promiscuous mode [ 799.688366][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 799.699189][ T9930] device bridge_slave_0 left promiscuous mode [ 799.707882][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 799.718365][ T9930] device veth1_macvtap left promiscuous mode [ 799.732847][ T9930] device veth0_macvtap left promiscuous mode [ 799.742389][ T9930] device veth1_vlan left promiscuous mode [ 799.749712][ T9930] device veth0_vlan left promiscuous mode [ 800.425677][ T9930] team0 (unregistering): Port device team_slave_1 removed [ 800.435770][ T9930] team0 (unregistering): Port device team_slave_0 removed [ 800.449297][ T9930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 800.460440][ T9930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 800.487001][ T9930] bond0 (unregistering): Released all slaves [ 801.968801][T10366] IPVS: ftp: loaded support on port[0] = 21 [ 802.034220][T10366] chnl_net:caif_netlink_parms(): no params data found [ 802.067810][T10366] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.075352][T10366] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.088727][T10366] device bridge_slave_0 entered promiscuous mode [ 802.099470][T10366] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.109404][T10366] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.120282][T10366] device bridge_slave_1 entered promiscuous mode [ 802.137814][T10366] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 802.148247][T10366] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 802.171182][T10366] team0: Port device team_slave_0 added [ 802.181029][T10366] team0: Port device team_slave_1 added [ 802.195167][T10366] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 802.202909][T10366] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 802.229013][T10366] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 802.241596][T10366] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 802.248542][T10366] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 802.274411][T10366] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 802.296933][T10366] device hsr_slave_0 entered promiscuous mode [ 802.303418][T10366] device hsr_slave_1 entered promiscuous mode [ 802.309628][T10366] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 802.318816][T10366] Cannot create hsr debugfs directory [ 802.349937][T10366] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.356976][T10366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.364346][T10366] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.371355][T10366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.403096][T10366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 802.415213][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.424432][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.432278][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.442146][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 802.453550][T10366] 8021q: adding VLAN 0 to HW filter on device team0 [ 802.466107][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.474806][T28447] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.481836][T28447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.512854][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.521326][T28447] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.528362][T28447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.538621][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 802.547386][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 802.556651][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 802.567793][T10366] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 802.581269][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 802.589433][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 802.598210][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 802.616381][T10366] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 802.624903][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 802.633858][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 802.666553][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 802.684946][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 802.693795][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 802.701379][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 802.716349][T10366] device veth0_vlan entered promiscuous mode [ 802.727214][T10366] device veth1_vlan entered promiscuous mode [ 802.743653][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 802.751459][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 802.766304][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 802.779401][T10366] device veth0_macvtap entered promiscuous mode [ 802.788213][T10366] device veth1_macvtap entered promiscuous mode [ 802.802940][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.813451][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.826124][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.837454][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.850107][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.862509][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.875471][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.886534][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.897864][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.910810][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.922787][T10366] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 802.930606][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 802.942338][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 802.951566][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.962213][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.972351][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.983971][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.993913][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 803.004510][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 803.014387][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 803.024803][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 803.034613][T10366] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 803.045136][T10366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 803.056283][T10366] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 803.066086][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 803.103395][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 803.111202][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 803.142703][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 803.146835][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 803.150574][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 803.174041][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:54 executing program 3: 05:34:54 executing program 0: 05:34:54 executing program 2: 05:34:54 executing program 4: 05:34:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea04070000000000000000000000000000646174", 0xb7, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 803.209505][T10596] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 803.220450][T10596] EXT4-fs error (device loop5): ext4_xattr_ibody_find:2175: inode #12: comm syz-executor.5: corrupted in-inode xattr 05:34:54 executing program 3: 05:34:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea04070000000000000000000000000000646174", 0xb7, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:54 executing program 2: 05:34:54 executing program 4: 05:34:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {0x6}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x2c}}, 0x0) 05:34:54 executing program 3: select(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x5ce2}, &(0x7f0000000100)={0x77359400}) 05:34:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000044000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x0, 0x0, 0x6}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xc}, 0x4230, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:34:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002480)={&(0x7f0000002400)=ANY=[@ANYBLOB="380000000d06010200000000000000000000000005000500000000000500010007000000120003006269745b6187029f521d6d61703a"], 0x38}}, 0x0) 05:34:54 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, 0x0) 05:34:54 executing program 4: bpf$BPF_GET_BTF_INFO(0x11, 0x0, 0x0) 05:34:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4}}, @struct={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000100)=""/4096, 0x44, 0x1000, 0x1}, 0x20) 05:34:54 executing program 3: bpf$BPF_GET_BTF_INFO(0x19, 0x0, 0x0) 05:34:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002180)={0xb}, 0x40) 05:34:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 05:34:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:55 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x93150cdd35876ee2, 0x0) 05:34:55 executing program 2: bpf$BPF_GET_BTF_INFO(0x22, 0x0, 0x0) 05:34:55 executing program 0: 05:34:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 05:34:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:34:55 executing program 3: ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x7}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f00000000c0)={0x0, 0x99}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000200)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:34:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x3, 0x3, 0x5}, 0x14}}, 0x0) 05:34:55 executing program 0: bpf$BPF_GET_BTF_INFO(0x6, 0x0, 0x0) 05:34:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) [ 803.995269][T10687] batman_adv: Cannot find parent device [ 804.675210][ T955] device hsr_slave_0 left promiscuous mode [ 804.692724][ T955] device hsr_slave_1 left promiscuous mode [ 804.706298][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 804.721803][ T955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 804.752222][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 804.761812][ T955] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 804.819230][ T955] device bridge_slave_1 left promiscuous mode [ 804.855629][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.892322][ T955] device bridge_slave_0 left promiscuous mode [ 804.898543][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 804.951904][ T955] device veth1_macvtap left promiscuous mode [ 804.957911][ T955] device veth0_macvtap left promiscuous mode [ 804.981820][ T955] device veth1_vlan left promiscuous mode [ 804.987600][ T955] device veth0_vlan left promiscuous mode [ 805.714833][ T955] team0 (unregistering): Port device team_slave_1 removed [ 805.724485][ T955] team0 (unregistering): Port device team_slave_0 removed [ 805.738052][ T955] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 805.749273][ T955] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 805.776301][ T955] bond0 (unregistering): Released all slaves [ 807.332438][T10713] IPVS: ftp: loaded support on port[0] = 21 [ 807.407320][T10713] chnl_net:caif_netlink_parms(): no params data found [ 807.437061][T10713] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.444314][T10713] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.453049][T10713] device bridge_slave_0 entered promiscuous mode [ 807.461556][T10713] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.468662][T10713] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.477702][T10713] device bridge_slave_1 entered promiscuous mode [ 807.493715][T10713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 807.505543][T10713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 807.523105][T10713] team0: Port device team_slave_0 added [ 807.530151][T10713] team0: Port device team_slave_1 added [ 807.544204][T10713] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 807.551150][T10713] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 807.577228][T10713] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 807.590705][T10713] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 807.597668][T10713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 807.624864][T10713] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 807.646416][T10713] device hsr_slave_0 entered promiscuous mode [ 807.652957][T10713] device hsr_slave_1 entered promiscuous mode [ 807.659317][T10713] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 807.668485][T10713] Cannot create hsr debugfs directory [ 807.699201][T10713] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.706673][T10713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 807.713908][T10713] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.720924][T10713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 807.754942][T10713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 807.766389][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 807.777021][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.786419][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.797208][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 807.810406][T10713] 8021q: adding VLAN 0 to HW filter on device team0 [ 807.820805][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 807.830495][ T3694] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.837529][ T3694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 807.852058][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 807.860201][ T4881] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.867433][ T4881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 807.890327][T10713] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 807.900938][T10713] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 807.913441][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 807.923841][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 807.932522][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 807.940775][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 807.959827][T10713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 807.967754][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 807.976971][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 807.984639][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 807.992553][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 808.021859][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 808.038246][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 808.046566][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 808.059531][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 808.072815][T10713] device veth0_vlan entered promiscuous mode [ 808.084750][T10713] device veth1_vlan entered promiscuous mode [ 808.101053][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 808.109297][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 808.119223][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 808.129528][T10713] device veth0_macvtap entered promiscuous mode [ 808.140499][T10713] device veth1_macvtap entered promiscuous mode [ 808.153966][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 808.164673][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.174556][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 808.187027][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.196955][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 808.207380][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.218829][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 808.229417][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.239311][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 808.249786][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.260594][T10713] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 808.270081][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 808.279761][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 808.290846][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 808.302437][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.312348][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 808.322776][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.332976][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 808.343429][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.353479][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 808.363890][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.374400][T10713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 808.386287][T10713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.397295][T10713] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 808.406565][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 808.442618][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 808.450556][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 808.468976][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 808.478606][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 808.482162][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 808.497559][ T4881] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:34:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:34:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000080)={0xd04, 0xa, 0x4, 0x401, 0x0, 0x0, {}, [@nested={0xcee, 0x0, 0x0, 0x1, [@typed={0x4, 0x26}, @generic="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"]}]}, 0xd04}, 0x1, 0x0, 0x0, 0x20000000}, 0x48090) 05:34:59 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x5421, 0x0) 05:34:59 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b80)={0xffffffffffffffff}, 0x4) 05:34:59 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/raw6\x00') sendfile(r3, r4, &(0x7f00000001c0)=0x202, 0x4000000000dc) 05:34:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 05:34:59 executing program 4: msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3) [ 808.539567][T10943] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 808.551295][T10943] EXT4-fs error (device loop5): ext4_lookup:1710: inode #2: comm syz-executor.5: deleted inode referenced: 12 05:35:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:00 executing program 0: ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000014c0)={{}, 0x0, 0x0, @unused=[0x0, 0x0, 0x0, 0xfffffffffffffffe], @subvolid}) clone(0x208500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10\x9cist\xe3cosgrVid:De', 0x0) 05:35:00 executing program 2: clock_adjtime(0x5, &(0x7f0000002180)) 05:35:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 05:35:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1870}}, 0x0) [ 808.658338][T10955] batman_adv: Cannot find parent device 05:35:00 executing program 4: 05:35:00 executing program 0: 05:35:00 executing program 2: 05:35:00 executing program 4: 05:35:00 executing program 3: 05:35:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:00 executing program 2: 05:35:00 executing program 0: 05:35:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:00 executing program 4: [ 808.864207][T10990] batman_adv: Cannot find parent device 05:35:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 05:35:00 executing program 2: 05:35:00 executing program 3: 05:35:00 executing program 0: 05:35:00 executing program 2: 05:35:00 executing program 4: [ 809.054427][T11002] batman_adv: Cannot find parent device 05:35:00 executing program 0: 05:35:00 executing program 3: 05:35:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 05:35:00 executing program 2: [ 809.244225][T11012] batman_adv: Cannot find parent device [ 810.014479][ T955] device hsr_slave_0 left promiscuous mode [ 810.034585][ T955] device hsr_slave_1 left promiscuous mode [ 810.054473][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 810.081531][ T955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 810.089332][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 810.110832][ T955] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 810.122555][ T955] device bridge_slave_1 left promiscuous mode [ 810.128756][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.144795][ T955] device bridge_slave_0 left promiscuous mode [ 810.151063][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.166895][ T955] device veth1_macvtap left promiscuous mode [ 810.173059][ T955] device veth0_macvtap left promiscuous mode [ 810.179066][ T955] device veth1_vlan left promiscuous mode [ 810.194053][ T955] device veth0_vlan left promiscuous mode [ 810.848057][ T955] team0 (unregistering): Port device team_slave_1 removed [ 810.858083][ T955] team0 (unregistering): Port device team_slave_0 removed [ 810.868741][ T955] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 810.880097][ T955] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 810.907845][ T955] bond0 (unregistering): Released all slaves [ 812.289502][T11035] IPVS: ftp: loaded support on port[0] = 21 [ 812.357338][T11035] chnl_net:caif_netlink_parms(): no params data found [ 812.387081][T11035] bridge0: port 1(bridge_slave_0) entered blocking state [ 812.394585][T11035] bridge0: port 1(bridge_slave_0) entered disabled state [ 812.402068][T11035] device bridge_slave_0 entered promiscuous mode [ 812.411500][T11035] bridge0: port 2(bridge_slave_1) entered blocking state [ 812.418661][T11035] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.427501][T11035] device bridge_slave_1 entered promiscuous mode [ 812.443149][T11035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 812.454610][T11035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 812.472071][T11035] team0: Port device team_slave_0 added [ 812.478985][T11035] team0: Port device team_slave_1 added [ 812.493198][T11035] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 812.500143][T11035] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 812.527529][T11035] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 812.540350][T11035] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 812.547332][T11035] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 812.574108][T11035] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 812.595871][T11035] device hsr_slave_0 entered promiscuous mode [ 812.602462][T11035] device hsr_slave_1 entered promiscuous mode [ 812.608897][T11035] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 812.616518][T11035] Cannot create hsr debugfs directory [ 812.649543][T11035] bridge0: port 2(bridge_slave_1) entered blocking state [ 812.656651][T11035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 812.663993][T11035] bridge0: port 1(bridge_slave_0) entered blocking state [ 812.672639][T11035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 812.705583][T11035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 812.716718][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 812.727500][T28451] bridge0: port 1(bridge_slave_0) entered disabled state [ 812.735914][T28451] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.744574][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 812.758577][T11035] 8021q: adding VLAN 0 to HW filter on device team0 [ 812.768949][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 812.778813][ T9254] bridge0: port 1(bridge_slave_0) entered blocking state [ 812.786488][ T9254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 812.802106][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 812.810516][T28451] bridge0: port 2(bridge_slave_1) entered blocking state [ 812.817643][T28451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 812.830332][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 812.846470][T11035] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 812.856916][T11035] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 812.869046][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 812.879325][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 812.887760][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 812.897094][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 812.905395][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 812.922323][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 812.929780][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 812.946064][T11035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 812.981630][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 812.998023][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 813.006723][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 813.017192][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 813.029246][T11035] device veth0_vlan entered promiscuous mode [ 813.039146][T11035] device veth1_vlan entered promiscuous mode [ 813.056322][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 813.064548][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 813.073829][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 813.084901][T11035] device veth0_macvtap entered promiscuous mode [ 813.093679][T11035] device veth1_macvtap entered promiscuous mode [ 813.107689][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.118843][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.130289][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.142063][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.153764][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.164265][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.174129][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.184660][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.194502][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.204986][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.216719][T11035] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 813.224744][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 813.236062][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 813.245513][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.257971][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.268009][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.278616][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.288620][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.299045][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.308980][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.319432][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.329277][T11035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.339867][T11035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.351070][T11035] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 813.360286][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 813.407255][ T955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 813.416405][ T955] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 813.435849][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 813.455043][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 813.466076][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 813.473988][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:35:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:04 executing program 4: 05:35:04 executing program 0: 05:35:04 executing program 3: 05:35:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 05:35:04 executing program 2: [ 813.503943][T11266] EXT4-fs error (device loop5): ext4_fill_super:4964: inode #2: comm syz-executor.5: iget: root inode unallocated [ 813.517584][T11266] EXT4-fs (loop5): get root inode failed [ 813.531355][T11266] EXT4-fs (loop5): mount failed 05:35:05 executing program 4: 05:35:05 executing program 0: 05:35:05 executing program 2: 05:35:05 executing program 3: 05:35:05 executing program 0: clone(0x2000000002608100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) socket$inet6(0xa, 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) 05:35:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000900)=ANY=[], 0x178}}, 0x0) 05:35:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, 0x0) 05:35:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) 05:35:05 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) recvmmsg(r0, &(0x7f0000002b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) [ 813.754461][T11276] batman_adv: Cannot find parent device 05:35:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:35:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:05 executing program 3: set_tid_address(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x181540, 0x0) 05:35:05 executing program 2: unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 05:35:05 executing program 0: socketpair(0x2a, 0x0, 0x0, 0x0) 05:35:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:35:05 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x12, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x0, @local}, @in6={0xa, 0x0, 0x0, @private2}}]}, 0x80}}, 0x0) [ 813.962083][T11318] batman_adv: Cannot find parent device [ 813.968888][T11318] batman_adv: batadv0: Adding interface: gretap11 05:35:05 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0xffffffe2}, 0x0) 05:35:05 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000140)=0x6e) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000380)=[{&(0x7f0000000900)=""/4111, 0xdc00}], 0x1, &(0x7f00000000c0)=""/20, 0xffffffffffffff80}, 0x102) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRESDEC, @ANYRESOCT, @ANYRESDEC], 0x100000530) 05:35:05 executing program 4: waitid(0x0, 0x0, &(0x7f0000000040), 0x8, 0x0) [ 814.013648][T11318] batman_adv: batadv0: The MTU of interface gretap11 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 05:35:05 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000940)='/dev/full\x00', 0x0, 0x0) [ 814.138721][T11318] batman_adv: batadv0: Not using interface gretap11 (retrying later): interface not active 05:35:05 executing program 1: r0 = socket(0x0, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:05 executing program 4: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000100)=""/171) [ 814.321041][T11345] batman_adv: Cannot find parent device [ 814.944096][ T955] device hsr_slave_0 left promiscuous mode [ 814.956737][ T955] device hsr_slave_1 left promiscuous mode [ 814.985433][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 815.022728][ T955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 815.036584][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 815.051165][ T955] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 815.073235][ T955] device bridge_slave_1 left promiscuous mode [ 815.079362][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.098060][ T955] device bridge_slave_0 left promiscuous mode [ 815.107165][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.128155][ T955] device veth1_macvtap left promiscuous mode [ 815.134291][ T955] device veth0_macvtap left promiscuous mode [ 815.140406][ T955] device veth1_vlan left promiscuous mode [ 815.146185][ T955] device veth0_vlan left promiscuous mode [ 815.795369][ T955] team0 (unregistering): Port device team_slave_1 removed [ 815.805501][ T955] team0 (unregistering): Port device team_slave_0 removed [ 815.816097][ T955] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 815.827230][ T955] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 815.856285][ T955] bond0 (unregistering): Released all slaves [ 817.331572][T11367] IPVS: ftp: loaded support on port[0] = 21 [ 817.395336][T11367] chnl_net:caif_netlink_parms(): no params data found [ 817.426897][T11367] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.434158][T11367] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.448541][T11367] device bridge_slave_0 entered promiscuous mode [ 817.459103][T11367] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.467451][T11367] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.475403][T11367] device bridge_slave_1 entered promiscuous mode [ 817.492299][T11367] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 817.502886][T11367] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 817.520507][T11367] team0: Port device team_slave_0 added [ 817.527534][T11367] team0: Port device team_slave_1 added [ 817.541207][T11367] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 817.548156][T11367] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 817.576308][T11367] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 817.587977][T11367] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 817.594930][T11367] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 817.620892][T11367] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 817.643859][T11367] device hsr_slave_0 entered promiscuous mode [ 817.650341][T11367] device hsr_slave_1 entered promiscuous mode [ 817.659582][T11367] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 817.667737][T11367] Cannot create hsr debugfs directory [ 817.695704][T11367] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.702837][T11367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.710164][T11367] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.717189][T11367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.750029][T11367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 817.761628][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 817.770551][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.778300][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.789499][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 817.803345][T11367] 8021q: adding VLAN 0 to HW filter on device team0 [ 817.815590][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 817.824300][ T3694] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.831333][ T3694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.851760][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 817.859967][ T3694] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.867039][ T3694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.876851][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 817.885740][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 817.900651][T11367] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 817.913083][T11367] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 817.925283][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 817.934408][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 817.942837][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 817.961090][T11367] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 817.968833][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 817.981043][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 817.989283][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 818.021252][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 818.040418][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 818.048880][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 818.061690][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 818.071141][T11367] device veth0_vlan entered promiscuous mode [ 818.081250][T11367] device veth1_vlan entered promiscuous mode [ 818.098034][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 818.106207][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 818.115464][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 818.126541][T11367] device veth0_macvtap entered promiscuous mode [ 818.138563][T11367] device veth1_macvtap entered promiscuous mode [ 818.155204][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 818.166000][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.181893][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 818.196199][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.210179][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 818.224102][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.235591][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 818.246028][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.255852][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 818.267831][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.278794][T11367] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 818.286442][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 818.299339][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 818.309083][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 818.321250][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.331397][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 818.341834][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.351917][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 818.362479][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.372519][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 818.383049][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.392876][T11367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 818.403287][T11367] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 818.415641][T11367] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 818.425665][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 818.461966][ T955] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 818.469783][ T955] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 818.495178][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 818.496828][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 818.510429][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 818.524364][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:35:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:09 executing program 2: newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x2800) 05:35:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20}]}) 05:35:09 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x101, 0x0) 05:35:09 executing program 1: r0 = socket(0x0, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) select(0x40, &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x7}, 0x0, 0x0) 05:35:10 executing program 3: set_mempolicy(0x0, &(0x7f0000000000), 0x401) [ 818.565366][T11597] EXT4-fs error (device loop5): ext4_fill_super:4964: inode #2: comm syz-executor.5: iget: root inode unallocated [ 818.577758][T11597] EXT4-fs (loop5): get root inode failed [ 818.598625][T11597] EXT4-fs (loop5): mount failed 05:35:10 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000000)) 05:35:10 executing program 1: r0 = socket(0x0, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:10 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mremap(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) mbind(&(0x7f0000ff0000/0xe000)=nil, 0xe000, 0x0, 0x0, 0x0, 0x2) [ 818.664515][T11607] batman_adv: Cannot find parent device 05:35:10 executing program 4: madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x10) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 05:35:10 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000180)={0x6, 'veth1_to_bond\x00'}) 05:35:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x20000000) 05:35:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchmodat(r0, &(0x7f0000000240)='./file1\x00', 0x0) 05:35:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x318, 0x140, 0x1e8, 0x1e8, 0x1e8, 0x140, 0x280, 0x280, 0x280, 0x280, 0x280, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @broadcast, @local}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x1}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x9, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @icmp_id, @gre_key}}}}, {{@ip={@multicast1, @empty, 0x0, 0x0, 'ip6gre0\x00', 'veth1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) connect$inet(r0, &(0x7f0000000000)={0x2, 0xa1, @multicast1}, 0x10) write$FUSE_NOTIFY_STORE(r2, 0x0, 0x0) 05:35:10 executing program 1: r0 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:10 executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 818.827633][T11628] batman_adv: Cannot find parent device 05:35:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000900)=ANY=[@ANYBLOB='|('], 0x178}}, 0x0) [ 818.932887][T11647] x_tables: duplicate underflow at hook 1 05:35:10 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) 05:35:10 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) [ 818.980030][T11647] x_tables: duplicate underflow at hook 1 05:35:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom$unix(r0, 0x0, 0x0, 0x72b01af4d3e79086, &(0x7f0000002040)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002400)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x14}}, 0x0) 05:35:10 executing program 1: r0 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 819.059206][T11650] batman_adv: Cannot find parent device 05:35:10 executing program 3: open$dir(&(0x7f00000000c0)='./file0\x00', 0x20040, 0x0) 05:35:10 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000940)='/dev/full\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 05:35:10 executing program 2: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000000)=0x77, 0x2, 0x2) mbind(&(0x7f0000ff0000/0xe000)=nil, 0xe000, 0x0, 0x0, 0x0, 0x2) 05:35:10 executing program 4: lstat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 05:35:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(r0, 0x0, 0xf, 0x0, &(0x7f0000000040)) 05:35:10 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000840)='TIPC\x00') [ 819.239006][T11671] batman_adv: Cannot find parent device [ 819.915327][ T21] device hsr_slave_0 left promiscuous mode [ 819.934754][ T21] device hsr_slave_1 left promiscuous mode [ 819.951982][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 819.969600][ T21] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 819.991320][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 819.998928][ T21] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 820.014362][ T21] device bridge_slave_1 left promiscuous mode [ 820.020529][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 820.037547][ T21] device bridge_slave_0 left promiscuous mode [ 820.043919][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 820.062834][ T21] device veth1_macvtap left promiscuous mode [ 820.068854][ T21] device veth0_macvtap left promiscuous mode [ 820.082850][ T21] device veth1_vlan left promiscuous mode [ 820.088592][ T21] device veth0_vlan left promiscuous mode [ 820.803583][ T21] team0 (unregistering): Port device team_slave_1 removed [ 820.813483][ T21] team0 (unregistering): Port device team_slave_0 removed [ 820.825553][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 820.837620][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 820.863649][ T21] bond0 (unregistering): Released all slaves [ 822.378042][T11701] IPVS: ftp: loaded support on port[0] = 21 [ 822.442535][T11701] chnl_net:caif_netlink_parms(): no params data found [ 822.472506][T11701] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.479551][T11701] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.492897][T11701] device bridge_slave_0 entered promiscuous mode [ 822.500308][T11701] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.511067][T11701] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.519111][T11701] device bridge_slave_1 entered promiscuous mode [ 822.535727][T11701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 822.546689][T11701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 822.569254][T11701] team0: Port device team_slave_0 added [ 822.576462][T11701] team0: Port device team_slave_1 added [ 822.589938][T11701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 822.600411][T11701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 822.626423][T11701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 822.639018][T11701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 822.646088][T11701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 822.673231][T11701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 822.694090][T11701] device hsr_slave_0 entered promiscuous mode [ 822.700500][T11701] device hsr_slave_1 entered promiscuous mode [ 822.710058][T11701] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 822.718559][T11701] Cannot create hsr debugfs directory [ 822.747114][T11701] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.754156][T11701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.761450][T11701] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.769570][T11701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.803481][T11701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 822.815275][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 822.823858][T28451] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.833451][T28451] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.849816][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 822.860546][T11701] 8021q: adding VLAN 0 to HW filter on device team0 [ 822.874241][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 822.882945][ T3858] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.890053][ T3858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.911879][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 822.920144][ T489] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.927233][ T489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.938361][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 822.947488][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 822.961531][T11701] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 822.972530][T11701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 822.986797][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 822.995199][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 823.004735][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 823.020844][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 823.028263][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 823.037456][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 823.047244][T11701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 823.084040][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 823.099976][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 823.114636][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 823.123393][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 823.133630][T11701] device veth0_vlan entered promiscuous mode [ 823.145045][T11701] device veth1_vlan entered promiscuous mode [ 823.161843][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 823.169837][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 823.185007][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 823.198383][T11701] device veth0_macvtap entered promiscuous mode [ 823.209395][T11701] device veth1_macvtap entered promiscuous mode [ 823.224110][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 823.234719][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.246548][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 823.259400][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.269348][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 823.279966][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.289819][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 823.300239][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.312006][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 823.324239][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.335211][T11701] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 823.344640][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 823.354029][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 823.364639][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 823.375322][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.386410][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 823.398912][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.408842][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 823.419268][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.431086][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 823.442216][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.452097][T11701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 823.462502][T11701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 823.473639][T11701] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 823.483988][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 823.517160][ T888] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 823.538399][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 823.540602][ T888] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 823.556986][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 823.557113][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 823.590944][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 823.628318][T11931] EXT4-fs error (device loop5): ext4_fill_super:4964: inode #2: comm syz-executor.5: iget: root inode unallocated 05:35:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:15 executing program 1: r0 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:15 executing program 2: clone(0xe4e9bf00, 0x0, 0x0, 0x0, 0x0) 05:35:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000000)=0x2) 05:35:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f00000008c0)) 05:35:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x10, 0x0, &(0x7f0000000180)) [ 823.641140][T11931] EXT4-fs (loop5): get root inode failed [ 823.646796][T11931] EXT4-fs (loop5): mount failed 05:35:15 executing program 2: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:35:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:35:15 executing program 4: shmget$private(0x0, 0x2000, 0x1933, &(0x7f0000ffe000/0x2000)=nil) 05:35:15 executing program 3: pipe2$9p(0x0, 0x44800) 05:35:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001b00)={&(0x7f0000001a40), 0xc, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}]}, 0x1c}}, 0x0) 05:35:15 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0xf0482, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 05:35:15 executing program 1: socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 05:35:15 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7}, 0x7) 05:35:15 executing program 2: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x400) [ 823.831718][T11947] batman_adv: Cannot find parent device 05:35:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:15 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 05:35:15 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000440)=[{}]}, 0xffffffffffffffbf) 05:35:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r1) 05:35:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:35:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/234, &(0x7f0000000240)=0xea) 05:35:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)="3901175a095c5dc3ac0e6d082f24e064", 0x10) 05:35:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0x288, 0x288, 0xffffffff, 0x160, 0x0, 0x3a0, 0x3a0, 0xffffffff, 0x3a0, 0x3a0, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'ip6erspan0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4=@loopback, @port, @icmp_id}}}, {{@ip={@loopback, @loopback, 0x0, 0x0, 'netpci0\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @port, @icmp_id}}}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'ip6tnl0\x00', 'macvlan0\x00'}, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@inet=@udplite={{0x30, 'udplite\x00'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @loopback, @loopback, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xe0, 0x118, 0x0, {}, [@common=@set={{0x40, 'set\x00'}}, @common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @empty, @empty, @icmp_id, @icmp_id}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 824.089680][T11974] batman_adv: Cannot find parent device 05:35:15 executing program 1: socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 05:35:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="020a000007000000b6f1ffff0000854105001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 05:35:15 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$char_usb(r0, &(0x7f0000001340)=""/108, 0x6c) 05:35:15 executing program 3: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/37) [ 824.226352][T11998] x_tables: duplicate underflow at hook 1 [ 824.298610][T11999] batman_adv: Cannot find parent device [ 825.003418][ T26] device hsr_slave_0 left promiscuous mode [ 825.020774][ T26] device hsr_slave_1 left promiscuous mode [ 825.039651][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 825.070653][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 825.078522][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 825.094529][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 825.105284][ T26] device bridge_slave_1 left promiscuous mode [ 825.111701][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.119409][ T26] device bridge_slave_0 left promiscuous mode [ 825.133378][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.145383][ T26] device veth1_macvtap left promiscuous mode [ 825.151452][ T26] device veth0_macvtap left promiscuous mode [ 825.157567][ T26] device veth1_vlan left promiscuous mode [ 825.163308][ T26] device veth0_vlan left promiscuous mode [ 825.816046][ T26] team0 (unregistering): Port device team_slave_1 removed [ 825.825669][ T26] team0 (unregistering): Port device team_slave_0 removed [ 825.836732][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 825.848757][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 825.875652][ T26] bond0 (unregistering): Released all slaves [ 827.247415][T12025] IPVS: ftp: loaded support on port[0] = 21 [ 827.314095][T12025] chnl_net:caif_netlink_parms(): no params data found [ 827.345360][T12025] bridge0: port 1(bridge_slave_0) entered blocking state [ 827.352644][T12025] bridge0: port 1(bridge_slave_0) entered disabled state [ 827.360064][T12025] device bridge_slave_0 entered promiscuous mode [ 827.377939][T12025] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.386892][T12025] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.395876][T12025] device bridge_slave_1 entered promiscuous mode [ 827.413932][T12025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 827.424795][T12025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 827.441760][T12025] team0: Port device team_slave_0 added [ 827.450049][T12025] team0: Port device team_slave_1 added [ 827.463332][T12025] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 827.470348][T12025] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 827.497762][T12025] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 827.510253][T12025] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 827.519309][T12025] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 827.545267][T12025] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 827.566355][T12025] device hsr_slave_0 entered promiscuous mode [ 827.572834][T12025] device hsr_slave_1 entered promiscuous mode [ 827.579337][T12025] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 827.586972][T12025] Cannot create hsr debugfs directory [ 827.619557][T12025] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.626713][T12025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 827.634089][T12025] bridge0: port 1(bridge_slave_0) entered blocking state [ 827.641903][T12025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 827.675401][T12025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 827.686923][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 827.697969][ T3858] bridge0: port 1(bridge_slave_0) entered disabled state [ 827.707506][ T3858] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.720238][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 827.733408][T12025] 8021q: adding VLAN 0 to HW filter on device team0 [ 827.745676][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 827.754089][ T3428] bridge0: port 1(bridge_slave_0) entered blocking state [ 827.761118][ T3428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 827.780901][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 827.789073][ T3428] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.796095][ T3428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 827.805498][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 827.822850][T12025] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 827.833326][T12025] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 827.845972][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 827.855047][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 827.863625][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 827.873951][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 827.890403][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 827.897737][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 827.907227][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 827.916584][T12025] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 827.961009][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 827.969865][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 827.981069][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 827.988681][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 828.001196][T12025] device veth0_vlan entered promiscuous mode [ 828.015863][T12025] device veth1_vlan entered promiscuous mode [ 828.034029][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 828.042426][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 828.050587][ T3428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 828.060877][T12025] device veth0_macvtap entered promiscuous mode [ 828.069190][T12025] device veth1_macvtap entered promiscuous mode [ 828.089129][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 828.099582][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.116094][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 828.130964][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.144337][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 828.158008][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.171247][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 828.183123][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.193074][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 828.203604][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.214512][T12025] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 828.224257][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 828.233603][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 828.244884][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 828.255925][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.278699][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 828.289150][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.299162][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 828.309597][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.319546][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 828.330028][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.339963][T12025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 828.352318][T12025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 828.364744][T12025] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 828.374450][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 828.413817][ T888] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 828.436794][ T888] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 828.446388][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 828.455986][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 05:35:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400", 0x2e, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:19 executing program 0: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) 05:35:19 executing program 1: socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 05:35:19 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 05:35:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000100)={0xa, 0x4e22, 0x0, @mcast1, 0x9}, 0x1c, 0x0}, 0x0) 05:35:19 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000080)=@phonet, 0x80, &(0x7f00000001c0)=[{0x0}, {0x0}], 0x2}, 0x40010000) [ 828.463929][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 828.474592][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 828.516711][T12255] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 05:35:19 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 05:35:20 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)="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", 0xec0}, {&(0x7f0000001280)="05", 0x1}], 0x2}}, {{0x0, 0x0, &(0x7f0000002480)=[{0x0}, {&(0x7f00000011c0)="dc", 0x1}, {&(0x7f00000027c0)="d2", 0x1}], 0x3, &(0x7f0000002500)=[{0x18, 0x10f, 0x9, "d1"}, {0x10, 0x0, 0x4c}], 0x28}}], 0x2, 0x0) [ 828.582292][T12265] batman_adv: Cannot find parent device 05:35:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x19) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000000000000a00000000000000ff02000000000000000000000000000100000000000000000000a57224d52407e2c700000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x110) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f000", 0x8, 0x3a, 0x0, @local, @mcast2, {[], @echo_request}}}}}, 0x0) 05:35:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002480)={&(0x7f0000002400)={0x1c, 0xd, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}]}, 0x1c}}, 0x0) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/43, 0x2b}], 0x1, &(0x7f0000000140)=""/68, 0x44}, 0x0) 05:35:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={0x0}}, 0x40) 05:35:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400", 0x2e, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:20 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 05:35:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @broadcast}, {0x0, @remote}, 0x70, {0x2, 0x0, @private}, 'syz_tun\x00'}) [ 828.701906][T12276] batman_adv: Cannot find parent device 05:35:20 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x61) 05:35:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='team_slave_1\x00'}) 05:35:20 executing program 3: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x26041) 05:35:20 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 05:35:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, 0x0, 0xfffffffffffffff8}) [ 828.809416][T12292] batman_adv: Cannot find parent device 05:35:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='team_slave_1\x00'}) 05:35:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:35:20 executing program 3: pipe2$9p(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 05:35:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @multicast}, 0x44, {0x2, 0x0, @loopback}, 'batadv0\x00'}) 05:35:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400", 0x2e, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 05:35:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 05:35:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40000002, 0x0, 0x0) [ 829.011699][T12309] batman_adv: Cannot find parent device 05:35:20 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'veth0_vlan\x00', {'gretap0\x00'}}) 05:35:20 executing program 4: mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 05:35:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000", 0x36, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:35:20 executing program 0: getresuid(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000080)) 05:35:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8936, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_hwaddr=@remote}) 05:35:20 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0xf0482, 0x0) 05:35:20 executing program 2: alarm(0x7a) alarm(0x0) 05:35:20 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:20 executing program 4: truncate(0x0, 0xfffffffffffff10f) 05:35:20 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000000)) 05:35:20 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 05:35:20 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)="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", 0xec1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002480)=[{0x0}, {&(0x7f00000011c0)="dc", 0x1}], 0x2}}], 0x2, 0x0) 05:35:20 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 830.184598][ T21] device hsr_slave_0 left promiscuous mode [ 830.202110][ T21] device hsr_slave_1 left promiscuous mode [ 830.238821][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 830.270248][ T21] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 830.286233][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 830.310266][ T21] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 830.323706][ T21] device bridge_slave_1 left promiscuous mode [ 830.351265][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.358911][ T21] device bridge_slave_0 left promiscuous mode [ 830.381878][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.404411][ T21] device veth1_macvtap left promiscuous mode [ 830.413314][ T21] device veth0_macvtap left promiscuous mode [ 830.419393][ T21] device veth1_vlan left promiscuous mode [ 830.426889][ T21] device veth0_vlan left promiscuous mode [ 831.082835][ T21] team0 (unregistering): Port device team_slave_1 removed [ 831.094313][ T21] team0 (unregistering): Port device team_slave_0 removed [ 831.103821][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 831.119787][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 831.145360][ T21] bond0 (unregistering): Released all slaves [ 832.615375][T12384] IPVS: ftp: loaded support on port[0] = 21 [ 832.676149][T12384] chnl_net:caif_netlink_parms(): no params data found [ 832.708741][T12384] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.715986][T12384] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.724676][T12384] device bridge_slave_0 entered promiscuous mode [ 832.734002][T12384] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.741218][T12384] bridge0: port 2(bridge_slave_1) entered disabled state [ 832.748717][T12384] device bridge_slave_1 entered promiscuous mode [ 832.763835][T12384] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 832.774598][T12384] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 832.792278][T12384] team0: Port device team_slave_0 added [ 832.799678][T12384] team0: Port device team_slave_1 added [ 832.813174][T12384] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 832.820224][T12384] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 832.848235][T12384] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 832.861999][T12384] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 832.869063][T12384] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 832.895127][T12384] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 832.917991][T12384] device hsr_slave_0 entered promiscuous mode [ 832.926398][T12384] device hsr_slave_1 entered promiscuous mode [ 832.936019][T12384] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 832.944661][T12384] Cannot create hsr debugfs directory [ 832.973790][T12384] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.980914][T12384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 832.988152][T12384] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.995187][T12384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 833.029874][T12384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 833.043611][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 833.051936][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.059597][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.074531][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 833.085647][T12384] 8021q: adding VLAN 0 to HW filter on device team0 [ 833.097479][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 833.107535][ T4669] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.114610][ T4669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 833.131205][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 833.139534][ T3858] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.146630][ T3858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 833.161943][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 833.173486][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 833.184397][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 833.200158][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 833.214666][T12384] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 833.225665][T12384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 833.242989][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 833.253796][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 833.266412][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 833.280408][T12384] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 833.321894][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 833.335612][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 833.347514][T12384] device veth0_vlan entered promiscuous mode [ 833.354319][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 833.365488][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 833.380427][T12384] device veth1_vlan entered promiscuous mode [ 833.396114][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 833.404649][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 833.414706][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 833.426399][T12384] device veth0_macvtap entered promiscuous mode [ 833.444480][T12384] device veth1_macvtap entered promiscuous mode [ 833.458544][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 833.469864][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.480163][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 833.490570][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.500377][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 833.510822][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.520988][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 833.531397][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.541206][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 833.552517][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.564332][T12384] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 833.572133][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 833.584908][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 833.594723][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 833.607420][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.617691][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 833.628335][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.638408][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 833.649179][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.659064][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 833.671582][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.681543][T12384] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 833.691968][T12384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 833.703050][T12384] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 833.712500][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 833.759004][ T9930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 833.773809][ T9930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 833.784815][T28451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 833.807267][ T955] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 833.815134][ T955] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 833.826339][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 833.854910][T12615] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #2: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 833.877494][T12615] EXT4-fs (loop5): get root inode failed [ 833.891350][T12615] EXT4-fs (loop5): mount failed 05:35:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000", 0x36, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:25 executing program 0: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@random="4fc23d5577a5", @local, @val={@void}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @private0, @broadcast, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}}, 0x0) 05:35:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth0_to_batadv\x00'}) 05:35:25 executing program 3: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 05:35:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x4, 0x2b8, 0x0, 0x160, 0x0, 0x98, 0x178, 0x240, 0x220, 0x220, 0x220, 0x240, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x1}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='macvlan0\x00', 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) 05:35:25 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:25 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') 05:35:25 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003a00)) [ 834.004928][T12629] x_tables: duplicate underflow at hook 2 05:35:25 executing program 4: 05:35:25 executing program 0: 05:35:25 executing program 3: 05:35:25 executing program 0: 05:35:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000", 0x36, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:25 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:25 executing program 4: 05:35:25 executing program 3: 05:35:25 executing program 0: 05:35:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x4, 0x2b8, 0x0, 0x160, 0x0, 0x98, 0x178, 0x240, 0x220, 0x220, 0x220, 0x240, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x1}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='macvlan0\x00', 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) 05:35:25 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 834.263884][T12629] x_tables: duplicate underflow at hook 2 05:35:25 executing program 0: 05:35:25 executing program 4: 05:35:25 executing program 0: 05:35:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100", 0x3a, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:25 executing program 3: [ 834.360844][T12663] x_tables: duplicate underflow at hook 2 05:35:25 executing program 3: 05:35:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c}, 0x1c}}, 0x40) 05:35:25 executing program 0: 05:35:25 executing program 3: 05:35:25 executing program 4: 05:35:25 executing program 2: 05:35:25 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:25 executing program 3: 05:35:26 executing program 4: 05:35:26 executing program 0: [ 835.452831][ T955] device hsr_slave_0 left promiscuous mode [ 835.463501][ T955] device hsr_slave_1 left promiscuous mode [ 835.469803][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 835.479292][ T955] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 835.490170][ T955] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 835.500580][ T955] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 835.508325][ T955] device bridge_slave_1 left promiscuous mode [ 835.514643][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.522272][ T955] device bridge_slave_0 left promiscuous mode [ 835.529245][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.539779][ T955] device veth1_macvtap left promiscuous mode [ 835.545792][ T955] device veth0_macvtap left promiscuous mode [ 835.553943][ T955] device veth1_vlan left promiscuous mode [ 835.559749][ T955] device veth0_vlan left promiscuous mode [ 836.207286][ T955] team0 (unregistering): Port device team_slave_1 removed [ 836.216628][ T955] team0 (unregistering): Port device team_slave_0 removed [ 836.227658][ T955] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 836.239618][ T955] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 836.266277][ T955] bond0 (unregistering): Released all slaves [ 837.665115][T12700] IPVS: ftp: loaded support on port[0] = 21 [ 837.723157][T12700] chnl_net:caif_netlink_parms(): no params data found [ 837.754065][T12700] bridge0: port 1(bridge_slave_0) entered blocking state [ 837.761274][T12700] bridge0: port 1(bridge_slave_0) entered disabled state [ 837.768837][T12700] device bridge_slave_0 entered promiscuous mode [ 837.778818][T12700] bridge0: port 2(bridge_slave_1) entered blocking state [ 837.786466][T12700] bridge0: port 2(bridge_slave_1) entered disabled state [ 837.796484][T12700] device bridge_slave_1 entered promiscuous mode [ 837.811710][T12700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 837.822371][T12700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 837.847750][T12700] team0: Port device team_slave_0 added [ 837.854626][T12700] team0: Port device team_slave_1 added [ 837.870325][T12700] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 837.877258][T12700] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 837.905526][T12700] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 837.918212][T12700] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 837.925270][T12700] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 837.951274][T12700] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 837.972491][T12700] device hsr_slave_0 entered promiscuous mode [ 837.979105][T12700] device hsr_slave_1 entered promiscuous mode [ 837.988404][T12700] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 837.996540][T12700] Cannot create hsr debugfs directory [ 838.025824][T12700] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.032854][T12700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.040148][T12700] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.048728][T12700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 838.080493][T12700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 838.093410][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 838.102141][T28447] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.110158][T28447] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.121901][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 838.133499][T12700] 8021q: adding VLAN 0 to HW filter on device team0 [ 838.143848][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 838.159901][ T3858] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.166991][ T3858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 838.184549][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 838.192907][ T489] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.199986][ T489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.219098][T12700] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 838.230029][T12700] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 838.244456][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 838.254968][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 838.265027][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 838.273749][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 838.289717][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 838.297163][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 838.306552][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 838.314868][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 838.325131][T12700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 838.370064][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 838.378819][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 838.394410][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 838.405495][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 838.418134][T12700] device veth0_vlan entered promiscuous mode [ 838.428934][T12700] device veth1_vlan entered promiscuous mode [ 838.445982][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 838.453890][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 838.465260][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 838.477723][T12700] device veth0_macvtap entered promiscuous mode [ 838.488145][T12700] device veth1_macvtap entered promiscuous mode [ 838.501688][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 838.512550][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.522475][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 838.532949][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.543745][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 838.555780][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.565608][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 838.577827][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.588318][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 838.598739][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.610888][T12700] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 838.618382][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 838.630797][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 838.643419][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 838.654409][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.664463][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 838.675084][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.684931][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 838.695989][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.705809][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 838.716413][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.726287][T12700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 838.736789][T12700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.748555][T12700] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 838.757367][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 838.803805][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 838.812924][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 838.829968][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 838.849338][ T888] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 838.858767][ T888] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 838.869760][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:35:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100", 0x3a, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:30 executing program 2: 05:35:30 executing program 3: 05:35:30 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:30 executing program 4: 05:35:30 executing program 0: [ 838.896192][T12929] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #2: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 838.917068][T12929] EXT4-fs (loop5): get root inode failed [ 838.924761][T12929] EXT4-fs (loop5): mount failed 05:35:30 executing program 2: 05:35:30 executing program 0: 05:35:30 executing program 4: 05:35:30 executing program 3: 05:35:30 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:30 executing program 2: 05:35:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000100", 0x3a, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:30 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:30 executing program 3: 05:35:30 executing program 0: 05:35:30 executing program 4: 05:35:30 executing program 2: 05:35:30 executing program 0: 05:35:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af3010004000000000000000000000001000000", 0x3c, 0x4400}, {&(0x7f0000012e00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000008224fd7000000000000000000000000000000000000000000000000200000006c84f94f6c84f94f6c84f94fdbf4655f6c84f94f0000000000000000000002ea0407000000000000000000000000000064617461", 0xb8, 0x6c00}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x10000}], 0x0, &(0x7f00000000c0)) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={{}, 0x9, 0x0, 0x4}) 05:35:30 executing program 3: 05:35:30 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:30 executing program 4: 05:35:30 executing program 2: 05:35:30 executing program 0: 05:35:30 executing program 3: 05:35:30 executing program 4: 05:35:30 executing program 2: 05:35:30 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000007, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 05:35:30 executing program 0: 05:35:30 executing program 4: [ 840.334934][ T888] device hsr_slave_0 left promiscuous mode [ 840.346480][ T888] device hsr_slave_1 left promiscuous mode [ 840.369710][ T888] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 840.377261][ T888] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 840.387779][ T888] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 840.396164][ T888] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 840.407127][ T888] device bridge_slave_1 left promiscuous mode [ 840.419419][ T888] bridge0: port 2(bridge_slave_1) entered disabled state [ 840.430337][ T888] device bridge_slave_0 left promiscuous mode [ 840.436418][ T888] bridge0: port 1(bridge_slave_0) entered disabled state [ 840.447909][ T888] device veth1_macvtap left promiscuous mode [ 840.455918][ T888] device veth0_macvtap left promiscuous mode [ 840.461978][ T888] device veth1_vlan left promiscuous mode [ 840.469925][ T888] device veth0_vlan left promiscuous mode [ 841.116654][ T888] team0 (unregistering): Port device team_slave_1 removed [ 841.126779][ T888] team0 (unregistering): Port device team_slave_0 removed [ 841.137836][ T888] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 841.151446][ T888] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 841.177678][ T888] bond0 (unregistering): Released all slaves [ 842.530290][T12998] IPVS: ftp: loaded support on port[0] = 21 [ 842.596708][T12998] chnl_net:caif_netlink_parms(): no params data found [ 842.628422][T12998] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.635969][T12998] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.650738][T12998] device bridge_slave_0 entered promiscuous mode [ 842.658236][T12998] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.667406][T12998] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.675981][T12998] device bridge_slave_1 entered promiscuous mode [ 842.692836][T12998] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 842.703156][T12998] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 842.720643][T12998] team0: Port device team_slave_0 added [ 842.728497][T12998] team0: Port device team_slave_1 added [ 842.743357][T12998] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 842.750335][T12998] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 842.778364][T12998] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 842.791011][T12998] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 842.797935][T12998] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 842.823954][T12998] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 842.847814][T12998] device hsr_slave_0 entered promiscuous mode [ 842.854332][T12998] device hsr_slave_1 entered promiscuous mode [ 842.860745][T12998] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 842.868967][T12998] Cannot create hsr debugfs directory [ 842.900998][T12998] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.908078][T12998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 842.915363][T12998] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.923185][T12998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 842.957654][T12998] 8021q: adding VLAN 0 to HW filter on device bond0 [ 842.971650][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 842.979959][T28447] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.987670][T28447] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.999564][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 843.010834][T12998] 8021q: adding VLAN 0 to HW filter on device team0 [ 843.024416][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 843.032774][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.039842][ T488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.061225][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 843.071583][ T9254] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.078638][ T9254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.088099][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 843.097936][ T9254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 843.112945][T12998] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 843.123883][T12998] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 843.138592][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 843.149046][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 843.159001][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 843.176944][T12998] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 843.184747][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 843.194211][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 843.201927][ T3858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 843.239718][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 843.254419][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 843.264473][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 843.273835][ T488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 843.286078][T12998] device veth0_vlan entered promiscuous mode [ 843.298439][T12998] device veth1_vlan entered promiscuous mode [ 843.316091][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 843.324733][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 843.338360][ T4669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 843.350753][T12998] device veth0_macvtap entered promiscuous mode [ 843.360914][T12998] device veth1_macvtap entered promiscuous mode [ 843.374264][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.384799][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.396707][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.408378][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.420059][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.430628][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.441194][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.451836][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.463954][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.474569][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.485766][T12998] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 843.495584][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 843.505660][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 843.516626][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.527211][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.537373][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.547916][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.557824][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.570216][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.580687][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.591111][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.600932][T12998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.613724][T12998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.624685][T12998] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 843.634543][T28447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 843.650917][ T26] ================================================================== [ 843.659006][ T26] BUG: KCSAN: data-race in dst_cache_set_ip6 / fib6_clean_node [ 843.666517][ T26] [ 843.668823][ T26] write to 0xffff88810de4ba2c of 4 bytes by task 28447 on cpu 0: [ 843.676512][ T26] fib6_clean_node+0xc0/0x260 [ 843.681475][ T26] fib6_walk_continue+0x38e/0x430 [ 843.686478][ T26] __fib6_clean_all+0x188/0x2b0 [ 843.691306][ T26] fib6_flush_trees+0x6c/0x80 [ 843.696014][ T26] addrconf_dad_completed+0x57f/0x860 [ 843.701458][ T26] addrconf_dad_work+0x8dd/0x1150 [ 843.706456][ T26] process_one_work+0x3e1/0x950 [ 843.711283][ T26] worker_thread+0x635/0xb90 [ 843.715859][ T26] kthread+0x1fa/0x220 [ 843.719912][ T26] ret_from_fork+0x1f/0x30 [ 843.724293][ T26] [ 843.726594][ T26] read to 0xffff88810de4ba2c of 4 bytes by task 26 on cpu 1: [ 843.733949][ T26] dst_cache_set_ip6+0xab/0x1b0 [ 843.738766][ T26] send6+0x256/0x3a0 [ 843.742631][ T26] wg_socket_send_buffer_to_peer+0x167/0x1e0 [ 843.748590][ T26] wg_packet_handshake_send_worker+0xf9/0x140 [ 843.754655][ T26] process_one_work+0x3e1/0x950 [ 843.759661][ T26] worker_thread+0x635/0xb90 [ 843.764234][ T26] kthread+0x1fa/0x220 [ 843.768272][ T26] ret_from_fork+0x1f/0x30 [ 843.772654][ T26] [ 843.774954][ T26] Reported by Kernel Concurrency Sanitizer on: [ 843.781078][ T26] CPU: 1 PID: 26 Comm: kworker/u4:2 Not tainted 5.10.0-rc1-syzkaller #0 [ 843.789379][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.799420][ T26] Workqueue: wg-kex-wg0 wg_packet_handshake_send_worker [ 843.806330][ T26] ================================================================== [ 843.814413][ T26] Kernel panic - not syncing: panic_on_warn set ... [ 843.821020][ T26] CPU: 1 PID: 26 Comm: kworker/u4:2 Not tainted 5.10.0-rc1-syzkaller #0 [ 843.829313][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.839356][ T26] Workqueue: wg-kex-wg0 wg_packet_handshake_send_worker [ 843.846258][ T26] Call Trace: [ 843.849521][ T26] dump_stack+0x116/0x15d [ 843.853820][ T26] panic+0x1e7/0x5fa [ 843.857705][ T26] ? vprintk_emit+0x2f2/0x370 [ 843.862358][ T26] kcsan_report+0x67b/0x680 [ 843.866844][ T26] ? __should_failslab+0x81/0x90 [ 843.871772][ T26] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 843.877287][ T26] ? dst_cache_set_ip6+0xab/0x1b0 [ 843.882280][ T26] ? send6+0x256/0x3a0 [ 843.886342][ T26] ? wg_socket_send_buffer_to_peer+0x167/0x1e0 [ 843.892487][ T26] ? wg_packet_handshake_send_worker+0xf9/0x140 [ 843.898710][ T26] ? process_one_work+0x3e1/0x950 [ 843.905774][ T26] ? worker_thread+0x635/0xb90 [ 843.910508][ T26] ? kthread+0x1fa/0x220 [ 843.914733][ T26] ? ret_from_fork+0x1f/0x30 [ 843.919297][ T26] ? __rcu_read_unlock+0x51/0x220 [ 843.924309][ T26] ? xfrm_lookup_with_ifid+0xe6d/0x1590 [ 843.929826][ T26] kcsan_setup_watchpoint+0x46a/0x4d0 [ 843.935276][ T26] dst_cache_set_ip6+0xab/0x1b0 [ 843.940096][ T26] ? ip6_dst_lookup_flow+0x94/0xc0 [ 843.945178][ T26] ? ip6_dst_lookup_tail+0x9b0/0x9b0 [ 843.950444][ T26] send6+0x256/0x3a0 [ 843.954311][ T26] wg_socket_send_buffer_to_peer+0x167/0x1e0 [ 843.960280][ T26] wg_packet_handshake_send_worker+0xf9/0x140 [ 843.966331][ T26] process_one_work+0x3e1/0x950 [ 843.971155][ T26] worker_thread+0x635/0xb90 [ 843.975723][ T26] ? process_one_work+0x950/0x950 [ 843.980729][ T26] kthread+0x1fa/0x220 [ 843.984767][ T26] ? process_one_work+0x950/0x950 [ 843.989763][ T26] ? kthread_blkcg+0x80/0x80 [ 843.994333][ T26] ret_from_fork+0x1f/0x30 [ 843.999378][ T26] Kernel Offset: disabled [ 844.003680][ T26] Rebooting in 86400 seconds..