96c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e4ec2346d1ff475633f26"], 0x518) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 763.012309] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 763.019026] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 763.027083] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 763.034286] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 763.042264] device bridge_slave_1 left promiscuous mode [ 763.047832] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.091277] device bridge_slave_0 left promiscuous mode [ 763.096913] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.133716] device veth1_macvtap left promiscuous mode [ 763.139121] device veth0_macvtap left promiscuous mode [ 763.144569] device veth1_vlan left promiscuous mode [ 763.149733] device veth0_vlan left promiscuous mode [ 763.283060] device hsr_slave_1 left promiscuous mode [ 763.334260] device hsr_slave_0 left promiscuous mode [ 763.380418] team0 (unregistering): Port device team_slave_1 removed [ 763.390334] team0 (unregistering): Port device team_slave_0 removed [ 763.399680] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 763.436238] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 763.493375] bond0 (unregistering): Released all slaves 15:36:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 765.361159] IPVS: ftp: loaded support on port[0] = 21 15:36:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 766.132048] chnl_net:caif_netlink_parms(): no params data found [ 766.192380] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.198788] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.206033] device bridge_slave_0 entered promiscuous mode [ 766.214433] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.221133] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.228246] device bridge_slave_1 entered promiscuous mode [ 766.252573] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 766.261805] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 766.282762] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 766.289911] team0: Port device team_slave_0 added [ 766.295699] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 766.303214] team0: Port device team_slave_1 added [ 766.323953] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 766.330332] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 766.355563] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 766.366756] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 766.373199] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 766.398612] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 766.409382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 766.417133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 766.472942] device hsr_slave_0 entered promiscuous mode [ 766.510314] device hsr_slave_1 entered promiscuous mode [ 766.551062] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 766.558228] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 766.636028] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.642453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 766.649042] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.655422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 766.692421] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 766.698507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 766.707406] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 766.719186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 766.726348] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.733367] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.744479] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 766.750749] 8021q: adding VLAN 0 to HW filter on device team0 [ 766.759859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 766.767882] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.774356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 766.790576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 766.798141] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.804521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 766.819002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 766.827232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 766.841618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 766.858326] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 766.868284] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 766.878783] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 766.885644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 766.893653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 766.901971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 766.917152] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 766.925577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 766.932446] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 766.946527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 767.019310] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 767.030206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 767.075553] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 767.083055] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 767.089604] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 767.099947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 767.107884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 767.115178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 767.124959] device veth0_vlan entered promiscuous mode [ 767.131881] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 767.145937] device veth1_vlan entered promiscuous mode [ 767.161094] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 767.171863] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 767.178685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 767.187286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 767.197573] device veth0_macvtap entered promiscuous mode [ 767.204128] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 767.213905] device veth1_macvtap entered promiscuous mode [ 767.219940] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 767.229794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 767.239847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 767.249509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 767.259550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.268739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 767.278984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.288936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 767.298682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.308117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 767.317872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.327003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 767.337100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.347270] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 767.354605] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 767.363787] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 767.371491] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 767.378520] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 767.386394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 767.396503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 767.406749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.416661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 767.426711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.436164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 767.445922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.455095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 767.464818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.473992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 767.483768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 767.494178] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 767.501162] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 767.508680] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 767.516594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:36:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:20 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e4ec2346d1ff475633f26"], 0x518) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:20 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e4ec2346d1ff475633f26"], 0x518) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:20 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e4ec2346d1ff475633f26"], 0x518) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 769.312357] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 769.319126] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 769.327406] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 769.334181] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 769.342092] device bridge_slave_1 left promiscuous mode [ 769.347568] bridge0: port 2(bridge_slave_1) entered disabled state [ 769.391156] device bridge_slave_0 left promiscuous mode [ 769.396783] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.453593] device veth1_macvtap left promiscuous mode [ 769.458995] device veth0_macvtap left promiscuous mode [ 769.464485] device veth1_vlan left promiscuous mode [ 769.469663] device veth0_vlan left promiscuous mode [ 769.594782] device hsr_slave_1 left promiscuous mode [ 769.633172] device hsr_slave_0 left promiscuous mode [ 769.679035] team0 (unregistering): Port device team_slave_1 removed [ 769.688686] team0 (unregistering): Port device team_slave_0 removed [ 769.698530] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 769.734846] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 769.795002] bond0 (unregistering): Released all slaves 15:36:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 771.661895] IPVS: ftp: loaded support on port[0] = 21 15:36:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 772.444171] chnl_net:caif_netlink_parms(): no params data found [ 772.506633] bridge0: port 1(bridge_slave_0) entered blocking state [ 772.513290] bridge0: port 1(bridge_slave_0) entered disabled state [ 772.520859] device bridge_slave_0 entered promiscuous mode [ 772.528828] bridge0: port 2(bridge_slave_1) entered blocking state [ 772.535407] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.543123] device bridge_slave_1 entered promiscuous mode [ 772.566100] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 772.575248] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 772.595335] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 772.602826] team0: Port device team_slave_0 added [ 772.608436] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 772.615699] team0: Port device team_slave_1 added [ 772.636300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 772.642767] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 772.667990] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 772.679262] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 772.685710] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 772.711370] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 772.722220] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 772.730251] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 772.793452] device hsr_slave_0 entered promiscuous mode [ 772.840423] device hsr_slave_1 entered promiscuous mode [ 772.881227] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 772.888472] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 772.967635] bridge0: port 2(bridge_slave_1) entered blocking state [ 772.974030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 772.980719] bridge0: port 1(bridge_slave_0) entered blocking state [ 772.987174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.027796] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 773.034590] 8021q: adding VLAN 0 to HW filter on device bond0 [ 773.043802] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 773.055265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 773.062826] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.069629] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.080933] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 773.087081] 8021q: adding VLAN 0 to HW filter on device team0 [ 773.096760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 773.104494] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.110877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.121035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 773.128761] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.135166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 773.154802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 773.162595] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 773.182752] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 773.193513] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 773.204341] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 773.211138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 773.218793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 773.226429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 773.235636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 773.249602] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 773.257927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 773.265100] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 773.276567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 773.357339] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 773.368037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 773.413953] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 773.421459] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 773.427987] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 773.434796] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 773.448294] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 773.455200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 773.464242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 773.474685] device veth0_vlan entered promiscuous mode [ 773.480710] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 773.487723] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 773.499952] device veth1_vlan entered promiscuous mode [ 773.507065] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 773.518979] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 773.532120] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 773.542698] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 773.549563] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 773.557189] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 773.564499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 773.572339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 773.582992] device veth0_macvtap entered promiscuous mode [ 773.591766] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 773.600552] device veth1_macvtap entered promiscuous mode [ 773.606787] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 773.617175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 773.627535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 773.637068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 773.647101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.656338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 773.666454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.675972] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 773.685767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.695246] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 773.705039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.714241] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 773.724021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.735120] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 773.742330] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 773.751561] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 773.758728] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 773.766402] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 773.774364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 773.784683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 773.795169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.804616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 773.814660] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.832143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 773.841917] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.851200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 773.860967] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.870120] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 773.879810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 773.889942] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 773.896915] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 773.904584] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 773.913233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:36:26 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e4ec2346d1ff475633f26"], 0x518) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:27 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e4ec2346d1ff475633f26"], 0x518) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:27 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 775.821517] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 775.828296] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 775.839252] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 775.845978] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 775.856718] device bridge_slave_1 left promiscuous mode [ 775.862458] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.900674] device bridge_slave_0 left promiscuous mode [ 775.906455] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.962241] device veth1_macvtap left promiscuous mode [ 775.967551] device veth0_macvtap left promiscuous mode [ 775.972937] device veth1_vlan left promiscuous mode [ 775.978217] device veth0_vlan left promiscuous mode [ 776.102763] device hsr_slave_1 left promiscuous mode [ 776.163159] device hsr_slave_0 left promiscuous mode [ 776.208090] team0 (unregistering): Port device team_slave_1 removed [ 776.217471] team0 (unregistering): Port device team_slave_0 removed [ 776.227544] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 776.273892] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 776.332566] bond0 (unregistering): Released all slaves 15:36:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 778.157103] IPVS: ftp: loaded support on port[0] = 21 15:36:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 778.956446] chnl_net:caif_netlink_parms(): no params data found [ 779.019321] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.025929] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.033749] device bridge_slave_0 entered promiscuous mode [ 779.040891] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.047268] bridge0: port 2(bridge_slave_1) entered disabled state [ 779.055100] device bridge_slave_1 entered promiscuous mode [ 779.076331] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 779.085456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 779.106304] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 779.114373] team0: Port device team_slave_0 added [ 779.120573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 779.127713] team0: Port device team_slave_1 added [ 779.145565] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 779.151964] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 779.177178] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 779.188279] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 779.194626] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 779.219861] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 779.230545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 779.238094] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 779.294664] device hsr_slave_0 entered promiscuous mode [ 779.340314] device hsr_slave_1 entered promiscuous mode [ 779.391595] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 779.398876] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 779.479542] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.486058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 779.492784] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.499169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 779.539831] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 779.546647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 779.555397] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 779.566788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 779.573975] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.581062] bridge0: port 2(bridge_slave_1) entered disabled state [ 779.592717] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 779.598982] 8021q: adding VLAN 0 to HW filter on device team0 [ 779.609344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 779.617237] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.623680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 779.634702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 779.645373] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.651781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 779.670899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 779.678412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 779.686666] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 779.701628] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 779.711785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 779.722156] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 779.728603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 779.736723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 779.749944] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 779.757014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 779.767274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 779.774300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 779.786465] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 779.864656] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 779.875643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 779.919032] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 779.927219] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 779.934386] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 779.941174] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 779.954253] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 779.961041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 779.969467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 779.977605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 779.984951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 779.995077] device veth0_vlan entered promiscuous mode [ 780.006921] device veth1_vlan entered promiscuous mode [ 780.013369] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 780.024348] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 780.037488] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 780.047450] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 780.054367] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 780.062050] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 780.069149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 780.076815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 780.087423] device veth0_macvtap entered promiscuous mode [ 780.093915] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 780.103356] device veth1_macvtap entered promiscuous mode [ 780.109514] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 780.119631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 780.129751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 780.138971] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.149088] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.159196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.169020] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.178317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.188502] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.197659] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.207435] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.216591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.226351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.236357] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 780.243686] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 780.252749] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 780.260290] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 780.267312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 780.275071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 780.285873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.295924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.305203] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.315169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.324447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.334274] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.343501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.353511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.362879] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.372687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.383053] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 780.390164] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 780.397789] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 780.405650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:36:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:33 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 782.552434] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 782.559148] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 782.567208] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 782.574048] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 782.582057] device bridge_slave_1 left promiscuous mode [ 782.587652] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.641075] device bridge_slave_0 left promiscuous mode [ 782.646676] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.704000] device veth1_macvtap left promiscuous mode [ 782.709439] device veth0_macvtap left promiscuous mode [ 782.715010] device veth1_vlan left promiscuous mode [ 782.720317] device veth0_vlan left promiscuous mode [ 782.883087] device hsr_slave_1 left promiscuous mode [ 782.945626] device hsr_slave_0 left promiscuous mode [ 782.990327] team0 (unregistering): Port device team_slave_1 removed [ 782.999619] team0 (unregistering): Port device team_slave_0 removed [ 783.010892] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 783.043390] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 783.113271] bond0 (unregistering): Released all slaves 15:36:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:36 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[], 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 785.951772] IPVS: ftp: loaded support on port[0] = 21 [ 786.846415] chnl_net:caif_netlink_parms(): no params data found [ 786.908905] bridge0: port 1(bridge_slave_0) entered blocking state [ 786.915592] bridge0: port 1(bridge_slave_0) entered disabled state [ 786.924033] device bridge_slave_0 entered promiscuous mode [ 786.931499] bridge0: port 2(bridge_slave_1) entered blocking state [ 786.938016] bridge0: port 2(bridge_slave_1) entered disabled state [ 786.945215] device bridge_slave_1 entered promiscuous mode [ 786.964993] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 786.974486] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 786.994870] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 787.002286] team0: Port device team_slave_0 added [ 787.007853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 787.015209] team0: Port device team_slave_1 added [ 787.034153] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 787.041040] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 787.066263] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 787.077203] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 787.083741] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:36:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 787.109498] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 787.120128] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 787.127683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 15:36:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 787.195581] device hsr_slave_0 entered promiscuous mode 15:36:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 787.260485] device hsr_slave_1 entered promiscuous mode [ 787.301204] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 787.308594] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 787.393044] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.399468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 787.406206] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.412680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 787.451250] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 787.457428] 8021q: adding VLAN 0 to HW filter on device bond0 [ 787.466982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 787.477670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 787.485176] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.503048] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.515478] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 787.521984] 8021q: adding VLAN 0 to HW filter on device team0 [ 787.531880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 787.539568] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.546010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 787.560890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 787.568593] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.575031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 787.590282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 787.607286] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 787.617427] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 787.627991] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 787.635777] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 787.643106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 787.650893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 787.658340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 787.665931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 787.680906] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 787.688987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 787.695833] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 787.707263] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 787.784063] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 787.797193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 787.830843] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 787.856218] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 787.864540] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 787.871528] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 787.880745] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 787.887837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 787.896603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 787.905349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 787.912603] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 787.923042] device veth0_vlan entered promiscuous mode [ 787.936265] device veth1_vlan entered promiscuous mode [ 787.942221] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 787.951297] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 787.964908] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 787.975569] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 787.982906] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 787.990710] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 787.998007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 788.005999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 788.016323] device veth0_macvtap entered promiscuous mode [ 788.032713] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 788.043274] device veth1_macvtap entered promiscuous mode [ 788.049769] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 788.061662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 788.081123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 788.089861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 788.100232] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.109351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 788.119228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.128521] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 788.138254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.147943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 788.157919] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.167449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 788.177490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.187983] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 788.195136] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 788.204810] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 788.212149] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 788.219233] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 788.226968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 788.237790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 788.247821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.257066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 788.266881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.276099] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 788.285914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.295128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 788.306086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.315535] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 788.325373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 788.335444] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 788.342537] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 788.350282] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 788.357966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:36:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:41 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[], 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:36:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:36:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:36:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 790.461916] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 790.468701] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 790.477793] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 790.484588] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 790.493031] device bridge_slave_1 left promiscuous mode [ 790.498633] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.541195] device bridge_slave_0 left promiscuous mode [ 790.546785] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.593254] device veth1_macvtap left promiscuous mode [ 790.598691] device veth0_macvtap left promiscuous mode [ 790.605216] device veth1_vlan left promiscuous mode [ 790.610501] device veth0_vlan left promiscuous mode [ 790.743125] device hsr_slave_1 left promiscuous mode [ 790.795008] device hsr_slave_0 left promiscuous mode [ 790.840900] team0 (unregistering): Port device team_slave_1 removed [ 790.850290] team0 (unregistering): Port device team_slave_0 removed [ 790.859252] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 790.903148] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 790.962906] bond0 (unregistering): Released all slaves 15:36:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:44 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[], 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:44 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:44 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 792.899316] ptrace attach of "/root/syz-executor.2"[20990] was attempted by "/root/syz-executor.2"[20991] 15:36:44 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 792.964114] ptrace attach of "/root/syz-executor.2"[20993] was attempted by "/root/syz-executor.2"[20994] 15:36:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 793.039033] ptrace attach of "/root/syz-executor.2"[20996] was attempted by "/root/syz-executor.2"[20997] 15:36:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 794.641141] IPVS: ftp: loaded support on port[0] = 21 [ 795.455955] chnl_net:caif_netlink_parms(): no params data found [ 795.517185] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.523981] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.531361] device bridge_slave_0 entered promiscuous mode [ 795.538237] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.545286] bridge0: port 2(bridge_slave_1) entered disabled state [ 795.552409] device bridge_slave_1 entered promiscuous mode [ 795.573852] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 795.583154] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 795.604017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 795.611761] team0: Port device team_slave_0 added [ 795.617411] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 795.624695] team0: Port device team_slave_1 added [ 795.643591] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 795.649836] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 795.675645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 795.686683] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 795.692981] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:36:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 795.718410] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 795.728856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 795.736551] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 15:36:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)=""/71, 0x47}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 795.814648] device hsr_slave_0 entered promiscuous mode [ 795.840948] device hsr_slave_1 entered promiscuous mode [ 795.891619] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 795.898686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 795.985841] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.992285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 795.998863] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.005254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.043400] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 796.049483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 796.059448] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 796.068879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 796.078937] bridge0: port 1(bridge_slave_0) entered disabled state [ 796.086033] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.096792] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 796.103102] 8021q: adding VLAN 0 to HW filter on device team0 [ 796.112680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 796.120476] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.126904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.137386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 796.145774] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.152166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 796.170418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 796.178053] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 796.188399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 796.201999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 796.218167] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 796.229290] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 796.235813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 796.243110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 796.258965] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 796.267609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 796.276685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 796.287932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 796.358717] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 796.369723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 796.409423] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 796.417006] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 796.424930] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 796.435087] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 796.442634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 796.450123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 796.457149] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 796.467334] device veth0_vlan entered promiscuous mode [ 796.477922] device veth1_vlan entered promiscuous mode [ 796.495581] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 796.505828] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 796.513522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 796.521162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 796.532597] device veth0_macvtap entered promiscuous mode [ 796.538676] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 796.547382] device veth1_macvtap entered promiscuous mode [ 796.553716] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 796.564687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 796.575038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 796.584633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 796.594553] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.603711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 796.613444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.622615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 796.632408] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.641863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 796.651671] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.661686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 796.671730] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.682142] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 796.690497] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 796.699210] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 796.706850] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 796.714154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 796.722005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 796.733215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 796.743154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.752450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 796.762263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.771479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 796.781597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.790827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 796.800604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.809798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 796.819607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 796.829666] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 796.837073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 796.845144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 796.853098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:36:49 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:49 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 798.561995] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 798.568821] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 798.577236] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 798.584063] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 798.591935] device bridge_slave_1 left promiscuous mode [ 798.597560] bridge0: port 2(bridge_slave_1) entered disabled state [ 798.632619] device bridge_slave_0 left promiscuous mode [ 798.638234] bridge0: port 1(bridge_slave_0) entered disabled state [ 798.692273] device veth1_macvtap left promiscuous mode [ 798.697718] device veth0_macvtap left promiscuous mode [ 798.703622] device veth1_vlan left promiscuous mode [ 798.708685] device veth0_vlan left promiscuous mode 15:36:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 798.862663] device hsr_slave_1 left promiscuous mode [ 798.894637] device hsr_slave_0 left promiscuous mode [ 798.931883] team0 (unregistering): Port device team_slave_1 removed [ 798.942929] team0 (unregistering): Port device team_slave_0 removed [ 798.953033] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 799.004447] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 799.074022] bond0 (unregistering): Released all slaves 15:36:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 800.831534] IPVS: ftp: loaded support on port[0] = 21 15:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:36:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 801.605853] chnl_net:caif_netlink_parms(): no params data found [ 801.666901] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.673826] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.681800] device bridge_slave_0 entered promiscuous mode [ 801.689066] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.695885] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.703761] device bridge_slave_1 entered promiscuous mode [ 801.725733] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 801.734864] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 801.757825] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 801.765068] team0: Port device team_slave_0 added [ 801.770948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 801.778252] team0: Port device team_slave_1 added [ 801.796922] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 801.803839] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 801.829197] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 801.841227] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 801.847616] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 801.873173] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 801.884090] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 801.892298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 801.974998] device hsr_slave_0 entered promiscuous mode [ 802.020310] device hsr_slave_1 entered promiscuous mode [ 802.071144] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 802.078300] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 802.151782] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.158168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.164842] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.171321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.209018] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 802.215162] 8021q: adding VLAN 0 to HW filter on device bond0 [ 802.226360] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 802.235187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.242793] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.249486] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.260702] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 802.266930] 8021q: adding VLAN 0 to HW filter on device team0 [ 802.276035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.283843] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.290309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 802.301385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.309050] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.315532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 802.340814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 802.348390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 802.356935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 802.364538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 802.373886] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 802.379910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 802.393257] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 802.406234] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 802.414521] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 802.421457] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 802.437381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 802.508655] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 802.518890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 802.557989] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 802.565420] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 802.572869] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 802.583593] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 802.591250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 802.598780] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 802.606724] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 802.615902] device veth0_vlan entered promiscuous mode [ 802.629262] device veth1_vlan entered promiscuous mode [ 802.646246] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 802.657114] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 802.664370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 802.672474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 802.682521] device veth0_macvtap entered promiscuous mode [ 802.688529] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 802.697490] device veth1_macvtap entered promiscuous mode [ 802.703731] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 802.715002] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 802.724935] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 802.734286] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.744588] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.754059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.763937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.773399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.783243] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.792455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.802239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.811488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.821340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.831869] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 802.838960] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 802.848468] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 802.856168] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 802.863841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 802.871659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 802.882561] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.892380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.901614] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.911429] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.920631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.930438] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.939533] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.949292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.958460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.968197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.978216] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 802.985251] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 802.993145] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.001530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:36:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:36:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:56 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/654], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 804.519177] ptrace attach of "/root/syz-executor.5"[21206] was attempted by "/root/syz-executor.5"[21207] 15:36:56 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/654], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 804.589564] ptrace attach of "/root/syz-executor.5"[21210] was attempted by "/root/syz-executor.5"[21211] [ 805.152291] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 805.159019] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 805.166715] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 805.173465] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 805.181545] device bridge_slave_1 left promiscuous mode [ 805.187025] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.241349] device bridge_slave_0 left promiscuous mode [ 805.246967] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.282448] device veth1_macvtap left promiscuous mode [ 805.287743] device veth0_macvtap left promiscuous mode [ 805.293138] device veth1_vlan left promiscuous mode [ 805.298387] device veth0_vlan left promiscuous mode [ 805.424627] device hsr_slave_1 left promiscuous mode [ 805.462956] device hsr_slave_0 left promiscuous mode [ 805.508118] team0 (unregistering): Port device team_slave_1 removed [ 805.518398] team0 (unregistering): Port device team_slave_0 removed [ 805.528633] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 805.574170] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 805.651669] bond0 (unregistering): Released all slaves 15:36:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 807.441740] IPVS: ftp: loaded support on port[0] = 21 [ 807.444700] ptrace attach of "/root/syz-executor.5"[21216] was attempted by "/root/syz-executor.5"[21217] 15:36:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:36:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 808.196950] chnl_net:caif_netlink_parms(): no params data found [ 808.257574] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.264085] bridge0: port 1(bridge_slave_0) entered disabled state [ 808.271958] device bridge_slave_0 entered promiscuous mode [ 808.279288] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.286140] bridge0: port 2(bridge_slave_1) entered disabled state [ 808.293722] device bridge_slave_1 entered promiscuous mode [ 808.315681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 808.325114] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 808.345015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 808.352536] team0: Port device team_slave_0 added [ 808.358132] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 808.365419] team0: Port device team_slave_1 added [ 808.385758] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 808.392290] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 808.417530] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 808.428809] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 808.435406] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 808.460883] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 808.471662] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 808.479340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 808.554730] device hsr_slave_0 entered promiscuous mode [ 808.600299] device hsr_slave_1 entered promiscuous mode [ 808.660885] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 808.668132] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 808.745757] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.752148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 808.758857] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.765244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 808.803595] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 808.809660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 808.821371] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 808.829884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 808.837816] bridge0: port 1(bridge_slave_0) entered disabled state [ 808.844734] bridge0: port 2(bridge_slave_1) entered disabled state [ 808.855632] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 808.862230] 8021q: adding VLAN 0 to HW filter on device team0 [ 808.872840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 808.880951] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.887520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 808.910834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 808.918385] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.924771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 808.932104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 808.939686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 808.947535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 808.955189] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 808.967497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 808.977427] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 808.983858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 809.002837] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 809.010756] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 809.017427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 809.034554] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 809.105871] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 809.115957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 809.157274] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 809.164862] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 809.172059] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 809.180846] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 809.191486] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 809.198164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 809.205964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 809.213942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 809.221360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 809.231365] device veth0_vlan entered promiscuous mode [ 809.243167] device veth1_vlan entered promiscuous mode [ 809.249056] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 809.258832] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 809.274429] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 809.284002] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 809.290873] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 809.298080] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 809.306386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 809.314579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 809.325135] device veth0_macvtap entered promiscuous mode [ 809.331736] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 809.341004] device veth1_macvtap entered promiscuous mode [ 809.347220] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 809.357766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 809.369955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 809.379332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 809.389393] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.398610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 809.408613] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.417854] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 809.427674] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.436894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 809.446802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.456037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 809.465874] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.476177] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 809.483588] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 809.493801] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 809.501507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 809.508694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 809.516555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 809.526442] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 809.536530] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.545677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 809.555453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.564705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 809.574448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.583586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 809.593612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.602899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 809.612643] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 809.623333] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 809.630263] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 809.637767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 809.645587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:02 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/654], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:02 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600"/981], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 811.502842] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 811.509538] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 811.518243] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 811.524994] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 811.532533] device bridge_slave_1 left promiscuous mode [ 811.537986] bridge0: port 2(bridge_slave_1) entered disabled state [ 811.570659] device bridge_slave_0 left promiscuous mode [ 811.576201] bridge0: port 1(bridge_slave_0) entered disabled state [ 811.623818] device veth1_macvtap left promiscuous mode [ 811.629225] device veth0_macvtap left promiscuous mode [ 811.634907] device veth1_vlan left promiscuous mode [ 811.640130] device veth0_vlan left promiscuous mode [ 811.771961] device hsr_slave_1 left promiscuous mode [ 811.812819] device hsr_slave_0 left promiscuous mode [ 811.857672] team0 (unregistering): Port device team_slave_1 removed [ 811.867177] team0 (unregistering): Port device team_slave_0 removed [ 811.877112] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 811.914743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 811.973715] bond0 (unregistering): Released all slaves 15:37:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600"/981], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:05 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:06 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 814.100981] ptrace attach of "/root/syz-executor.0"[21364] was attempted by "/root/syz-executor.0"[21365] 15:37:06 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 814.172638] ptrace attach of "/root/syz-executor.0"[21367] was attempted by "/root/syz-executor.0"[21368] [ 814.246565] ptrace attach of "/root/syz-executor.0"[21370] was attempted by "/root/syz-executor.0"[21371] [ 815.741170] IPVS: ftp: loaded support on port[0] = 21 [ 816.575009] chnl_net:caif_netlink_parms(): no params data found [ 816.636337] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.642836] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.649801] device bridge_slave_0 entered promiscuous mode [ 816.657458] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.664035] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.671730] device bridge_slave_1 entered promiscuous mode [ 816.693734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 816.702997] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 816.724754] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 816.732045] team0: Port device team_slave_0 added [ 816.737651] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 816.745080] team0: Port device team_slave_1 added [ 816.765014] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 816.771459] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 816.796724] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 816.807938] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 816.814345] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:37:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 816.839675] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 816.850496] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 816.858093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 816.933651] device hsr_slave_0 entered promiscuous mode [ 816.951251] device hsr_slave_1 entered promiscuous mode [ 817.001082] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 817.008680] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 817.109983] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.116537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.123215] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.129569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.169244] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 817.176058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 817.185405] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 817.197340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 817.204503] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.211658] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.222628] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 817.228774] 8021q: adding VLAN 0 to HW filter on device team0 [ 817.239389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 817.247230] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.253718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.271474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 817.279030] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.285507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.296806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 817.304815] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 817.320658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 817.328148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 817.335926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 817.346545] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 817.352890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 817.369687] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 817.377357] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 817.384400] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 817.398362] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 817.470999] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 817.482517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 817.523264] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 817.531222] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 817.537840] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 817.548579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 817.556107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 817.562984] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 817.569958] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 817.580555] device veth0_vlan entered promiscuous mode [ 817.590692] device veth1_vlan entered promiscuous mode [ 817.606051] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 817.616066] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 817.623563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 817.631813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 817.642955] device veth0_macvtap entered promiscuous mode [ 817.649240] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 817.658350] device veth1_macvtap entered promiscuous mode [ 817.665040] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 817.674574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 817.685908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 817.694681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.704486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.714097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.724108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.733260] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.743056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.752556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.762355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.771489] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.781258] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.791266] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 817.798218] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 817.807662] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 817.814982] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 817.822276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 817.829898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 817.840563] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.850932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.860215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.869976] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.879185] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.889009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.898255] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.908171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.917558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.927381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.937864] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 817.944937] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 817.953009] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 817.961637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:11 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600"/981], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400"/1145], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 820.082127] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 820.089078] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 820.102318] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 820.109154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 820.120779] device bridge_slave_1 left promiscuous mode [ 820.126252] bridge0: port 2(bridge_slave_1) entered disabled state [ 820.170811] device bridge_slave_0 left promiscuous mode [ 820.176393] bridge0: port 1(bridge_slave_0) entered disabled state [ 820.222398] device veth1_macvtap left promiscuous mode [ 820.227707] device veth0_macvtap left promiscuous mode [ 820.233442] device veth1_vlan left promiscuous mode [ 820.238599] device veth0_vlan left promiscuous mode [ 820.374418] device hsr_slave_1 left promiscuous mode [ 820.414599] device hsr_slave_0 left promiscuous mode [ 820.459989] team0 (unregistering): Port device team_slave_1 removed [ 820.469290] team0 (unregistering): Port device team_slave_0 removed [ 820.479002] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 820.515766] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 820.573593] bond0 (unregistering): Released all slaves 15:37:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 822.381604] IPVS: ftp: loaded support on port[0] = 21 15:37:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 823.214345] chnl_net:caif_netlink_parms(): no params data found [ 823.272526] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.278977] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.286279] device bridge_slave_0 entered promiscuous mode [ 823.294065] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.300661] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.307637] device bridge_slave_1 entered promiscuous mode [ 823.328017] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 823.337158] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 823.357959] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 823.365131] team0: Port device team_slave_0 added [ 823.371221] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 823.378564] team0: Port device team_slave_1 added [ 823.398992] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 823.405283] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 823.430667] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 823.441959] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 823.448260] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 823.473616] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 823.484436] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 823.492301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 823.554504] device hsr_slave_0 entered promiscuous mode [ 823.590460] device hsr_slave_1 entered promiscuous mode [ 823.630841] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 823.637962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 823.716429] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.722897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.729492] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.735873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.772940] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 823.779022] 8021q: adding VLAN 0 to HW filter on device bond0 [ 823.788689] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 823.798920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.806370] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.813166] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.824109] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 823.830450] 8021q: adding VLAN 0 to HW filter on device team0 [ 823.839343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 823.847037] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.853516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.865485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 823.873335] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.879672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.896913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 823.904548] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 823.916130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 823.927695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 823.937969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 823.948800] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 823.955095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 823.968248] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 823.976745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 823.983941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 823.996895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 824.072994] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 824.085414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 824.122861] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 824.129861] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 824.137374] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 824.149129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 824.157486] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 824.165206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 824.174791] device veth0_vlan entered promiscuous mode [ 824.187077] device veth1_vlan entered promiscuous mode [ 824.193828] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 824.203302] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 824.211507] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 824.222068] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 824.229362] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 824.246068] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 824.255870] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 824.262776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 824.270963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 824.280611] device veth0_macvtap entered promiscuous mode [ 824.286823] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 824.299651] device veth1_macvtap entered promiscuous mode [ 824.306046] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 824.316079] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 824.326385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 824.336483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 824.346648] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.355864] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 824.365656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.375122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 824.384946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.394152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 824.404035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.413254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 824.423053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.433593] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 824.440789] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 824.450201] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 824.457413] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 824.465284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 824.473663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 824.485468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 824.495620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.505234] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 824.515523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.524737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 824.534535] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.543944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 824.553772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.563015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 824.572848] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 824.583870] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 824.591057] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 824.598637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 824.607845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400"/1145], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:37:17 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400"/1145], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:17 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400"/1227], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 826.461968] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 826.468805] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 826.478903] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 826.485765] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 826.493657] device bridge_slave_1 left promiscuous mode [ 826.499289] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.540872] device bridge_slave_0 left promiscuous mode [ 826.546482] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.604117] device veth1_macvtap left promiscuous mode [ 826.609554] device veth0_macvtap left promiscuous mode [ 826.615027] device veth1_vlan left promiscuous mode [ 826.620280] device veth0_vlan left promiscuous mode [ 826.775011] device hsr_slave_1 left promiscuous mode [ 826.823090] device hsr_slave_0 left promiscuous mode [ 826.868035] team0 (unregistering): Port device team_slave_1 removed [ 826.877666] team0 (unregistering): Port device team_slave_0 removed [ 826.887009] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 826.923237] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 826.984817] bond0 (unregistering): Released all slaves 15:37:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 828.809345] IPVS: ftp: loaded support on port[0] = 21 15:37:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:37:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 829.625923] chnl_net:caif_netlink_parms(): no params data found [ 829.689522] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.696020] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.703586] device bridge_slave_0 entered promiscuous mode [ 829.710645] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.717066] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.724717] device bridge_slave_1 entered promiscuous mode [ 829.745573] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 829.754643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 829.774686] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 829.782168] team0: Port device team_slave_0 added [ 829.787802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 829.795103] team0: Port device team_slave_1 added [ 829.814144] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 829.820558] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 829.846095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 829.857197] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 829.864014] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 829.889286] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 829.899833] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 829.907446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 829.964456] device hsr_slave_0 entered promiscuous mode [ 830.000585] device hsr_slave_1 entered promiscuous mode [ 830.041238] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 830.048555] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 830.129249] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.135640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 830.142319] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.148700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 830.189177] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 830.195582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 830.205038] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 830.215603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 830.223636] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.230564] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.240978] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 830.247192] 8021q: adding VLAN 0 to HW filter on device team0 [ 830.258797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 830.266690] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.273120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 830.284363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 830.294553] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.300948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 830.322172] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 830.329815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 830.338349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 830.346182] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 830.356364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 830.369516] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 830.375802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 830.393063] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 830.402112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 830.408895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 830.421931] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 830.498398] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 830.509940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 830.555166] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 830.562990] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 830.569612] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 830.582652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 830.589959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 830.597240] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 830.604590] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 830.615992] device veth0_vlan entered promiscuous mode [ 830.627660] device veth1_vlan entered promiscuous mode [ 830.645315] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 830.655142] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 830.662938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 830.671322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 830.683283] device veth0_macvtap entered promiscuous mode [ 830.689677] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 830.699025] device veth1_macvtap entered promiscuous mode [ 830.705890] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 830.715080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 830.726190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 830.735194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 830.745093] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.754253] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 830.764000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.774283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 830.784077] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.793527] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 830.803267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.812411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 830.822185] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.832653] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 830.839587] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 830.848812] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 830.856147] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 830.863448] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 830.871795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 830.884296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 830.894363] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.904344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 830.914425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.923826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 830.933709] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.943060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 830.953098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.962448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 830.972260] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.983303] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 830.990383] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 830.998103] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 831.006500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400"/1227], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:24 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400"/1227], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:24 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/1268], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 833.002308] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 833.009034] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 833.017199] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 833.024008] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 833.032586] device bridge_slave_1 left promiscuous mode [ 833.038192] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.080721] device bridge_slave_0 left promiscuous mode [ 833.086215] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.142567] device veth1_macvtap left promiscuous mode [ 833.147935] device veth0_macvtap left promiscuous mode [ 833.156063] device veth1_vlan left promiscuous mode [ 833.161200] device veth0_vlan left promiscuous mode [ 833.305751] device hsr_slave_1 left promiscuous mode [ 833.353444] device hsr_slave_0 left promiscuous mode [ 833.401199] team0 (unregistering): Port device team_slave_1 removed [ 833.411190] team0 (unregistering): Port device team_slave_0 removed [ 833.420738] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 833.475150] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 833.553459] bond0 (unregistering): Released all slaves 15:37:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 835.342271] IPVS: ftp: loaded support on port[0] = 21 15:37:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 836.064882] chnl_net:caif_netlink_parms(): no params data found [ 836.126585] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.133459] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.141538] device bridge_slave_0 entered promiscuous mode [ 836.148701] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.155274] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.162533] device bridge_slave_1 entered promiscuous mode [ 836.183075] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 836.192159] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 836.213143] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 836.220658] team0: Port device team_slave_0 added [ 836.226993] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 836.234518] team0: Port device team_slave_1 added [ 836.253877] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 836.260291] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 836.286180] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 836.297210] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 836.303516] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 836.328989] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 836.339827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 836.347534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 836.402818] device hsr_slave_0 entered promiscuous mode [ 836.440322] device hsr_slave_1 entered promiscuous mode [ 836.511098] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 836.518446] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 836.594094] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.600491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 836.607144] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.613729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 836.653581] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 836.659667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 836.670321] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 836.679215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 836.687450] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.694445] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.705839] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 836.712753] 8021q: adding VLAN 0 to HW filter on device team0 [ 836.723281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 836.731372] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.737785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 836.748469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 836.756371] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.762780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 836.780908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 836.788521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 836.805564] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 836.816486] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 836.827362] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 836.834094] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 836.841771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 836.849536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 836.857522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 836.869964] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 836.879175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 836.886200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 836.926821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 837.002975] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 837.014968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 837.051327] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 837.066426] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 837.074244] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 837.081699] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 837.091481] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 837.098075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 837.105537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 837.114288] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 837.121311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 837.130854] device veth0_vlan entered promiscuous mode [ 837.142943] device veth1_vlan entered promiscuous mode [ 837.149827] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 837.159571] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 837.175209] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 837.184927] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 837.192173] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 837.199465] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 837.207553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 837.215504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 837.226510] device veth0_macvtap entered promiscuous mode [ 837.233175] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 837.242495] device veth1_macvtap entered promiscuous mode [ 837.248555] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 837.257947] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 837.268532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 837.278207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 837.288350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.297802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 837.308126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.317803] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 837.327796] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.337268] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 837.347946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.357386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 837.367167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.377314] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 837.384455] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 837.394621] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 837.402327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 837.409434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 837.417736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 837.427851] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 837.442484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.452194] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 837.462308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.472103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 837.481925] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.491104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 837.500854] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.509956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 837.519772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.529844] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 837.537043] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 837.544952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 837.553351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:30 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/1268], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:30 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800"/1268], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 839.391913] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 839.398640] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 839.406396] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 839.413181] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 839.421146] device bridge_slave_1 left promiscuous mode [ 839.426616] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.470743] device bridge_slave_0 left promiscuous mode [ 839.476343] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.533334] device veth1_macvtap left promiscuous mode [ 839.538770] device veth0_macvtap left promiscuous mode [ 839.544233] device veth1_vlan left promiscuous mode [ 839.549401] device veth0_vlan left promiscuous mode [ 839.673433] device hsr_slave_1 left promiscuous mode [ 839.725026] device hsr_slave_0 left promiscuous mode [ 839.768194] team0 (unregistering): Port device team_slave_1 removed [ 839.780071] team0 (unregistering): Port device team_slave_0 removed [ 839.789586] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 839.843104] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 839.922117] bond0 (unregistering): Released all slaves 15:37:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 841.722080] IPVS: ftp: loaded support on port[0] = 21 15:37:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:37:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 842.526836] chnl_net:caif_netlink_parms(): no params data found [ 842.587749] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.594243] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.601623] device bridge_slave_0 entered promiscuous mode [ 842.608494] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.614953] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.623388] device bridge_slave_1 entered promiscuous mode [ 842.645045] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 842.654109] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 842.675024] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 842.682466] team0: Port device team_slave_0 added [ 842.688125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 842.695451] team0: Port device team_slave_1 added [ 842.714565] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 842.721765] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 842.746999] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 842.758447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 842.764756] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 842.790357] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 842.801080] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 842.808549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 842.862948] device hsr_slave_0 entered promiscuous mode [ 842.900356] device hsr_slave_1 entered promiscuous mode [ 842.951365] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 842.958553] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 843.037775] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.044165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.050826] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.057281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.098682] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 843.105027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 843.115155] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 843.124265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 843.131689] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.140470] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.150703] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 843.156883] 8021q: adding VLAN 0 to HW filter on device team0 [ 843.166476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 843.174324] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.181647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.192912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 843.201406] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.207776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.225078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 843.232954] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 843.246053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 843.261092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 843.268631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 843.282811] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 843.288913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 843.304148] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 843.312822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 843.319492] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 843.333324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 843.408172] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 843.419161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 843.464893] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 843.472360] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 843.479016] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 843.489567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 843.497209] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 843.504265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 843.512031] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 843.521643] device veth0_vlan entered promiscuous mode [ 843.535156] device veth1_vlan entered promiscuous mode [ 843.549386] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 843.559232] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 843.566506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 843.575228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 843.585363] device veth0_macvtap entered promiscuous mode [ 843.592326] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 843.601959] device veth1_macvtap entered promiscuous mode [ 843.608333] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 843.619119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 843.629569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 843.641776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.651905] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.661215] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.671056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.680248] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.690114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.699271] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.709060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.718319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 843.728176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.738274] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 843.745532] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 843.755328] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 843.763102] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 843.770581] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 843.778437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 843.788829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.799175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.808661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.818958] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.828209] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.837990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.847111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.856879] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.866058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 843.875813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 843.885853] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 843.892933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 843.900256] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 843.907959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:36 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feff"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:37:36 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feff"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:36 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feff"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 845.522879] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 845.529691] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 845.537667] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 845.544493] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 845.552371] device bridge_slave_1 left promiscuous mode [ 845.557964] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.601054] device bridge_slave_0 left promiscuous mode [ 845.606638] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.663576] device veth1_macvtap left promiscuous mode [ 845.668991] device veth0_macvtap left promiscuous mode [ 845.674718] device veth1_vlan left promiscuous mode [ 845.679895] device veth0_vlan left promiscuous mode [ 845.842817] device hsr_slave_1 left promiscuous mode [ 845.882949] device hsr_slave_0 left promiscuous mode [ 845.928147] team0 (unregistering): Port device team_slave_1 removed [ 845.939322] team0 (unregistering): Port device team_slave_0 removed [ 845.948776] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 845.983308] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 846.062249] bond0 (unregistering): Released all slaves 15:37:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 847.861726] IPVS: ftp: loaded support on port[0] = 21 15:37:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 15:37:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:37:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 848.693020] chnl_net:caif_netlink_parms(): no params data found [ 848.753476] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.759889] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.767332] device bridge_slave_0 entered promiscuous mode [ 848.775359] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.781957] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.788987] device bridge_slave_1 entered promiscuous mode [ 848.810631] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 848.819696] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 848.841254] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 848.848461] team0: Port device team_slave_0 added [ 848.854325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 848.861800] team0: Port device team_slave_1 added [ 848.881175] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 848.887445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 848.912969] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 848.924831] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 848.931222] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 848.956575] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 848.967147] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 848.974912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 849.034762] device hsr_slave_0 entered promiscuous mode [ 849.080311] device hsr_slave_1 entered promiscuous mode [ 849.121333] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 849.128562] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 849.207566] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.213986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 849.220675] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.227164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 849.267005] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 849.273379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 849.283357] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 849.292993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 849.301104] bridge0: port 1(bridge_slave_0) entered disabled state [ 849.307940] bridge0: port 2(bridge_slave_1) entered disabled state [ 849.318352] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 849.324832] 8021q: adding VLAN 0 to HW filter on device team0 [ 849.334022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 849.341854] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.348205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 849.358498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 849.366439] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.372922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 849.392995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 849.401008] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 849.412293] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 849.426644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 849.436841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 849.449054] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 849.455444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 849.469665] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 849.478101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 849.484959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 849.497933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 849.574767] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 849.586698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 849.626741] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 849.634080] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 849.641136] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 849.653641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 849.661487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 849.668525] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 849.675995] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 849.686145] device veth0_vlan entered promiscuous mode [ 849.697889] device veth1_vlan entered promiscuous mode [ 849.716792] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 849.726933] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 849.734368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 849.742936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 849.754557] device veth0_macvtap entered promiscuous mode [ 849.761176] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 849.769606] device veth1_macvtap entered promiscuous mode [ 849.775889] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 849.785140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 849.795089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 849.804852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 849.815362] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 849.824745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 849.834762] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 849.843911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 849.853809] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 849.862962] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 849.872686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 849.882085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 849.891867] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 849.902192] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 849.909103] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 849.919360] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 849.926629] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 849.933718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 849.941544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 849.953576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 849.963570] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 849.972806] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 849.982663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 849.992162] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 850.001987] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 850.011216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 850.021043] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 850.030352] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 850.040162] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 850.050521] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 850.057475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 850.065360] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 850.073382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 3 (fault-call:10 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:43 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 852.062294] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 852.069013] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 852.077431] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 852.084190] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 852.092045] device bridge_slave_1 left promiscuous mode [ 852.097507] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.141157] device bridge_slave_0 left promiscuous mode [ 852.146772] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.203899] device veth1_macvtap left promiscuous mode [ 852.209324] device veth0_macvtap left promiscuous mode [ 852.215080] device veth1_vlan left promiscuous mode [ 852.220275] device veth0_vlan left promiscuous mode [ 852.354027] device hsr_slave_1 left promiscuous mode [ 852.394857] device hsr_slave_0 left promiscuous mode [ 852.448669] team0 (unregistering): Port device team_slave_1 removed [ 852.458169] team0 (unregistering): Port device team_slave_0 removed [ 852.468286] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 852.495405] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 852.573477] bond0 (unregistering): Released all slaves [ 854.341778] IPVS: ftp: loaded support on port[0] = 21 15:37:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x101000000000016) ptrace$cont(0x7, r1, 0x8, 0x1) 15:37:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x103, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 855.065681] chnl_net:caif_netlink_parms(): no params data found [ 855.127924] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.134577] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.141806] device bridge_slave_0 entered promiscuous mode [ 855.149014] bridge0: port 2(bridge_slave_1) entered blocking state [ 855.155610] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.162858] device bridge_slave_1 entered promiscuous mode [ 855.185655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 855.195104] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 855.216195] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 855.223375] team0: Port device team_slave_0 added [ 855.228898] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 855.237239] team0: Port device team_slave_1 added [ 855.256938] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 855.263256] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 855.288482] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 855.299696] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 855.306103] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 855.331633] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 855.342384] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 855.350291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 855.424250] device hsr_slave_0 entered promiscuous mode [ 855.460377] device hsr_slave_1 entered promiscuous mode [ 855.502279] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 855.509417] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 855.588085] bridge0: port 2(bridge_slave_1) entered blocking state [ 855.594486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 855.601170] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.607647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 855.647369] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 855.653850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 855.664579] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 855.675066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 855.683267] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.690225] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.701279] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 855.707406] 8021q: adding VLAN 0 to HW filter on device team0 [ 855.719479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 855.728880] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.735334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 855.754755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 855.762497] bridge0: port 2(bridge_slave_1) entered blocking state [ 855.768839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 855.788805] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 855.798663] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 855.809095] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 855.816301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 855.824848] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 855.832746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 855.841425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 855.849403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 855.856420] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 855.872398] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 855.879999] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 855.887417] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 855.901065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 855.974598] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 855.984978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 856.026491] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 856.033831] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 856.040912] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 856.051782] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 856.059760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 856.067456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 856.074951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 856.085549] device veth0_vlan entered promiscuous mode [ 856.097381] device veth1_vlan entered promiscuous mode [ 856.113514] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 856.123040] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 856.129835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 856.138379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 856.148157] device veth0_macvtap entered promiscuous mode [ 856.155420] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 856.165104] device veth1_macvtap entered promiscuous mode [ 856.171673] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 856.181646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 856.192268] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 856.201989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 856.212047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.221523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 856.231661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.241124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 856.250992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.260245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 856.269979] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.279224] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 856.289477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.300201] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 856.307261] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 856.316142] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 856.323466] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 856.330822] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 856.338566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 856.349771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 856.359888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.369111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 856.378865] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.388493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 856.398344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.407498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 856.417241] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.427745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 856.438048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 856.448314] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 856.455393] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 856.462540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 856.470466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:49 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feff"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000001c0)={0x9, 0xb, 0x4, 0x70000, 0x2, {0x0, 0x2710}, {0x3, 0x0, 0xfc, 0x1, 0x40, 0x1, "6ae8074f"}, 0x200, 0x4, @offset=0x200, 0x7, 0x0, 0xffffffffffffffff}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000000)) mmap$dsp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000001, 0x11, r1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4200, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = gettid() tkill(r4, 0x101000000000016) ptrace$cont(0x7, r4, 0x0, 0x0) 15:37:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREMOVE(r2, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:49 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feff"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:49 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feff"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 858.453729] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 858.460512] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 858.468030] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 858.475074] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 858.483993] device bridge_slave_1 left promiscuous mode [ 858.489651] bridge0: port 2(bridge_slave_1) entered disabled state [ 858.530917] device bridge_slave_0 left promiscuous mode [ 858.536437] bridge0: port 1(bridge_slave_0) entered disabled state [ 858.592327] device veth1_macvtap left promiscuous mode [ 858.597625] device veth0_macvtap left promiscuous mode [ 858.603320] device veth1_vlan left promiscuous mode [ 858.608465] device veth0_vlan left promiscuous mode [ 858.732241] device hsr_slave_1 left promiscuous mode [ 858.774569] device hsr_slave_0 left promiscuous mode [ 858.840429] team0 (unregistering): Port device team_slave_1 removed [ 858.849881] team0 (unregistering): Port device team_slave_0 removed [ 858.859644] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 858.895896] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 858.955220] bond0 (unregistering): Released all slaves 15:37:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 860.807873] IPVS: ftp: loaded support on port[0] = 21 15:37:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 861.594578] chnl_net:caif_netlink_parms(): no params data found [ 861.654570] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.661035] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.667948] device bridge_slave_0 entered promiscuous mode [ 861.675424] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.681879] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.688816] device bridge_slave_1 entered promiscuous mode [ 861.708284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 861.717435] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 861.738749] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 861.745886] team0: Port device team_slave_0 added [ 861.752014] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 861.759177] team0: Port device team_slave_1 added [ 861.777858] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 861.784291] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 861.809558] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 861.820719] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 861.826956] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 861.852210] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 861.862621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 861.870223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 861.923080] device hsr_slave_0 entered promiscuous mode [ 861.960505] device hsr_slave_1 entered promiscuous mode [ 862.000854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 862.007999] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 862.088589] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.095379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 862.102057] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.108511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 862.148055] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 862.154964] 8021q: adding VLAN 0 to HW filter on device bond0 [ 862.164726] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 862.176498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 862.184335] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.191440] bridge0: port 2(bridge_slave_1) entered disabled state [ 862.203038] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 862.209246] 8021q: adding VLAN 0 to HW filter on device team0 [ 862.219447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 862.227234] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.233631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 862.247773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 862.255468] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.261870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 862.281673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 862.299634] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 862.310216] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 862.321055] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 862.327884] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 862.334975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 862.342532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 862.349927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 862.357538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 862.373998] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 862.382212] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 862.388871] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 862.403470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 862.481834] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 862.492507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 862.536269] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 862.543725] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 862.551072] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 862.561609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 862.568961] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 862.576063] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 862.583839] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 862.593898] device veth0_vlan entered promiscuous mode [ 862.606004] device veth1_vlan entered promiscuous mode [ 862.621265] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 862.631665] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 862.638536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 862.647382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 862.656760] device veth0_macvtap entered promiscuous mode [ 862.663552] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 862.672384] device veth1_macvtap entered promiscuous mode [ 862.678436] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 862.687853] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 862.697919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 862.707075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 862.716851] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.726590] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 862.736366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.745535] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 862.755259] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.764763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 862.774540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.784040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 862.794038] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.804438] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 862.811667] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 862.820760] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 862.827927] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 862.835726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 862.843662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 862.854038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 862.864574] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.874097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 862.884128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.893304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 862.903064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.912209] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 862.921971] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.931374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 862.941166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 862.951669] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 862.958542] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 862.966348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 862.974762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:37:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:56 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff000000"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:37:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f35", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:56 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff000000"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 865.061845] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 865.068576] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 865.076385] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 865.083195] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 865.091520] device bridge_slave_1 left promiscuous mode [ 865.097178] bridge0: port 2(bridge_slave_1) entered disabled state [ 865.140688] device bridge_slave_0 left promiscuous mode [ 865.146370] bridge0: port 1(bridge_slave_0) entered disabled state [ 865.202248] device veth1_macvtap left promiscuous mode [ 865.207565] device veth0_macvtap left promiscuous mode [ 865.213002] device veth1_vlan left promiscuous mode [ 865.218170] device veth0_vlan left promiscuous mode [ 865.342273] device hsr_slave_1 left promiscuous mode [ 865.383079] device hsr_slave_0 left promiscuous mode [ 865.429265] team0 (unregistering): Port device team_slave_1 removed [ 865.440816] team0 (unregistering): Port device team_slave_0 removed [ 865.450779] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 865.503599] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 865.581440] bond0 (unregistering): Released all slaves 15:37:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed4"], 0x0, 0x109, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 867.381715] IPVS: ftp: loaded support on port[0] = 21 15:37:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:37:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 868.327983] chnl_net:caif_netlink_parms(): no params data found [ 868.390081] bridge0: port 1(bridge_slave_0) entered blocking state [ 868.396520] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.404482] device bridge_slave_0 entered promiscuous mode [ 868.411787] bridge0: port 2(bridge_slave_1) entered blocking state [ 868.418192] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.425384] device bridge_slave_1 entered promiscuous mode [ 868.446046] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 868.455247] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 868.475445] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 868.483040] team0: Port device team_slave_0 added [ 868.488640] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 868.496657] team0: Port device team_slave_1 added [ 868.514942] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 868.521372] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 868.546593] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 868.557440] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 868.563736] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 868.589339] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 868.599921] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 868.607446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 868.664315] device hsr_slave_0 entered promiscuous mode [ 868.700277] device hsr_slave_1 entered promiscuous mode [ 868.740817] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 868.747984] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 868.823574] bridge0: port 2(bridge_slave_1) entered blocking state [ 868.829965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 868.836657] bridge0: port 1(bridge_slave_0) entered blocking state [ 868.843146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 868.883607] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 868.889700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 868.899108] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 868.908315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 868.916235] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.923124] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.934787] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 868.941008] 8021q: adding VLAN 0 to HW filter on device team0 [ 868.950612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 868.958273] bridge0: port 1(bridge_slave_0) entered blocking state [ 868.964732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 868.976250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 868.984450] bridge0: port 2(bridge_slave_1) entered blocking state [ 868.990851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 869.012620] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 869.020300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 869.027774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 869.037339] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 869.048582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 869.059305] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 869.065657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 869.082701] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 869.091094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 869.097793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 869.110638] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 869.184216] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 869.197402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 869.238006] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 869.246049] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 869.252866] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 869.264664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 869.272268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 869.279216] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 869.289967] device veth0_vlan entered promiscuous mode [ 869.302701] device veth1_vlan entered promiscuous mode [ 869.308600] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 869.318629] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 869.326232] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 869.334798] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 869.342229] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 869.361488] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 869.371650] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 869.378633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 869.386503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 869.397195] device veth0_macvtap entered promiscuous mode [ 869.403554] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 869.413859] device veth1_macvtap entered promiscuous mode [ 869.420288] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 869.429955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 869.441035] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 869.450332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 869.460400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.469551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 869.479382] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.488642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 869.498460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.507635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 869.517503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.526753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 869.536706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.546902] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 869.554409] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 869.564604] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 869.572518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 869.579720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 869.587577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 869.597995] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 869.608066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.617728] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 869.628279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.637575] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 869.647493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.656693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 869.666608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.675842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 869.685700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 869.696164] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 869.703294] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 869.711532] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 869.719249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:38:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:38:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) r4 = getuid() lchown(&(0x7f0000000040)='.\x00', r4, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_L='version=9p2000.L'}], [{@fowner_gt={'fowner>', r4}}]}}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYRES16], 0x0, 0x1b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:02 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff000000"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:38:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:03 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:03 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 871.732153] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 871.738917] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 871.746947] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 871.753837] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 871.762195] device bridge_slave_1 left promiscuous mode [ 871.767804] bridge0: port 2(bridge_slave_1) entered disabled state [ 871.810772] device bridge_slave_0 left promiscuous mode [ 871.816358] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.872193] device veth1_macvtap left promiscuous mode [ 871.877509] device veth0_macvtap left promiscuous mode [ 871.883240] device veth1_vlan left promiscuous mode [ 871.888319] device veth0_vlan left promiscuous mode [ 872.023538] device hsr_slave_1 left promiscuous mode [ 872.074529] device hsr_slave_0 left promiscuous mode [ 872.130457] team0 (unregistering): Port device team_slave_1 removed [ 872.139733] team0 (unregistering): Port device team_slave_0 removed [ 872.149372] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 872.173885] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 872.253122] bond0 (unregistering): Released all slaves 15:38:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:05 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="ef864acd290cd75686cd6b6725cb9b48f706831cafac38d921a7c45ac0585bc5b4b0c8f633c733b0b37b8580999c23006108f70bb271a5302f43588d23ff84d09bf18b1a176f56900f5656018eab"], 0x0, 0x4e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 874.051742] IPVS: ftp: loaded support on port[0] = 21 15:38:06 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:06 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 874.114628] ptrace attach of "/root/syz-executor.1"[22370] was attempted by "/root/syz-executor.1"[22371] 15:38:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 874.913829] chnl_net:caif_netlink_parms(): no params data found [ 874.976900] bridge0: port 1(bridge_slave_0) entered blocking state [ 874.983959] bridge0: port 1(bridge_slave_0) entered disabled state [ 874.992355] device bridge_slave_0 entered promiscuous mode [ 874.999604] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.006297] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.014068] device bridge_slave_1 entered promiscuous mode [ 875.035939] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 875.045187] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 875.066155] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 875.073629] team0: Port device team_slave_0 added [ 875.079181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 875.086614] team0: Port device team_slave_1 added [ 875.106133] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 875.112739] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 875.137976] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 875.149360] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 875.155862] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 875.181267] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 875.192018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 875.199638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 875.275001] device hsr_slave_0 entered promiscuous mode [ 875.330325] device hsr_slave_1 entered promiscuous mode [ 875.371219] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 875.378537] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 875.456296] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.462827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 875.469467] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.475870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 875.513910] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 875.519992] 8021q: adding VLAN 0 to HW filter on device bond0 [ 875.530815] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 875.539368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 875.547138] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.553931] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.565801] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 875.572063] 8021q: adding VLAN 0 to HW filter on device team0 [ 875.581459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 875.589152] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.595627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 875.608937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 875.616910] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.623458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 875.641204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 875.657508] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 875.667649] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 875.678357] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 875.685137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 875.692425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 875.699934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 875.707904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 875.715495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 875.732542] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 875.740239] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 875.747017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 875.763365] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 875.837257] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 875.847590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 875.890269] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 875.897258] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 875.904656] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 875.912089] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 875.925721] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 875.932430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 875.939697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 875.947509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 875.955416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 875.965579] device veth0_vlan entered promiscuous mode [ 875.977065] device veth1_vlan entered promiscuous mode [ 875.983086] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 875.997714] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 876.010915] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 876.020929] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 876.027884] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 876.035919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 876.043508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 876.051358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 876.061369] device veth0_macvtap entered promiscuous mode [ 876.067402] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 876.077310] device veth1_macvtap entered promiscuous mode [ 876.083431] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 876.093292] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 876.102895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 876.112593] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 876.122473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.132540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 876.142831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.152103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 876.161866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.171017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 876.180785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.189881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 876.199605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.209679] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 876.217082] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 876.226067] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 876.233771] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 876.241208] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 876.248822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 876.258982] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 876.269123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.278607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 876.288403] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.297574] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 876.307766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.317038] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 876.326818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.336019] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 876.345809] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 876.355981] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 876.363432] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 876.371791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 876.379596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:38:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) r1 = socket$pptp(0x18, 0x1, 0x2) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r2, 0x2, &(0x7f0000000280)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000180)="4bf36076952289d306db6e339374d03e", 0x10}]) io_destroy(r2) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e91"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537413f3653402000000000000000000000000000059e67179000000000000000000000000000e00000000339f695d194fc34ceb419c87c216b0a612c791dd9e7c1f7e05fe46a55c3d9711d4d70dbffe72eaf1c981949ac00d272ced4ec1652c49e1a0da90ffaa000068c219c22d96cf52c86c646de7d245a1656fc1a1683524cc29359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d855172aaf79bb644b631a41630bfeee6fe888738276a5ceec10f53fb97b117ef142aadc831609d8da0bda448d21b5ada6e9e6a66af52b51476b382bb88dd6d461076174a29cf4b2ed4bc80caade68a0e4c1d62ffbfb3bcb05476f89913a14321e4bcfb8c37d184c9931beaac57b43f57cc921873805b50a687224aa988a6dbbde692e6da183f87769e0ccd3ad1e7cca18b5f154f5cf373f42696aa0702914de547f6fd906b17584f4c5ad344556964779fe60ba0360c2642a5dfcaae18155d"], 0x0, 0x1ca, 0x0, 0xfffffffd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0x9}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000000)=0x7, 0x4) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:09 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e91"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 878.381902] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 878.388670] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 878.398459] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 878.405356] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 878.413309] device bridge_slave_1 left promiscuous mode [ 878.418896] bridge0: port 2(bridge_slave_1) entered disabled state [ 878.460708] device bridge_slave_0 left promiscuous mode [ 878.466312] bridge0: port 1(bridge_slave_0) entered disabled state [ 878.522242] device veth1_macvtap left promiscuous mode [ 878.527623] device veth0_macvtap left promiscuous mode [ 878.533427] device veth1_vlan left promiscuous mode [ 878.538652] device veth0_vlan left promiscuous mode [ 878.550390] Dropped {multi|broad}cast of type= [86dd] [ 878.662147] device hsr_slave_1 left promiscuous mode [ 878.703145] device hsr_slave_0 left promiscuous mode [ 878.758280] team0 (unregistering): Port device team_slave_1 removed [ 878.769301] team0 (unregistering): Port device team_slave_0 removed [ 878.778924] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 878.814156] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 878.873798] bond0 (unregistering): Released all slaves 15:38:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 880.642572] IPVS: ftp: loaded support on port[0] = 21 15:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256"], 0x0, 0x82, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256"], 0x0, 0x82, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256"], 0x0, 0x82, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7"], 0x0, 0xc3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 881.532621] chnl_net:caif_netlink_parms(): no params data found [ 881.593094] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.599501] bridge0: port 1(bridge_slave_0) entered disabled state [ 881.608865] device bridge_slave_0 entered promiscuous mode [ 881.616207] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.623256] bridge0: port 2(bridge_slave_1) entered disabled state [ 881.630363] device bridge_slave_1 entered promiscuous mode [ 881.651194] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 881.660297] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 881.679056] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 881.686743] team0: Port device team_slave_0 added [ 881.692549] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 881.699627] team0: Port device team_slave_1 added [ 881.716306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 881.722623] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 881.747895] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 881.759173] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 881.765551] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 881.790909] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 881.804370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 881.811894] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 881.885653] device hsr_slave_0 entered promiscuous mode [ 881.940341] device hsr_slave_1 entered promiscuous mode [ 881.980815] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 881.988112] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 882.069866] bridge0: port 2(bridge_slave_1) entered blocking state [ 882.076276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 882.083071] bridge0: port 1(bridge_slave_0) entered blocking state [ 882.089423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 882.128744] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 882.135479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 882.144960] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 882.156105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 882.163635] bridge0: port 1(bridge_slave_0) entered disabled state [ 882.170577] bridge0: port 2(bridge_slave_1) entered disabled state [ 882.181471] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 882.187594] 8021q: adding VLAN 0 to HW filter on device team0 [ 882.197835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 882.205745] bridge0: port 1(bridge_slave_0) entered blocking state [ 882.212139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 882.232285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 882.239962] bridge0: port 2(bridge_slave_1) entered blocking state [ 882.246367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 882.253777] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 882.261712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 882.269737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 882.281095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 882.293833] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 882.307234] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 882.313393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 882.321046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 882.336494] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 882.345046] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 882.351952] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 882.367120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 882.443849] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 882.454294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 882.495090] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 882.503090] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 882.509608] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 882.521419] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 882.528479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 882.536068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 882.543092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 882.553101] device veth0_vlan entered promiscuous mode [ 882.569051] device veth1_vlan entered promiscuous mode [ 882.585888] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 882.595640] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 882.603365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 882.611461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 882.622094] device veth0_macvtap entered promiscuous mode [ 882.628235] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 882.638429] device veth1_macvtap entered promiscuous mode [ 882.644630] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 882.653773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 882.664824] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 882.673881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 882.684117] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.693429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 882.703388] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.712520] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 882.722261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.731393] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 882.741126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.750259] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 882.759952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.770675] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 882.777631] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 882.787637] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 882.794993] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 882.802308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 882.809989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 882.820374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 882.830427] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.839569] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 882.849350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.858720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 882.868501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.877783] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 882.887618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.896815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 882.906605] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 882.917145] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 882.924213] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 882.932055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 882.939898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:38:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x4, 0x1c) dup(r1) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000300), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x80002, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x2, &(0x7f00000000c0)=[r3, r5]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1220003, &(0x7f00000003c0)=ANY=[@ANYBLOB="740000dbd2ca339a69120000000000000000007afbd12fe1be3e634cf614d126c6eb93095f6bb15a9fa74d529fc5e587d5b1132ce6b31b1eb74fc009a052aa7b82a501078a38c998f655ae4bf463fbcbd755c95ba692f49514e10f024bf95b412ac0922b93a26f14dfa5212db0be8f9caa3f3295c0f457167d7198e3b257bd307a5aeca39fe3040573229b4c768975f036fcf40c10aab7ddfe8e4b0952fcb1903c42072e2ca897378975213e23fe2dd9acee507d563417f2786a4dbc09e195c5f6a6c92fe8d15b9428249e09b11462c3b440b345d4a5e370643fbb5f331c7643ec59e54797", @ANYRESHEX=r3, @ANYBLOB=',d\\bug=0x0000004000000000,mmap,cache=fscache,cachetag=nodev,pcr=00000000000000000009,appraise_type=imasig,subj_role=\\bdev,\x00']) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000240)="3683e71cca02d56350eb92fe05b59230c43a8491fb68f692d44227dd114643319d9d69964e28fd78ef2b43e0e6b3a198e74ae83e151ece627a1601ac033383c1aa8d0778a44bac341b3a291685f6c2e78c2443ea7ffea7d5433165b2a0915b25865670b1") ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:16 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e91"], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7"], 0x0, 0xc3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c2"], 0x0, 0x85, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:16 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRES16, @ANYRES32=r2, @ANYRES16=r0, @ANYRESHEX], @ANYRES32=r1, @ANYRES32=0x0, @ANYRESDEC=0x0]], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 884.992004] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 884.998797] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 885.006880] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 885.013799] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 885.021724] device bridge_slave_1 left promiscuous mode [ 885.027331] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.070698] device bridge_slave_0 left promiscuous mode [ 885.076253] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.133599] device veth1_macvtap left promiscuous mode [ 885.138996] device veth0_macvtap left promiscuous mode [ 885.144491] device veth1_vlan left promiscuous mode [ 885.149664] device veth0_vlan left promiscuous mode [ 885.292199] device hsr_slave_1 left promiscuous mode [ 885.333150] device hsr_slave_0 left promiscuous mode [ 885.390433] team0 (unregistering): Port device team_slave_1 removed [ 885.399883] team0 (unregistering): Port device team_slave_0 removed [ 885.409550] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 885.443746] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 885.511925] bond0 (unregistering): Released all slaves 15:38:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7"], 0x0, 0xc3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00') tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 887.281683] IPVS: ftp: loaded support on port[0] = 21 15:38:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c2"], 0x0, 0x85, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 888.136282] chnl_net:caif_netlink_parms(): no params data found [ 888.198523] bridge0: port 1(bridge_slave_0) entered blocking state [ 888.205320] bridge0: port 1(bridge_slave_0) entered disabled state [ 888.213444] device bridge_slave_0 entered promiscuous mode [ 888.220424] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.226815] bridge0: port 2(bridge_slave_1) entered disabled state [ 888.234263] device bridge_slave_1 entered promiscuous mode [ 888.255546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 888.264547] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 888.284836] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 888.292287] team0: Port device team_slave_0 added [ 888.297847] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 888.305115] team0: Port device team_slave_1 added [ 888.325564] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 888.331980] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 888.357202] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 888.368092] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 888.374384] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 888.400391] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 888.411127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 888.418629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 888.472822] device hsr_slave_0 entered promiscuous mode [ 888.510438] device hsr_slave_1 entered promiscuous mode [ 888.550838] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 888.557966] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 888.637553] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.643952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 888.650624] bridge0: port 1(bridge_slave_0) entered blocking state [ 888.656985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 888.697502] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 888.703941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 888.713058] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 888.723118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 888.730675] bridge0: port 1(bridge_slave_0) entered disabled state [ 888.737498] bridge0: port 2(bridge_slave_1) entered disabled state [ 888.748983] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 888.755409] 8021q: adding VLAN 0 to HW filter on device team0 [ 888.764832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 888.773341] bridge0: port 1(bridge_slave_0) entered blocking state [ 888.779688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 888.790656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 888.798382] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.804776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 888.831420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 888.839003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 888.848837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 888.856810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 888.865726] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 888.873101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 888.883691] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 888.898800] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 888.908183] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 888.915609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 888.928249] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 889.008337] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 889.019426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 889.062758] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 889.069746] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 889.077061] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 889.087306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 889.094962] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 889.102614] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 889.114166] device veth0_vlan entered promiscuous mode [ 889.120547] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 889.134423] device veth1_vlan entered promiscuous mode [ 889.151809] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 889.161412] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 889.168233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 889.177016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 889.187126] device veth0_macvtap entered promiscuous mode [ 889.194291] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 889.204064] device veth1_macvtap entered promiscuous mode [ 889.210634] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 889.220306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 889.230975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 889.240601] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 889.250787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.259948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 889.269776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.279024] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 889.289127] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.298453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 889.308292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.317769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 889.327900] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.338486] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 889.345830] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 889.355247] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 889.362772] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 889.369991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 889.377902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 889.388105] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 889.398319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.407524] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 889.417271] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.426440] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 889.436577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.445793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 889.455640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.464804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 889.475190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 889.485345] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 889.492407] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 889.499966] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 889.508782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:38:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) r0 = gettid() tkill(r0, 0x101000000000016) ptrace$setopts(0x4206, r0, 0xffffffff, 0x100026) gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c", 0xdf}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 15:38:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726"], 0x0, 0xe3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c2"], 0x0, 0x85, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:22 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:22 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 891.402223] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 891.408958] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 891.416910] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 891.423625] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 891.432212] device bridge_slave_1 left promiscuous mode [ 891.437687] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.480995] device bridge_slave_0 left promiscuous mode [ 891.486573] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.542377] device veth1_macvtap left promiscuous mode [ 891.547695] device veth0_macvtap left promiscuous mode [ 891.555658] device veth1_vlan left promiscuous mode [ 891.561340] device veth0_vlan left promiscuous mode [ 891.713462] device hsr_slave_1 left promiscuous mode [ 891.763028] device hsr_slave_0 left promiscuous mode [ 891.820886] team0 (unregistering): Port device team_slave_1 removed [ 891.830448] team0 (unregistering): Port device team_slave_0 removed [ 891.839942] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 891.876055] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 891.935808] bond0 (unregistering): Released all slaves 15:38:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a135"], 0x0, 0xc7, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726"], 0x0, 0xe3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x101000000000016) ptrace$peekuser(0x3, r1, 0x8000) tkill(r0, 0x3c) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)='cache=fscache', r3}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c2"], 0x0, 0x85, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 893.781399] IPVS: ftp: loaded support on port[0] = 21 [ 894.646186] chnl_net:caif_netlink_parms(): no params data found [ 894.707032] bridge0: port 1(bridge_slave_0) entered blocking state [ 894.713605] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.722530] device bridge_slave_0 entered promiscuous mode [ 894.729346] bridge0: port 2(bridge_slave_1) entered blocking state [ 894.735815] bridge0: port 2(bridge_slave_1) entered disabled state [ 894.743837] device bridge_slave_1 entered promiscuous mode [ 894.764957] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 894.774251] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 894.795522] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 894.802695] team0: Port device team_slave_0 added [ 894.808218] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 894.815521] team0: Port device team_slave_1 added [ 894.833903] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 894.840287] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 894.865498] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 894.876820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 894.883110] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 894.908372] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 894.918984] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 894.926558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 894.985596] device hsr_slave_0 entered promiscuous mode [ 895.030392] device hsr_slave_1 entered promiscuous mode [ 895.070918] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 895.078135] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 895.158347] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.164759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 895.171443] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.177790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 895.220085] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 895.226229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 895.235872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 895.246365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 895.254311] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.261832] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.273165] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 895.279378] 8021q: adding VLAN 0 to HW filter on device team0 [ 895.290757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 895.298788] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.305266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 895.331735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 895.339355] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.345741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 895.354513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 895.362574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 895.371514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 895.379113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 895.387256] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 895.397675] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 895.407088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 895.420582] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 895.428339] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 895.435256] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 895.448345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 895.525237] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 895.536607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 895.578996] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 895.586234] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 895.593838] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 895.604832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 895.612595] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 895.619428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 895.626820] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 895.637017] device veth0_vlan entered promiscuous mode [ 895.648718] device veth1_vlan entered promiscuous mode [ 895.665438] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 895.678997] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 895.686700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 895.695003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 895.704933] device veth0_macvtap entered promiscuous mode [ 895.711560] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 895.720438] device veth1_macvtap entered promiscuous mode [ 895.726559] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 895.737759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 895.748093] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 895.757782] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 895.768009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.777404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 895.787164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.796294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 895.806501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.815643] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 895.825380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.834529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 895.844307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.854686] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 895.861823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 895.870832] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 895.877995] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 895.885267] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 895.894174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 895.905024] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 895.915200] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.924449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 895.934257] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.943462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 895.953296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.962489] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 895.972300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 895.981593] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 895.991402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 896.001837] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 896.008857] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 896.016787] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 896.024732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:38:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726"], 0x0, 0xe3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a135"], 0x0, 0xc7, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a135"], 0x0, 0xc7, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c92"], 0x0, 0xe8, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x101000000000016) process_vm_writev(r1, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/87, 0x57}, {&(0x7f0000000780)=""/102400, 0x19000}, {&(0x7f0000000080)=""/37, 0x25}, {&(0x7f0000000200)=""/215, 0xd7}, {&(0x7f0000000680)=""/216, 0xd8}], 0x7, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280)={r3}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r3, &(0x7f00000000c0)=0x4) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f000001c540)=[{&(0x7f0000000000)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000300)="9422935d9553b4b4cb0c0d4c8fa48baf56a985ae7f09e7c5775b77e93c757070eacff218fd77cecc63f27cb7c91b9e1ea11adf7cb0cc382e9a70f5350060085ba07f29f8505afe4b18f9f1dc981d7824368f2ef3d0159f4c1eec", 0x5a}, {&(0x7f0000019780)="4e560a92837a85f9aa7526f5b38a2d655e4ace9c827cc99f5e6985c974929e8605c33dc21eec3c710d78b0c000ed01e738ae7d8576cbd3777653b37b1be68bdf4e6ad968a0b882a9e09744a10457f4ed2a137dc02cda6ef9f1220b15d3ad37509d7a1f2976e406c57dfda2afe28c2e087453be5c1b780507cb73f25bbdcba9782723fa83a4648f250ecdfda6c08b2c32fb1efadcabf2b40faaccc05bc6ee3ec16c9203bbb47557b9d0757e06c33172f699cca6adc12f4188e6fc78861ee0eefa78764692c192dd2c34a778769f6ec08ba53f8fc69a69e87bfbc12b52", 0xdc}, {&(0x7f00000001c0)="3540ac57aba8", 0x6}], 0x3, &(0x7f00000003c0)=[@dstaddrv4={0x18, 0x84, 0x7, @broadcast}], 0x18}, {&(0x7f0000000480)=@in6={0xa, 0x4e21, 0x4fcf, @empty, 0x1d}, 0x1c, &(0x7f000001aa80)=[{&(0x7f00000004c0)="0ecc20cdd97642d08537c1f9f83d8e1bd3bf045966854dc8be0ecc481dc4a6bc7c2c874f557669cbc6e3be9cfa983797f07d72a172e39085e35ed118cf7d8c16e18216d523b962a03ec9df3ecdb47ea47a4fd56c7185666dadd2b8fa7582b3010075bc77f885a419f671c3921be08d9b9b5cca1fb653251c80a49de122e3dac1", 0x80}, {&(0x7f0000019880)="82cad61927f27cc90f9c5b8e46d0f02c24c18e12529696119441ffcef8c5c8382530a55a8acd5ade7f7462ba9ec624c42132233bdd8eca67205d206d15e51f9434bd16334822c131a5a61ac2e2edc67f96c1a5ac9910c0be48b43695b5d2e8217316b3f1a149943e3d0c3bb2c7c438fb5af182492118a2f1d4875715f2637c6788e65fabab980a7233190afd8846852898b615ebb3406f06b411f6b55de836b180112fa0ebe65f28abc4ce91dfeb169d7c8556d671266763e8954bf236e20977647e0b0009a919eeff0c9f932c63006fdd6b0008b9aad04c59c3c65ef4cb70035f9ad6e3b03c", 0xe6}, {&(0x7f0000019980)="c314e11d87caea4e167f8b6756b890b0cf8ced054b5b5db7219e8bd39a051b68b5995a2d7574efcd0da92583005b1d8291453c268b71f48318afb826cf56c2eb033bf0f104db9be65d8142d5a9f6d0c28539e0b840750651503b988e9cebe6e02564ebe10740dd60de353e5643a5669534cb288fe094860ac3f4a0cb94ec6cb1fcc4e061762eae0fb2d71f84a50549b494c60c2745cafb2ccce71b15c8c6632015103d126be99a4877e0d822f22acc0411463ea501bc25975842bb2b430709709c8df277893a3d3e8746704d4392075fa1d9f36f9a4b60ad7c3d14e441689124aad4faa3925da3486c9df4b4d1588478f4ad1fa1f884cd4854add08df06bc9459752e232b3d0ca6ae5e79fa2bf089273f96ad15e4a0f1a3fc4804a514a15558a480723de83befccf9ab2246e326c1eeae642b03bb08c491386704a644de099eb360feab77560de66097f1c66f98851376eb73df167c052946b019a38476c89eca212d57b140a95bda4755819323acc08c30026e4b5eec3a737f85c31d30cb503f1c311f87f0cb94898d6463761a681adb1cbbda62aaf53dfb40d62ecde8385bd174f64d24c0aeb2e5008c5aae02fe6c04183252231001e585fab28fbe323d0721ed3282c6b8053e63c05dccbeb024fbea73143c45faaae54f178e8b9e282cf149b53a0b7a795a6512fc55e2d86333c187bbfc75e20fae689a817498cbe448c9e82f1366527211c845e406111fcf71fdb3c4dafca696550db9986d38501e8b456418b4abc75e88ca0969bf271b9aefdead63a3e06e8fb237ada9bbbce88206c2b8a7a6e133b1f69b4148e29f4349a395db19504b52779c0783ded3058b04ebd154c50d5c4bc510f6913f769f1f1d71c5979901820d671c2b65c3049f31e4da282a21d2d9c58a5bbd1515c7c5d8cf18f46482de99c6a7390d2f851fc168d249184e9a1bcc181c595b061f6e20be3af460bf7f707a448535b3c6ae8966295c7100c242d652d630f60fd8d9e026ca04ab9053d476209c1f28a16daddd070b858b34c828893b9f30eb9602b10fc8dbf2b3664daa77be681a3c272394bdb26f3e9545228b9d23247bb435d6980393bb78a499de4c19737224cb875c6196ba4180568bc682ec43904a7a3d72209d416180948553034fae407d59508ddab7f33d94ad2a7bed0ded0648b438f18ce4f8d260d9860d9aa1c67970867be62e41b1960fee0d1af93c7b785f2e3a65fdc8fef6142c1b77f1dae1fd4d791d4ea5e49b406466265609d6f9cdfd3415d69809f7b5f3d3889c45258dd28a1b842419bc0ca3e25ddc65533e45ffd48da995114b7f59edf5c003b26932382d45901b2fb2f29786d9ce91ecc721bafdd1100b2c201c99c62d0d30c4b111a1c26b698f5eacfd679554daac84e3fe2157a3b23ec21153216390664183f2ebd6946ee6e6d8dfddb1145e94db33e7ac8f06dd1127afff5bb56daaa95d64edc03336613a208927b1d5f87fc67710dee02b87533f57aa2e457a668c40fedabf323e3b2fb94500ac3b698e81de3a9d0eba17aae27c5ce3cd8066616624e67862efeca4a14eba7615b0ed1b3ab1b520f104388b48cc5fec3f6181180da1c1e5f5e311dd6ce7d2c336290d815990342cad924086177276fdcd002620330389f9ea35797024d1bf8244e279bcb69c203336594fd9156ccd16a8ff56477838e5c5ae80cd8bec01786826d67445bf4a85010eb5074913d6df81bec200195c6157a36ed498d71946d30fbb520163fe472f03ae76abfd8f807f472485bc7089c96d8b1ebaa56a54d3374e937a257a8bdef06d401b082fff74f655099e18a5850e044bae3c31b4ba93cfb11628b8366e7cfc33b7b3f129463a0400afe1c68188c3aafd416aff5438c0ed24b129daf5ab546978165e6329d1327a54d9883e2cf4cf78b25b76d453d206111aa62ccf0bb698b0739b976b90da87e6be19c12981a5190dde9473290412953df69680e1e793c424ae29863d8c0aef08700497a99206bc9373caee1f99e6a54d2ef10a94c34abef097e6e08e2da9265ea47b27534342b426d1f9bfc9d6450b8b1ed84f0f34448322223116efebb6420f31571cfaa061374c5fe30bf27056527cc41cff36663fa26b3e9d3cc1ccecffdedcf77155e4fc8a9c449180f0b771a39a2b43c8681a4cff2c9bd10e9f2303f9f482cded581b3a8f8159af88384dc00a94a957a114e26426eacb7d693a02c4b5bfefcdafeed533af41ad4569866c92c598a0fe07772b5c35489efb62c2a3167782fe87e29d6b5becd86c63ecf2d200b80b4a328aac8cc1c003606eda7da17509b610666b9a79a503fd9e43decddcdb0b011e7fefc9a9582c29dcbecffa8c436a4f5c4c10f76e28929ee3e057b16d355fefa4ab7e262b703159a22de298f21643890aaf577bfaf831275377c3952f7c539c745568328e0507d517d6324b02a2a4e7ca7059670cd61669181552e44cc38915355a64ae44309553e9f2338209e2dd5049c4431f7979b9ac457406acf69eac7223cf613e1c712ccdc2add15a16144eca432a9a0fd04332b4cb1c9e9a8b347c521b6942331765cf90901ea6d15c24af9c537b57ba7153cbca59a00630535997c57b41cf13dd2c52a2e013e15705ed020cbd26ba8800e4b9b0675990cd27864dc62668ad6d293a4c5a28776c1ce246f71d14e85b30319ac61ba1ac909f384534badc392e9208e69137b55235080406df0bb0f04671427d03196b47be14334d209f0086170692b2920ab5425381929fafb4c93ce99b1afaf8f3a51902466b08275e2f377e532293a8b4c2eae3647fa75311a6358ee9e7a702e6799b0f365da7d09b8e4b6230fac10ac492ae42deff3bdc0919dcf406a500d4092ed801cd78bf3ffc414469166a287a418335f224462cfd50fd4b12b480d097fec77267a7af11af5d929229de54636564f5e20c8a40dd33adb93853e2944ea21f839c011737bea163b942a1cdea13befa578661c32d433874ccfca7a40067b8a7346114a8d8b9873d50758ec4d4f001458175f8b3c1117ad08413c0c8a7a8cba609a0bfb9dcfceba064b60d3da4588591890ae6a353fe0514787c17f3c5a8283e8d1ed8a19ad9af8009c87761cd87c59204de1a612aaad02f16f32372628f9afe7e923525824aaaf9e743d9665ceafe59528f86a3bb64ce37c48ad1e808268146f891a8b03f8ab86191960f284213c0ef9539858b79b7e72ce79f32c0698d6ffea4fa6fa0044f2b70a498032f76d66a76371160f3d3bc383aaba8b0640e9b5fcdc946db1190a9b961a6558da0b998b5afd509bd7a5a440969ddfbf926b47adc8d8a48c6595dd9e279081dd6a82329a29c11b72e1b0a050eeb37fc621b37a3b0046e5e336861d9b55c342e3ab4153d258b4515cb2abd1773ca67fa856f0817a4dc62200073e84d638639c646e83e67495bb4a0821bde8c893f1bcc607e816012ef318f4b39fcfbb38066378fe520185b18527e75ee9eacd66cb6b450885687382ceba59b31e77860f697c4504cbcaed9b375eaaf277c7967bfd232740b0123069005e31ebef8e01f9a70e32cdace996e46993d99bcc71e967961d8074195453d3c37534db8d8aa46f7b2fea5d582fb981540f87bf23fa3f3e4ad8e232e1a6fda0f9f3957cc0c0b0a67721a0bd2f7b74012b8bcbb5ac8f3cb6fa7354f7557bc7f2f4ad4301b122aef97b5303cf3e7cf3f6f2bcd17c58529d2fc45fc247bb8f732c1641374a6ca3a01503fa102dc43a1e5334a508289855f2ab2a756e2bb84ad2bfcfdaccd6a4c5c75165c81c8e9c27d8c9abe7eba51412bfb2cbe8da8db36d086ccf7c5c7b9ca7ff03281cd8a5a82406a6a75a342788d2560707d0deb904cd8bf8f8967174e9815ea36e23589357867ccc992d4596c435248e51a589cf7f57854e35425948c145819cc75df70285386b48faaec8672acfe04980688d6e272f6d7eb5571df348666ae9041d949d4c95ae7420a41c47863b8c95dead67108552dea16a7762dfe3cea9deb2886f4800918c92c9f15ed0330ca42cef24402040988fe48b4616cfad581556d05a65d818918ac0458c06fb9c30957c726f800968157cde4598b6d1c04a0aa8784592b9b52137d69d2c51758530264ad08e0051177937fbe8a257223234ec0d10825079c443a5d00f6bb2717be45c6530255b88d64af0b06d384c8082b2394f33a8535dc04d96c987425e0c1ced96b283ee3e8c1fe4254d8c8a90bb4424281a4aea7c1f0cd7253f4a54491d4661be0422167a4915d2d343ef9935841b9b6e872bb5140cb5f3ec41983e6316318ad973588d65e01987665f61ee626836e607e7acf967e070ace0f2a69db507de16cc35554a251a05c0187d2e7a573abe0c4bf51223b232db73ed15ff156ad9a67a49a702dac91f5b31fa8df1fbdd4d5f34054b3a21f1ec0ad77cf97765e1e24196c0ac7350cf7f2d6c644d367a689386419f10ac5dccd9382196d0eecc58dacc008855815b777460b2c230ca32a9113635d79e6c714c30cc8c7b6286b45704b16feae7806479a5f48b36997d536c649329ded7b834f49a05c940e36c3fb4a4d320e2feaff6f00eec3479ad0bbf8ccbafbc0399ad931c02c73e3859f294b2291137cf5290b816346adf96f51a162bede30eb324cc3fa51671ed9b7f2ada3e4996da4d39700643c77abd5fbcbdf4b900be308e018f31330d051f2e0db99616ea3b8dee0fb78bb26cadfca5d88917119f883cba3a58aedd7da1828db1aa74101b70e39b9c9b9bf2318a60c12358585e2b1f28161004fadd4f58c779f53cba62081d3f7d86b4c890191c7756325095582a49ab80c4c908ed1c14dbe085f152c1efcf12d77dbe146d512b17c3014751ac3ba875df3bddf1a47805ed458b222802dc1eda62c7c2ac918dc95c7006a89c83045cc7c5ba42e63d92377e4c7b26834e099528a65146393d5daf81a8857c231075eeddc95b4342afa52f240b17d95c3411fcd607d328aee5337cff3920fb4ab7e55dfd45dfd5e131db7810afa661cd87a6d23f73e44927c87b60629d09b7765ac1fccf2a81e2c46303141187e6fe1c01d6ee54e311f0cdbe52f22a6cba974a515a0e64a738fa33aabe44d33cef2dd23458004640dc51d3f7f24f74c57c4be0f82cb6de6ac651afa7a82477a15961bc6e8fb6f89b6f9e6adaf6d6be26dae49e2298ef24262a7f1ba801c6fc69fccf069c364116e0d60eef23f3dc2d590fff488d80fb1a08e9a1704749c5182dc216b22a52b6f21de115a711ffa9ff7a3686ff76611124269de9b3999b644656e76b8a7fc49b1c73390b11656bfe9ccc83f58f17d54a343953ae1312757e45519752d4fedd7577324ab7bbb61058f254d549826e6b47d374734474deb1bff861c0d5534e685448e5c6444f872666aeaa2df9ce311bcfb0172c183ec2cd45a1450a496b1b2de2decdda77d2d250378ebe92a68ae7b092f1ed90a50cd085912a845f4f4a736292deb738f11168159edbc9570658c01866b46b0d1cf7ea69e0ebf3f0568a298e060418dbcc9477226684335f4e1bbc2dbf44f92aa1d177e01504cbe070fa895e25dd34deb5318856fd6bd5f314e1a52473fb503984ec6dc4756ade03831064fd6396b7a38494a1d1a9863c851a75dd4a7bcc0322dbf3f669c623f5b6f0e80893a18faada6579cdb513bb78a77cc4b5c96f1be13d42f92e7a47df21bdd5b77ee6e721b2f7671c643e8d424699e8fe10a75354b2103c5b33bbfd9d7d76fe4c5e8d45aa9b3620d602a70e2ffe0a5d5857ab301a0327ac82e2bea5b32ad1", 0x1000}, {&(0x7f000001a980)="c74476015e65559b714eed27c22e5ae0090bab3a111c2778027443a598efda9ce4869ac5163e8a3f4d85cb4b80aa062fd160d7be8c1a22ece1264d812b248efe9357da98b435e4734bcb7ef5ab67b04b265d3185fa9f2f988c33ed6b317b4ff1ab81a356e9f85f246a0a82bf632ac25498c2cd152f1260f0cc2a395b02c64839a66bb3d8a20c7cdfbc393be62ae37b3c1bdcce5c08532c3cc6484be09e4189049342163ca18cb6e9cc27edfdd9551381f7b8c8b929f60e7a93b27cb748ad18fbf7df4ff2f02d65ec0ba7a0ee210563387a01f00a5467af", 0xd7}], 0x4, &(0x7f000001aac0)=ANY=[@ANYBLOB="20000000000000108400000008000000fe80000000009a0000000000000000aa"], 0x20, 0x1}, {&(0x7f000001ab00)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f000001abc0)=[{&(0x7f000001ab40)="84eab97266ed64166a95dc1cf3c7a4530f3812ede05b71362061c81d22fc7dc9b07178cb1ab79f857a962d3756803df6f1ccd237d0f4c818ef1a5d45e3b7fa0e0a8a1d3cfe45e6", 0x47}], 0x1, 0x0, 0x0, 0x840}, {&(0x7f000001ac00)=@in={0x2, 0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f000001aec0)=[{&(0x7f000001ac40)="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", 0xfc}, {&(0x7f000001ad40)="6d068f68ffa613d3b798f68ce9d93f3d27234675f413c08a6fec5847861e6285728635166a81e00f8c15dd7084be340620292c5c9cdb281eb5ef591ab87bf38bf6d90d41b13e9dd893ed00336774a4ef495836578290b6ad277faba938672e26393d986ea1819057f83028763375eb1cb8d04b4a8fb15a8a351464faa922cbd295f3bc57629c5bb088ec6e853d6a6dc1e7bb25cfc85a913181a9d7bc9fe3d03e1ec8a47ade0ffe8983d76e76c118b9853cbb784b2102d9afb9ac2a4285dc01990ffbf47135d4ae9e346f0f5a", 0xcc}, {&(0x7f000001ae40)="03dce031000d12615b8380ca6d6ffae1fb0580a8dd48ac4177b58ceae99cf7d5d61be753f4b2af45ae87c5951e6b44f22ca55c729fbb613cda03f4e0f3196a0ef73ee5d1a91f9f2b8d6ae5cf4c0d", 0x4e}], 0x3, &(0x7f000001af00)=[@dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @authinfo={0x18, 0x84, 0x6, {0x7}}, @sndrcv={0x30, 0x84, 0x1, {0x1000, 0x3, 0x202, 0x8000, 0x95d9, 0x3, 0x3, 0x7f}}, @authinfo={0x18, 0x84, 0x6, {0x5}}], 0x90, 0x4000141}, {&(0x7f000001afc0)=@in6={0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x1c, &(0x7f000001c300)=[{&(0x7f000001b000)="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", 0x1000}, {&(0x7f000001c000)="ae8dd0b24e2789878fd30f4ef54fb8d1867edc2e29d7d108d52f58f69ca0e6496e1bc0b97b2a95bc2c4f4f36bb4931cab46c4e05645d6c0ecc360ef88ad2583ff50f184fd3efac54c4130e7638918352d239c8368690b70f83609dfa1085c7548bb161b1b87af4970d060b952f6fa41c7fc40cf13ab52491faa9bf78c3613c9b88e10e55d221b8bd64e2d5a76ef989928674f2b2183772e272bb2a31c67b9826ce46e63912cc2a97e1063de7e8cd3d49cf8a8fc909287e576a1690b1bc75c5f16420dd3da429ee250f2e0d39fd68ff10a7e7a43313ea88328adc913479ff4ea715d4", 0xe2}, {&(0x7f000001c100)="c4917dcf2bb44914c5c7c83194370b402dcdd78d1c71a11889e21f35eb8070afb2047012af9e67b10e96be339c0b75611d69d238470edff62baa23dbc9d7c3b7ed2e138ccaa314b5653288757552f23aa522cb5cf74e8930425777fe2f65421a7277b204cd28900c1a772958c71d7c7f37b8138a0de597f9ece76bfef8c03ded432f9f78a107eedb34a6905cb592a08839538b706eb6d9cd7aad66cfbd0924930b7acdfdabff905bf363", 0xaa}, {&(0x7f000001c1c0)="eae366e06d33f2fd9fd4d9a9f800a2a99460be4268d6a9adf065d790110ca69537fc60d5975cd44b46805b51964a4b0d047564490e71578ae732bbf7da6247fcacd49cb25a3fb2310de7b566506a744d82e71199f2ecf7a9f42e85751a9a78af168483c82db4d5bf394a83c7d1b8f888cb4849a3a6f99c1a17ea53af8b7b796645bdd73d01fcbc8efea87eb544eedbb9765ae5813b06b4c54cb5bb55e7d93a79d45a6af4e04c734009bebba3", 0xac}, {&(0x7f000001c280)="5743d860c81063b5ae0fef4cb429131c4e81b2cadde6cf2b37de2e2313fc25b7287a6ba309be47e69a5bdbe6b1bd6deada27e915be4c05ced198a48ec17d15ac1d6f0dcb1df67fdabfa47123fe4462d31ec36d8200", 0x55}], 0x5, &(0x7f000001c380)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @init={0x18, 0x84, 0x0, {0x8, 0x8, 0x7}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x201, 0x101, 0x80}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x34}}], 0x88, 0x4004004}, {&(0x7f000001c440)=@in6={0xa, 0x4e24, 0x6, @remote, 0x4}, 0x1c, &(0x7f000001c4c0)=[{&(0x7f000001c480)="654d94f89037d5c3fce81fcfaae6bbe62dca6c4c52d55562d87397b8489d97f05a29308b55528c50ed5c8b4b41e494b59ea1a3ba897a791af7b11bd5ba05", 0x3e}], 0x1, &(0x7f000001c500)=[@sndinfo={0x20, 0x84, 0x2, {0x3, 0x201, 0x3, 0x7ff, r3}}], 0x20, 0x44811}], 0x6, 0x4048884) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c2"], 0x0, 0x85, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c2"], 0x0, 0x85, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a135"], 0x0, 0xc7, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a135"], 0x0, 0xc7, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a135"], 0x0, 0xc7, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 897.981884] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 897.988671] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 897.997931] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 898.004903] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 898.013472] device bridge_slave_1 left promiscuous mode [ 898.019060] bridge0: port 2(bridge_slave_1) entered disabled state [ 898.060773] device bridge_slave_0 left promiscuous mode [ 898.066372] bridge0: port 1(bridge_slave_0) entered disabled state [ 898.122283] device veth1_macvtap left promiscuous mode [ 898.127693] device veth0_macvtap left promiscuous mode [ 898.133115] device veth1_vlan left promiscuous mode [ 898.138275] device veth0_vlan left promiscuous mode [ 898.262284] device hsr_slave_1 left promiscuous mode [ 898.302915] device hsr_slave_0 left promiscuous mode [ 898.348306] team0 (unregistering): Port device team_slave_1 removed [ 898.358171] team0 (unregistering): Port device team_slave_0 removed [ 898.367905] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 898.404003] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 898.472919] bond0 (unregistering): Released all slaves 15:38:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be"], 0x0, 0xf3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:31 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c92"], 0x0, 0xe8, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0, 0x110}, 0x45) ptrace$setopts(0x4206, r0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280)={r2}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r2, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000340)={r2, 0x9}, &(0x7f0000000380)=0x8) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10200) ioctl$TCSBRK(r3, 0x5409, 0x3bb) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c05"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x101000000000016) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000300)={&(0x7f0000000200)=""/213, 0xd5}) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x288000, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000001c0)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c92"], 0x0, 0xe8, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c92"], 0x0, 0xe8, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c92"], 0x0, 0xe8, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119"], 0x0, 0xf9, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119"], 0x0, 0xf9, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119"], 0x0, 0xf9, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 901.321668] IPVS: ftp: loaded support on port[0] = 21 [ 902.194800] chnl_net:caif_netlink_parms(): no params data found [ 902.257345] bridge0: port 1(bridge_slave_0) entered blocking state [ 902.264364] bridge0: port 1(bridge_slave_0) entered disabled state [ 902.271526] device bridge_slave_0 entered promiscuous mode [ 902.278664] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.285396] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.293054] device bridge_slave_1 entered promiscuous mode [ 902.315983] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 902.325125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 902.346676] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 902.354003] team0: Port device team_slave_0 added [ 902.359531] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 902.366861] team0: Port device team_slave_1 added [ 902.387039] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 902.393495] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 902.418737] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 902.429908] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 902.436531] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:38:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be"], 0x0, 0xf3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 902.461817] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 902.472538] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 902.480122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 902.532875] device hsr_slave_0 entered promiscuous mode [ 902.571170] device hsr_slave_1 entered promiscuous mode [ 902.613967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 902.621747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 902.711381] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.717813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 902.724513] bridge0: port 1(bridge_slave_0) entered blocking state [ 902.731024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 902.769470] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 902.775628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 902.785987] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 902.795416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 902.802862] bridge0: port 1(bridge_slave_0) entered disabled state [ 902.809706] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.820157] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 902.826274] 8021q: adding VLAN 0 to HW filter on device team0 [ 902.836594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 902.845049] bridge0: port 1(bridge_slave_0) entered blocking state [ 902.851482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 902.862014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 902.869654] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.876033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 902.891347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 902.898895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 902.909536] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 902.921591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 902.932641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 902.943689] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 902.949768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 902.966065] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 902.974044] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 902.981004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 902.996042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 903.066446] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 903.077359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 903.115917] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 903.123623] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 903.131131] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 903.140455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 903.147761] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 903.154820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 903.165387] device veth0_vlan entered promiscuous mode [ 903.175088] device veth1_vlan entered promiscuous mode [ 903.181289] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 903.190779] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 903.197562] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 903.208544] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 903.215726] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 903.233409] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 903.243984] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 903.250879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 903.258536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 903.268465] device veth0_macvtap entered promiscuous mode [ 903.276638] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 903.287666] device veth1_macvtap entered promiscuous mode [ 903.294614] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 903.304857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 903.315950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 903.325938] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 903.336133] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.345429] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 903.355345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.364641] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 903.374473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.383723] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 903.393855] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.403369] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 903.413262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.423446] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 903.430826] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 903.439962] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 903.447532] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 903.454728] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 903.462686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 903.473600] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 903.483968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.493174] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 903.503935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.513387] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 903.523198] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.532399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 903.542223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.551438] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 903.561235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 903.571778] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 903.578733] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 903.586381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 903.595034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:38:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c92"], 0x0, 0xe8, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x101, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be"], 0x0, 0xf3, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:36 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYRESDEC], 0x0, 0x14}, 0x20) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f00000001c0)={0x4, 0x0, [{0xc0000000, 0x7fffffff, 0x0, 0x8, 0xf4, 0x8, 0x40}, {0xc0000007, 0xffffffff, 0x1, 0x7, 0xffff, 0x3ff80000, 0x55}, {0x80000008, 0x7ff, 0x2, 0xfffffffd, 0x5, 0x3, 0x6}, {0x4, 0x7ff, 0x1, 0x101, 0x0, 0x2, 0x1}]}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/62, 0x3e}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 15:38:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f00000001c0)={0x4, 0x2}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:36 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x7e, 0x1, 0x0, "1c8482099d4738e2c33160b621eed392", "2452197cff2670735b15d100d569fc7eaab19b5c8ff9d1936158a24f58a81d91e8d56e87cf7d2eb76b729c2a4f6601ee2b91bf0df26419a9a9bd6d7cc36abc867edf5eb674f18e7c2825e777631983c8f245bcb3cb3ac90b3428d373cca68518955c359d8031fdb4a4"}, 0x7e, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:36 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 905.371859] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 905.378589] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 905.386769] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 905.393542] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 905.401800] device bridge_slave_1 left promiscuous mode [ 905.407281] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.460964] device bridge_slave_0 left promiscuous mode [ 905.466571] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.523825] device veth1_macvtap left promiscuous mode [ 905.529235] device veth0_macvtap left promiscuous mode [ 905.534925] device veth1_vlan left promiscuous mode [ 905.541196] device veth0_vlan left promiscuous mode [ 905.703806] device hsr_slave_1 left promiscuous mode [ 905.755493] device hsr_slave_0 left promiscuous mode [ 905.807962] team0 (unregistering): Port device team_slave_1 removed [ 905.817500] team0 (unregistering): Port device team_slave_0 removed [ 905.827243] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 905.873542] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 905.951843] bond0 (unregistering): Released all slaves 15:38:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119"], 0x0, 0xf9, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442f"], 0x0, 0xfb, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x101, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119442fcd3c1b087e280d8f6062475f9ed41c"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 907.791224] IPVS: ftp: loaded support on port[0] = 21 15:38:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r4, 0xe0da}}, 0x10) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000980)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffea7}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f00000006c0)='syzkaller\x00', 0x81, 0xd2, &(0x7f0000000700)=""/210, 0x0, 0x15, [], r0, 0x0, r1, 0x8, &(0x7f0000000800)={0xa}, 0x8, 0x10, 0x0}, 0x78) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, 0x1ec, 0x6, 0x7, 0x100, 0x0, 0x800200, r0}) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r0}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_bond\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'ip_vti0\x00'}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$inet6(0xa, 0x2, 0x0) dup(r3) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x5, @mcast1, 0xe468}, @in6={0xa, 0x4e20, 0x8382, @dev={0xfe, 0x80, [], 0x23}, 0x5}, @in6={0xa, 0x4e24, 0x7, @empty, 0xf1a}], 0x54) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 15:38:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x140f, 0x20, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'umad\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'umad\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x24004050}, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 908.628917] chnl_net:caif_netlink_parms(): no params data found [ 908.693153] bridge0: port 1(bridge_slave_0) entered blocking state [ 908.699569] bridge0: port 1(bridge_slave_0) entered disabled state [ 908.707049] device bridge_slave_0 entered promiscuous mode [ 908.714909] bridge0: port 2(bridge_slave_1) entered blocking state [ 908.721503] bridge0: port 2(bridge_slave_1) entered disabled state [ 908.728532] device bridge_slave_1 entered promiscuous mode [ 908.749571] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 908.758876] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 908.780757] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 908.787901] team0: Port device team_slave_0 added [ 908.794075] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 908.801618] team0: Port device team_slave_1 added [ 908.820789] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 908.827046] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 908.852275] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 908.864044] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 908.870516] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 908.895893] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 908.906480] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 908.914140] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 908.975046] device hsr_slave_0 entered promiscuous mode [ 909.030415] device hsr_slave_1 entered promiscuous mode [ 909.071220] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 909.078501] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 909.158592] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.164999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 909.171783] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.178243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 909.218749] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 909.225592] 8021q: adding VLAN 0 to HW filter on device bond0 [ 909.234440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 909.246201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 909.253598] bridge0: port 1(bridge_slave_0) entered disabled state [ 909.260550] bridge0: port 2(bridge_slave_1) entered disabled state [ 909.273285] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 909.279532] 8021q: adding VLAN 0 to HW filter on device team0 [ 909.289963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 909.297644] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.304032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 909.314698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 909.324744] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.331198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 909.352362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 909.366131] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 909.373869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 909.381685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 909.395207] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 909.404883] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 909.412784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 909.428004] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 909.437917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 909.445159] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 909.457734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 909.535634] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 909.546399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 909.596931] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 909.604729] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 909.611528] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 909.617914] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 909.629368] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 909.636458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 909.644684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 909.652803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 909.659658] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 909.668998] device veth0_vlan entered promiscuous mode [ 909.683513] device veth1_vlan entered promiscuous mode [ 909.689329] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 909.698964] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 909.713469] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 909.723553] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 909.730891] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 909.738117] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 909.745687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 909.753892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 909.764942] device veth0_macvtap entered promiscuous mode [ 909.771700] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 909.780297] device veth1_macvtap entered promiscuous mode [ 909.786400] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 909.796756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 909.806878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 909.817213] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 909.826974] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 909.836463] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 909.846749] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 909.856057] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 909.865822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 909.875054] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 909.884792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 909.893950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 909.903700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 909.914330] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 909.921553] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 909.930615] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 909.937787] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 909.945337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 909.953233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 909.963883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 909.974481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 909.983992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 909.994014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 910.003201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 910.012966] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 910.022506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 910.032347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 910.041490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 910.051316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 910.061742] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 910.068639] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 910.076794] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 910.085351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:38:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0xfb, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000ec000000ec00400007fd4eb3e09700000000000c000a000005000000000000617e63bc255e4c30e190ea2b5a040000000000004f3a00f2fffff700000000000063537113f36534020000000000000000000000000000000000ed000000000000000000000000000000000000339f69dfadb72aaa3256c987c216b0a612c791dd9e7c1f7e05fe598f5260bc97be3e0dbffe72eaf1c981949ac00d272ced4ec1650fc2c410ccfc0000000068c219c2ad96cf52c86c646de7d245a1359ab2d88a263b42d908aecdd47d8ee08e17e4b3f0fd3d8b9c3bd77726ca48765c9269481c1c494eca2a9bf4be01d47fa49119"], 0x0, 0xf9, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x101, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:43 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x43, 0x400000000000000}, 0x11288, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @sack_perm], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="72617700000000010000000000000000000000000000000000000000000000000200000003000000b80400000000000003000000000000000003000000030000200400002004000020040000200400002004000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000a00200030000000000000000000000000000000000000000300262706600000000000000000000000000000000000000000000000000000101000000000000002e2f66696c653000000000000000000000000000000000000000000000000000000000003d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060005345540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0002001000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000434e911e"], 0x1) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000300)="4f9d935d5ba98e2d76", 0x9}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c4064ac6d7b242060a07bc4309e3eb79d8745797b308edd84adef35ad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68dc904b436f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000000000000000000989eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r5, r4) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0x4}]}, 0x30}}, 0x20000010) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 15:38:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x105, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x10a, 0x0, 0x40000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:38:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/71, 0xffffffffffffff43}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 911.981878] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 911.988605] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 911.996235] kasan: CONFIG_KASAN_INLINE enabled [ 912.001468] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 912.008911] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 912.015129] Modules linked in: [ 912.018304] CPU: 0 PID: 22 Comm: kworker/u4:1 Not tainted 4.14.173-syzkaller #0 [ 912.025729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 912.035085] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 912.042163] task: ffff8880a9a1e5c0 task.stack: ffff8880a9a28000 [ 912.048206] RIP: 0010:batadv_iv_ogm_queue_add+0x48/0xe00 [ 912.053674] RSP: 0018:ffff8880a9a2fb88 EFLAGS: 00010246 [ 912.059016] RAX: dffffc0000000000 RBX: ffff8880a4001840 RCX: ffff8880a4001840 [ 912.067875] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 912.075129] RBP: 0000000000000006 R08: ffff8880a4001840 R09: 0000000000000001 [ 912.082382] R10: ffff8880a9a1ee90 R11: ffff8880a9a1e5c0 R12: ffff8880580e5980 [ 912.089652] R13: ffff8880a4001868 R14: 0000000000000000 R15: 000000010000ef76 [ 912.096913] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 912.105118] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 912.110979] CR2: 000000000071d694 CR3: 000000005ced1000 CR4: 00000000001426f0 [ 912.118238] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 912.125496] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 912.132746] Call Trace: [ 912.135328] ? lock_acquire+0x170/0x3f0 [ 912.139294] ? batadv_iv_ogm_schedule+0x869/0xdf0 [ 912.144119] ? check_preemption_disabled+0x35/0x240 [ 912.149127] batadv_iv_ogm_schedule+0xa38/0xdf0 [ 912.153826] batadv_iv_send_outstanding_bat_ogm_packet+0x4ad/0x6a0 [ 912.160134] process_one_work+0x813/0x1540 [ 912.164467] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 912.169118] ? worker_thread+0x15d/0x1070 [ 912.173251] ? _raw_spin_unlock_irq+0x24/0x80 [ 912.177729] worker_thread+0x5d1/0x1070 [ 912.181731] ? process_one_work+0x1540/0x1540 [ 912.186209] kthread+0x30d/0x420 [ 912.189615] ? kthread_create_on_node+0xd0/0xd0 [ 912.194272] ret_from_fork+0x24/0x30 [ 912.197966] Code: 00 00 48 89 4c 24 08 4c 89 44 24 10 44 89 4c 24 20 e8 5d 9b 35 fb 49 8d 7e 03 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 c5 0b 00 [ 912.217037] RIP: batadv_iv_ogm_queue_add+0x48/0xe00 RSP: ffff8880a9a2fb88 [ 912.224851] ---[ end trace c01d2d1805e80b57 ]--- [ 912.229669] Kernel panic - not syncing: Fatal exception [ 912.236404] Kernel Offset: disabled [ 912.240019] Rebooting in 86400 seconds..